2015

The (discrete) search for the new Information Commissioner

Data Protector

The (discrete) search to appoint a successor to David Smith, soon-to-retire Deputy Information Commissioner and Director of Data Protection is over. Shortly, the successful candidate will be unveiled. Don't worry, it’s not me.

The Myth of Valley DoucheBaggery

John Battelle's Searchblog

The post The Myth of Valley DoucheBaggery appeared first on John Battelle's Search Blog. Warning, loads of unabashed cursing ahead). Everyone’s definition of what makes a person or a company “douchey” varies, but we all know ’em when we see them.

We Need a New FUD

ShackF00

One of the most common questions I hear debated in infosec (usually rhetorical) is – “what will it take for management to realize how important security is?”

Thoughts on DB2 for z/OS Index Compression

Robert's Db2

Not long ago, a DB2 for z/OS DBA requested of me some guidance in planning for his organization's initial use of index compression (a capability introduced with DB2 9 for z/OS). He asked some good questions, and with the thought that my responses might be useful to others in the DB2 community, I offer this blog entry. First, strive to get good "bang" from your index compression "buck."

Community Channel’s Natalie Tran on Password Policy

Roger's Information Security

The post Community Channel’s Natalie Tran on Password Policy appeared first on Roger's Information Security Blog. General Passwords

Living and learning with a Yuneec Typhoon Q500 4k drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k

83

Snapshot: College and University Retention Schedules

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.).

More Trending

How did we do on the Chief Information Governance Officer (CIGO) Summit?

Barclay T Blair

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

That's where we're headed, inexorably - you'd like to know what's going on with your systems, what your customers or constituents need, or perhaps the latest metrics concerning device utilization trends during business events.

The Most Dangerous Case of Over-Retention

Positively RIM

10Jul2015 Today the United States Office of Personnel Management revealed that its data breach affected tens of millions of individuals. The OPM’s Director resigned. The stolen data included personal information about: Current government workers Former government workers Relatives and associates of current and former government workers The OPM had information about the last group because they investigated people close to government workers who requested security clearances.

In praise of David Smith

Data Protector

As Deputy Commissioner David Smith completes his last lap of the data protection conference circuit, various speakers are extending their hastily-prepared remarks to include a short homily on his contribution to data protection over the decades. Yes, he really has been at the ICO for decades.

Branch Deepviews: Routing Around The Damage of Apps and App Stores

John Battelle's Searchblog

The post Branch Deepviews: Routing Around The Damage of Apps and App Stores appeared first on John Battelle's Search Blog. But it’s also the year a better one will be born. 2015 is the year the old internet finally died [link]. John Battelle (@johnbattelle) August 7, 2015.

Tips 114

Do CISOs Dream of Electric Boardrooms?

ShackF00

This, believe it or not, is a “year end” post above all, with food for thought going into 2016. So here goes. CISOs are an in-demand bunch. Well, that’s what the media tells us, anyway.

Tips 57

DB2 for z/OS: Busting a Myth About Dynamic SQL

Robert's Db2

Twice in the past month, I've encountered a misunderstanding pertaining to dynamic SQL statements issued by applications that access DB2 for z/OS via network connections (these could also be called DDF-using applications, or DRDA requesters). Now seems as good a time as any to clear things up. I'll use this blog entry for that purpose.

Blog 70

“Honing in on the Relevant Stuff” | Jinfo (formerly FreePint) Reviews Attensa

Attensa

Dale Moore is a UK-based content specialist and contributing author at Jinfo. Jinfo research is at the heart of the business information industry. Every day they work with information pros who are reimagining information services. Their focus is on aligning information services with corporate strategy and initiatives. The following is a summary of Dale’s comprehensive review of Attensa.

Living and learning with a Yuneec Typhoon Q500 drone

Collaboration 2.0

My newbie experiences overcoming overhead nerves while flying, filming and breaking blades with the Typhoon Q500 4k. Reviews

83

Polar Opposites: The CRM Exams and Vendor Product Language

Brandeis Records Manager

George Despres. Program Director for University Records Management, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Two Cents on the CRM Experience. I’ve recently made the time (belatedly) to take the CRM exams. While CRM had been slipping on my to-do list for almost ten years, I’ve been busy doing RIM, though admittedly under a bit of an “impostor” self-image.

Introducing AIIM: The Global Community of Information Professionals

JKevinParker

It is no secret that I love AIIM International. I owe a lot to AIIM for my professional development, industry knowledge, and the wonderful network within our industry. I only wish I had learned about AIIM much sooner than I did!

ECM 52

Was This The Phone Call With IT When Hillary Clinton Refused an Official Email Account?

Barclay T Blair

Interesting times the past couple of day, with revelations that Hillary Clinton exclusively used a personal email account and also a private email server in her home to conduct business while she was Secretary of State. Illegal? Election politics? Bad practice? Why was it necessary ?

Sales 52

HIPAA Breach: Who You Gonna Call?

HIPAA

Everyone knows that you call a plumber for a leaking pipe, a mason for a cracked stonewall, and an electrician to fix faulty wiring. However, when faced with an actual or suspected HIPAA data breach, many folks struggle with determining whom to call. Failure to have contacts lined up ahead of time may pose more than an inconvenience–any delay in bringing in experienced advisors to assist with breach investigation, response and mitigation may result in significant financial and legal consequences.

