article thumbnail

ESI, ROT, and LBJ – Thoughts on Data Management While Visiting the Lyndon Johnson Presidential Library: eDiscovery Trends

eDiscovery Daily

Which made me think of the state of data creation, management, storage, and security in the corporate world today. In 2016, a study by Veritas found that as much as 85% of ESI is Redundant, Obsolete, or Trivial (ROT). most of it ROT. How does your organization keep ROT at bay? So, what do you think?

ROT 34
article thumbnail

Preserving your information from digital disasters

Preservica

Digital disasters of systems are increasingly common due to a number of factors including human error, computer job error, natural and manmade disasters, cybercrime, bit rot, and file format obsolescence. Here are examples of how disk rot, a natural disaster, and data breaches can cause monumental losses. Yes, when, not if.

ROT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Learn Competitive Hacking with picoCTF

ForAllSecure

PPP wanted to give their past high school selves the infosec education they didn’t have. And if you're going for a certification like CISSP Computer Information Systems Security Professional, you'll need to have a breadth of experience across multiple domains. For example, when learning a new subject area.

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Those of us in academic and legal environments have been dealing with link and citation rot for ages. Importantly, modern institutional archives do not make it a practice of taking things, or blindly capturing online records, without first attempting to secure the rights to do so. Journalists are not alone. A Question of Vocabulary.

article thumbnail

Does Your Content Drive Organizational Value?

AIIM

If you’ve been paying attention to the research we conduct and the educational information we share, you know that AIIM describes Intelligent Information Management (IIM) as all the things you want to do with, or get from, your organization’s information. Growing Privacy and Security Concerns. Growing Privacy and Security Concerns.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Organizations use DRM technologies and solutions to securely manage intellectual property (IP) rights and monetize the content. DRM helps ensure the secure and trusted exchange of content between a seller and a buyer and ensures that only the buyer is granted the privileges allowed by the seller. Digital Rights Management (DRM).

article thumbnail

Our Data Governance Is Broken. Let’s Reinvent It.

John Battelle's Searchblog

Most of my career has been spent evangelizing the power of technology to positively transform business, education, and politics. Imagine a scenario where you can securely share your Amazon purchase data with Walmart, and receive significant economic value for doing so (I’ve written this idea up at length here ).