Remove tag privacy-policy
article thumbnail

Work Remotely Without Compromising Your Data

AIIM

A well-educated and well-informed workforce is one of the best defenses against security risks. IT executives are also implementing new data use policies, deploying artificial intelligence, centralizing content, and restricting unauthorized apps. Not knowing is simply no longer an option. There is too much at stake.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This discussion will include methods, tools, and techniques such as using personae and identifying use cases that have high business value, while minimizing project risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. This is a best-case scenario. Cloud-First.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Preparing for Litigation Before it Happens: eDiscovery Best Practices, Part Two

eDiscovery Daily

And as a side note, for these same reasons and several others, the most important reason being that a DMS will change metadata when documents from outside the DMS are imported into it, a DMS is also not a good eDiscovery tool. These rules and policies can cover issues such as: Security. Tom’s overview is split into seven(!)

IT 31
article thumbnail

Free Taxonomy & Folksonomy Book | ZDNet

Collaboration 2.0

If the enterprise fails to provide tools that fit their expectations, they won’t simply conform to standard practices - they’ll ignore formal processes and continue to use the tools that enable them to be successful, irrespective of potential corporate impact. Hot Topics iPhone iPad Enterprise 2.0 And they expect it now.

Paper 40
article thumbnail

'ESME': Social messaging within an enterprise SOA environment | ZDNet

Collaboration 2.0

In some ways ESME is more advanced than Twitter since it features user groups and tag clouds, enabling project based contextual messaging. Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Hot Topics iPhone iPad Enterprise 2.0

Paper 45
article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Doctors can now use mobile devices to to tag patient condition and sending, for example, xrays from Africa to India by mobile network to be checked by doctors and diagnosed. link] North American Coordinator Med-e-Tel - The International Educational and Networking Forum for eHealth, Telemedicine and Health ICT www.medetel.lu

article thumbnail

Microsoft Office Sharepoint Server: a next generation of deeper, wider content silos? | ZDNet

Collaboration 2.0

A huge industry has sprung up of vendors offering to add dod 5015 records management retention functionality, moss integration tools, archiving of content outside the Microsoft sql server 2005 format and many other ways of focusing functionality). Back in April, during the San Francisco Web 2.0 Back in April, during the San Francisco Web 2.0