Information Governance in 2020

Positively RIM

Gentle readers: My thoughts on this subject were just published in the Fall issue of The Ethical Boardroom. Here is a link: [link] As always, your feedback, kudos, and brickbats are welcome. Thanks for your interest, Gordy

Not a lot of news from Big Brother Watch today

Data Protector

What are we to make of today’s Big Brother Watch report which claims that local authorities commit 4 data breaches every day? In the words of TV magician Paul Daniels: “Not a lot.” At first glance, it looks impressive. It’s almost 200 pages long.

Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks)

John Battelle's Searchblog

The post Scaling Through Culture: WeWork and Blue Bottle (vs. Regus and Starbucks) appeared first on John Battelle's Search Blog. The way we work is changing.

Tips 114

Updated – Publishing CCTV Images – Don’t Be Tempted!

Managing Your Information

With the recent publicity surrounding Virgin Trains, empty seats and Jeremy Corbyn , it would seem that organisations remain unaware of the data protection implications when using CCTV images.

Are You Using DB2 for z/OS Real-Time Statistics? DB2 Is

Robert's Db2

DB2 for z/OS is making increased use of the information that it keeps in the real-time statistics tables in the DB2 catalog. You should be doing likewise. Read on to learn more. For a long time, the only statistics to be found in DB2 "system" tables were those generated through execution of the RUNSTATS utility.

Blog 65

Information Sharing is the Grease in Workplace Collaboration

Attensa

We’ve written a new Point of View on how the smart delivery of highly relevant information can stimulate new ideas, accelerate projects and move them into new productive directions. You can download it here. Workplace collaboration continues to be an important theme these days but there’s a significant omission in how many observers approach and discuss the topic – the role of relevant information as the spark that lights the fire of meaningful collaboration.

'Digital washing' can wreck your strategic business planning

Collaboration 2.0

France''s 1930''s Maginot Line failure may seem an odd analogy, but ''digital washing'' of old ideas and lack of forward thinking also have the potential to create strategic disaster in a highly competitive world where speed to market and agility are key. Enterprise Software

“The Life-Changing Magic of Tidying Up.” Our Turf?

Brandeis Records Manager

George Despres. University Records Manager, Brandeis University. The content in this blog reflects the opinions of the author, and not of Brandeis University.). Last fall, The Life-Changing Magic of Tidying Up: The Japanese Art of Decluttering and Organizing , by Marie Kondo, was released in the United States. This book passed under my radar until a kind colleague pointed out that, in one chapter, Kondo dispenses personal record retention and categorization guidance.

FOIA 44

Your Password Is 12345? Password FAIL

JKevinParker

It's hard to fathom why people don't get that 12345, 123456, and other similarly stupid passwords make their own information and their organization's info much less secure. But many people don't get it. Dark Helmet from SPACEBALLS warned you a long time ago: "12345?

A Eulogy for my Grandfather

Barclay T Blair

Over the holiday season while were visiting family in Alberta, Canada, my 92-year-old grandfather – who had been healthy and active his whole life – passed away. He went quickly and surrounded by his family, and I was honored to be there with my family and to participate in his funeral.

Can I Be Sued for a HIPAA Violation?

HIPAA

I am asked that question almost weekly. While the answer has traditionally been “no,” the legal landscape is shifting and the risk of being sued continues to increase. Let’s first start with some background. As some of you may know, HIPAA does not include a “private right of action.” This means that an individual may not file a claim against a covered entity or a business associate in order to enforce HIPAA or seek damages in response to a HIPAA violation.

Article on Document-Level Redaction of Electronic Documents

Positively RIM

On June 30 online , KM World published an article I wrote on Document-Level Redaction of Electronic Documents. While this is not everyone's cup of tea, it is an important tool for many RIMmers. [As As it has fallen out of use a bit, I remind my gentle readers that RIM is an acronym for Records & Information Management.] The article can be found at [link]. As always, your comments are valued. Thanks for reading

How effective is the Telephone Preference Service?

Data Protector

I don't know, either. The TPS’s website provides individuals with an easy way to register their objection to receiving unsolicited direct marketing calls, but no information on how effective it is at stamping out these practices.

Trends 156

Uber, The Rashomon.

John Battelle's Searchblog

The post Uber, The Rashomon. appeared first on John Battelle's Search Blog. Our industry loves a rashomon, and in the past year or two, our collective subject of debate has been Uber.

What Should Businesses Do With Their Existing Paper Records?

Shoreline Records Management

Now that the panic has subsided from the Brooklyn CitiStorage document warehouse fire (even though it shouldn’t) everyone is back in the out of sight, out of mind thinking as it relates to records management. Businesses need to consider what steps to take to create efficiency with their unique records process, and prevent a crisis like this from happening again. Documents in storage should be there only for retention purposes.

Paper 25

For a Large DB2 for z/OS Table, Should You Go With Partition-by-Range or Partition-by-Growth?

Robert's Db2

There are several aspects to this question: What do I mean by "large?" Is the table in question new, or does it exist already? What is the nature of the data in the table, and how will that data be accessed and maintained? I'll try to cover these various angles in this blog entry, and I hope that you will find the information provided to be useful. What is a "large" table? Why even ask this question?

vsftpd-3.0.3 released. and the horrors of FTP over SSL

Scary Beasts Security

I just released vsftpd-3.0.3, as noted on the vsftpd home page. It's actually been almost three years(!) since vsftpd-3.0.2, so things do seem to be getting very stable and calming down. The exception to things getting very stable and calming down seems to be SSL over FTP, which has been a constant source of, uh, joy, for some time now. Some issues fixed relate to security and warrant describing here because I think they are interesting.