article thumbnail

Information Governance Pressure Points – 3 Common Areas of Failure

AIIM

62% of organizations have essentially given up on the ROT problem, relegating it to manual approaches or simply keeping everything. Can’t make the live event? Key Stats on Information “end points”. Only 40% have automated processes to ensure the deletion of personal information. Data breaches and other risks of governance gaps.

article thumbnail

Tips for Folder Structure Design and Cleanup

The Texas Record

Disposition Dispose of the ROT—redundant, obsolete, trivial—items before creating a new file structure. Maybe it means making a trigger event date part of the folder name. They will still need to learn the new structure within a set period. Train new employees about the file structure and how they are managed.

Cleanup 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How Organizations Are Preparing for GDPR

Gimmal

The Chief Privacy Officer of a specialty chemicals company states: "It’s a long game, not a one-time big event. Consumer-centric companies are (rightfully) anticipating that they will receive greater scrutiny in the first months after implementation, while other organizations believe they have more time to focus on doing it right.

GDPR 58
article thumbnail

Free Webinar— Information Governance Plans Stalling? 5 Things You Need this Wednesday

IG Guru

Join us for this informative webinar on Wednesday, October 23, 2019 2:00-2:45 pm EDT (GMT-4) 1 pm CDT; 12 pm MDT; 11 am PDT 7 pm British Time (GMT+1); 8 pm Central Europe Time (GMT +2) *If you’re unable to attend the live event, register and we will send you the replay shortly after the […].

article thumbnail

URLs Aren’t Archives ¯_(?)_/¯, and Other Stories

The Schedule

Those of us in academic and legal environments have been dealing with link and citation rot for ages. What would happen to your work in the event of bankruptcy or a change in ownership? I do not in any way wish to devalue the anxiety that journalists or their readership must feel when the URLs to their articles are moved or deleted.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

The cloud enabled computing model allows the organization to scale up during peak periods such as new product launches and holiday shopping, and then scale down after the event. Much of the content will never be accessed, yet the cost to manage ROT content will continue to increase. Intelligent Capture.

article thumbnail

HSMs: Facilitating Key Management in a Hybrid Cloud Environment

Thales Cloud Protection & Licensing

Within a cryptographic system that uses asymmetric cryptography, there is typically a Root of Trust (ROT) that can generally be trusted. ROT is most often protected by a hardened hardware module like an HSM. Root of Trust. Not all systems are created equally, so this trust isn’t predetermined.)

Cloud 144