Sat.Jul 29, 2017 - Fri.Aug 04, 2017

article thumbnail

Reader Favorites August 2017: Our Most Popular RIM Resources

TAB OnRecord

The most popular RIM resources of the past month cover both electronic records and paper records. To start, we have a white paper to help you choose the right metrics to measure ROI for your EDRMS system. Our mobile shelving buyer's guide provides an overview of key factors think about when purchasing a system. For… Read More. The post Reader Favorites August 2017: Our Most Popular RIM Resources appeared first on TAB Records Management Blog | TAB OnRecord.

article thumbnail

People Aren't Necessarily Librarians

Gimmal

I learned the Dewy Decimal system in fourth grade, but I'm not sure they teach that any longer! With modern software, card catalogs and manual sorting are a thing of the past in libraries, and that ease of access should flow through to the digital workplace.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

UK Government Expected to Present Data Protection Bill in September 2017

Hunton Privacy

Media sources have reported that the UK Department for Culture, Media & Sport has confirmed its plans to present its Data Protection Bill to Parliament when MPs return to Parliament in early September. The Bill follows commitments made in the Queen’s Speech in June, and will effectively copy the EU General Data Protection Regulation (“GDPR”) into the UK statute book.

article thumbnail

Fun and Interactive Ways to Raise Awareness about the GDPR within your Organisation

Archive Document Data Storage

Education, education, education. Yes, educating staff about the GDPR and raising awareness is the all-important step that will unite your organisation and team members in the GDPR fight for survival! The key is to get everyone on board, from the company directors all the way through to your suppliers or any party with a valued interest in your organisation.

GDPR 45
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

We Will Always Need Governance (a response to Goodbye Governance…”

Information is Currency

CMSWire recently hosted a piece with the provocative title, “Goodbye Governance, We Don’t Need You Any More.” We are at a critical turning point with the consumerisation of IT. The digital workplace isn’t just about the technology that is available, but also the skills that the people have to leverage the technology that is available.

More Trending

article thumbnail

CNIL Fines Rental Car Company for Data Security Failure Attributable to Third-Party Service Provider

Hunton Privacy

On July 27, 2017, the French Data Protection Authority (“CNIL”) imposed a fine of €40,000 on a French affiliate of the rental car company, The Hertz Corporation, for failure to ensure the security of website users’ personal data. On October 15, 2016, the CNIL was informed of the existence of a security incident which resulted in the compromise of personal data on a French website related to Hertz France’s discount program.

article thumbnail

Vote for Gimmal in the InfoGovCon 2017 Awards!

Gimmal

Information Governance Conference 2017 is closing in , and the award nominations have just opened! As they describe it: "This conference is the premier gathering of the leaders in the field of Information Governance. It is designed to offer exceptional educational and networking opportunities to increase the effectiveness information efforts, while sharing best practices.".

article thumbnail

On Titles, Jobs, and Job Descriptions (Not All Roles Are Architects)

The Falcon's View

Folks: Please stop calling every soup-to-nuts, everything-but-the-kitchen-sink security job a "security architect" role. It's harmful to the industry and it's doing you no favors trying to find the right resources. In fact, please stop posting these "one role does everything security under the sun" positions altogether. It's hurting your recruitment efforts, and it makes it incredibly difficult to find positions that are a good fit.

article thumbnail

Hybrid IT fuels digital transformation

CGI

Les TI hybrides favorisent la transformation numérique. Au cours des dernières années, les services infonuagiques sont devenus une partie intégrante des TI d’entreprise. De ce fait, les organisations s’attendent désormais à pouvoir mettre en œuvre de nouveaux modèles d’affaires avec davantage de flexibilité et de rapidité dans le cadre de leur transformation numérique.

article thumbnail

How and Why Should You Be Tracking Geopolitical Risk?

