article thumbnail

Transition to Electronic Government: Signs of the Time

Preservica

In the article, Daxton Stewart, a media law professor at Texas Christian University, explained the bill was “a recognition of what it’s like in the modern age and how people communicate, particularly our public officials, they have private devices and they can text on them, email on them, they might be using encrypted chat apps on them.

article thumbnail

Hello. Goodbye… Goodbye. Hello

ARMA International

Bear in mind that however this appraisal process is conducted, it’s worth structuring it in systems that are as user-friendly as possible for the lawyers and information governance staff doing the review. Electronic material needs to be encrypted and uploaded to a place where it can be securely downloaded by the onboarding firm.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Two FTC complaints that over-retention of personal data violates Section 5

Data Protection Report

Blackbaud provides data collection and maintenance software solutions for administration, fundraising, marketing, and analytics services to various charitable organizations, including healthcare, religious, and educational institutions as well as various foundations.

article thumbnail

Are Your Records Home by Curfew?

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Sorry to be the one to tell you, but “secure information” is an illusion. We protect our information, but we only create improvement, not assurance.

article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

These apps can steal user information, attempt to extort money from users, gain access to corporate networks, force users to view unwanted ads, or engage in other undesirable activity types. User education is one of the most powerful tools for preventing malicious mobile apps. How to Defend Against a Malicious Mobile App.

Phishing 105
article thumbnail

Resolving Disputes During & Post COVID

Information Governance Perspectives

This is a company that has been doing business since 2011, but it’s only been in the past few years, as a result of COVID, and there free options, that you’ve seen them saturate every business market from professional services to education. They’re everywhere. Even my five-year-old daughter has Zoom meetings.