Remove tag health-information
Remove Education Remove Government Remove Industry Remove Manufacturing
article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Two

eDiscovery Daily

Tom has also written several terrific informational overview series for CloudNine, including eDiscovery and the GDPR: Ready or Not, Here it Comes (which we covered as a webcast ), Understanding eDiscovery in Criminal Cases (which we also covered as a webcast ), ALSP – Not Just Your Daddy’s LPO , Why Is TAR Like a Bag of M&M’s?

IT 31
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Now information technologies and the information revolution are again transforming society. Part 2 will discuss the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Week in Cyber Security and Data Privacy: 26 February – 3 March 2024

IT Governance

At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. Data apparently includes users’ full names, phone numbers, addresses, email addresses and partial payment card information. Data breached: 21,100,000 records.

article thumbnail

The Hacker Mind Podcast: Surviving Stalkerware

ForAllSecure

What role might the security industry have in identifying or even stopping it? The Federal Trade Commission in the United States, banned an app called SpyPhone, and its CEO Scott Zuckerman, from operating in the surveillance industry. What role does technology play in facilitating intimate partner abuse?