Geopolitical risk is now at the top of the agenda for CEOs. But tracking it can be difficult. The world is more interconnected than ever, whether in terms of economics and supply chains or technology and communication. Geopolitically, however, it is becoming increasingly fragmented – threatening the operations, financial well-being, and security of globally connected companies.

article thumbnail

CIPL and AvePoint Launch Second Annual GDPR Organizational Readiness Survey

Hunton Privacy

With less than one year to go before the EU General Data Protection Regulation (“GDPR”) comes into force, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams and AvePoint have launched the second annual GDPR Organizational Readiness Survey. Last year, over 220 predominantly multinational organizations participated in the study which focused on key areas of impact and change under the GDPR such as consent, legitimate interest, data portability, profiling, DPIAs, DPOs, d

GDPR 45
article thumbnail

Foolproofing Your Disaster Recovery Plan

Archive Document Data Storage

When disaster strikes, having a plan and being able to put it into immediate action can mean the difference between keeping your business open and shutting its doors forever. Here we offer tips for foolproofing your disaster recovery plan. Assess Risks. There’s no one-size-fits-all approach to disaster planning. It’s important to identify the unique natural and man-made hazards that could damage your business infrastructure and paralyse your operations, such as: Waterways near your f

article thumbnail

Defence as the best form of attack

MIKE 2.0

The global economy is powered by business innovation with small and large organisations alike inventing the future for us all. The rapid rate of change brings both opportunities and threats with recent cyber events acting as a wake-up call. Far from being afraid, we should be reminded that we need to design businesses to operate and even thrive in unexpected circumstances.

article thumbnail

Hybrid IT fuels digital transformation

CGI

Les TI hybrides favorisent la transformation numérique. harini.kottees…. Tue, 08/01/2017 - 04:30. Au cours des dernières années, les services infonuagiques sont devenus une partie intégrante des TI d’entreprise. De ce fait, les organisations s’attendent désormais à pouvoir mettre en œuvre de nouveaux modèles d’affaires avec davantage de flexibilité et de rapidité dans le cadre de leur transformation numérique.

article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

FTC Posts Second Blog in Its “Stick with Security” Series

Hunton Privacy

On July 28, 2017, the FTC published the second blog post in its “Stick with Security” series. As we previously reported , the FTC will publish an entry every Friday for the next few months focusing on each of the 10 principles outlined in its Start with Security Guide for Businesses. This week’s post, entitled “ Start with security – and stick with it ,” looks at key security principles that apply to all businesses regardless of their size or the types of data they handle.

IT 40
article thumbnail

FSU facts at your fingertips

Archives Blogs

Have you ever wondered what the average salary of an FSU professor was in 1961? ($8,940). Have you ever been curious to know how many full-time students were enrolled in 1995? (23,950). This information and much more is available in the FSU Fact Books now available on DigiNole. There’s a wealth of data in these documents from budgetary breakdowns and property valuations to organizational charts and enrollment statistics.

article thumbnail

Canadian Library Consortia OCUL and COPPUL Join Forces with Archive-It to Expand Web Archiving in Canada

Archive-It

by the Archive-It Team. The Council of Prairie and Pacific University Libraries (COPPUL) and the Ontario Council of University Libraries (OCUL) have joined forces in a multi-consortial offering of Archive-It, the web archiving service of the Internet Archive. Working together, COPPUL and OCUL are considering ways that they can significantly expand web archiving in Canada.

article thumbnail

Insurers’ top trends and priorities: A look at CGI’s 2017 Voice of Our Clients findings (part 1)

CGI

Insurers’ top trends and priorities: A look at CGI’s 2017 Voice of Our Clients findings (part 1). harini.kottees…. Mon, 07/31/2017 - 05:30. Every year, CGI meets in-person with clients across the globe to get a pulse on their top trends and priorities to understand their challenges and opportunities, especially as the urgency to become digital organizations continues to accelerate across industries.

article thumbnail

Entity Resolution Checklist: What to Consider When Evaluating Options

Are you trying to decide which entity resolution capabilities you need? It can be confusing to determine which features are most important for your project. And sometimes key features are overlooked. Get the Entity Resolution Evaluation Checklist to make sure you’ve thought of everything to make your project a success! The list was created by Senzing’s team of leading entity resolution experts, based on their real-world experience.

article thumbnail

FTC Approves Modifications to TRUSTe’s COPPA Safe Harbor Program

Hunton Privacy

On July 31, 2017, the Federal Trade Commission announced that it has approved modifications to TRUSTe’s safe harbor program under the Children’s Online Privacy Protection Rule (the “COPPA Rule”). The COPPA Rule incorporates a “safe harbor” provision that allows companies and industry groups to seek the FTC’s approval for self-regulatory frameworks that implement “the same or greater protections for children” as those set forth in the COPPA Rule.

Privacy 40
article thumbnail

Margaret Mead Addresses the Nation’s Heroin Epidemic

Archives Blogs

Although she has only studied “cultures addicted to betel nut,” America’s most famous anthropologist shows no hesitation in voicing her opinions at this 1970 symposium on the Social Implication of Drug Abuse. She first describes a country in disarray. Crime is on the rise. Taxi drivers are being “slaughtered.” Respectable people go shoplifting for sport.

article thumbnail

A Record Center Is Not An Archives: Dispatches from a ARM sector change

The Schedule

Welcome back from SAA! Or, if like me, you were #saaleftbehind, welcome back from the weekend, I guess. I’ve been pretty quiet on The Schedule for a while; part of that has been my natural tendency to fall behind on blog posts, but the other part has been this: That’s right! In case you missed it on social media or in the MAC Newsletter, I have left my position of 10 years as University Records Archivist at UWM and moved across town to become the Records Officer and Document Services Manager for

article thumbnail

“Reckless” Production, Inadequate Clawback Agreement Result in Waiver of Privilege

eDiscovery Law

Irth Sols. LLC v. Windstream Commc’ns LLC, No. 2:16-CV-219, 2017 WL 3276021 (S.D. Ohio Aug. 2, 2017). In this case, despite the existence of a clawback agreement (not an order) indicating that “[i]nadvertent production of privileged documents does not operate as a waiver of that privilege,” the court found that privilege was waived by the inadvertent but “completely reckless” production of privileged materials … twice.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

UK House of Lords Recommends Pursuit of EU Adequacy Decision

Hunton Privacy

On July 18, 2017, the European Union Committee of the UK’s House of Lords published its paper, Brexit: the EU data protection package (the “Paper”). The Paper urges the UK government to make good on its stated aim of maintaining unhindered and uninterrupted data flows between the UK and EU after Brexit, and examines the options available to ensure that this occurs.

Paper 40
article thumbnail

Bad luck for bees, and other stories.

Archives Blogs

A selection of hand-colored children’s books from the nineteenth century are available for viewing on DigiNole as part of the John MacKay Shaw Childhood in Poetry Collection. This project began as a partnership between the Rare Books Librarian and the Digital Archivist as a way to share some of the collection’s unique pieces. Because the illustrations are hand colored using watercolors, no two editions of a book will be exactly alike.

Paper 20
article thumbnail

Lisa Sotto Discusses Identity Theft Prevention on Fox TV

Hunton Privacy

On July 27, 2017, Lisa Sotto , chair of Hunton & Williams LLP’s Global Privacy and Cybersecurity practice, appeared live on Washington, DC’s Fox TV to discuss the ID theft issue involving former Dallas Cowboys player Lucky Whitehead, and to warn against the risk of identity theft. Sotto cautions that identity thieves who are determined and looking to do harm “will find [personal data].

article thumbnail

Illuminations: Highlights from Special Collections & Archives

Archives Blogs

While this blog serves as a running feature of highlights from Special Collections & Archives, our newest exhibit makes the materials we talk about online available for the public to see in person. Illuminations the exhibit features items from our manuscript and rare books collections, Heritage & University Archives , and the Claude Pepper Library.

article thumbnail

Strategic CX: A Deep Dive into Voice of the Customer Insights for Clarity

Speaker: Nicholas Zeisler, CX Strategist & Fractional CXO

The first step in a successful Customer Experience endeavor (or for that matter, any business proposition) is to find out what’s wrong. If you can’t identify it, you can’t fix it! 💡 That’s where the Voice of the Customer (VoC) comes in. Today, far too many brands do VoC simply because that’s what they think they’re supposed to do; that’s what all their competitors do.

article thumbnail

CNIL Extends Scope of Authorization on Whistleblowing Schemes

Hunton Privacy

On July 25, 2017, the French Data Protection Authority (“CNIL”) published their decision on the adoption of several amendments to its Single Authorization AU-004 regarding the processing of personal data in the context of whistleblowing schemes (the “Single Authorization”). The amendments reflect changes introduced by French law on December 9, 2016, regarding transparency, the fight against corruption and the modernization of the economy, also known as the “Sapin II Law.”.