Remove 09
Remove 2018 Remove Examples Remove Government Remove Groups Remove Security
article thumbnail

Records Inventory 101:

ARMA International

Among these management issues are insufficient documentation of official acts, incorrect use of recordkeeping technologies, poor filing systems and maintenance standards, poor management of non-record items, insufficient identification of vital records, and insufficient records security policies. Creating an Inventory Plan.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

To pick just two recent examples of the latter, the EU’s General Data Protection Regulation1 (GDPR) and the California Consumer Privacy Act2 (CCPA) both impose sweeping requirements on businesses with the aim of increasing consumers’ privacy and control over how their personal data is used. For example, in John B.

Privacy 97
article thumbnail

Cyber-Criminal espionage Operation insists on Italian Manufacturing

Security Affairs

The group behind this activity is the same we identified in the past malicious operations described in Roma225 (12/2018), Hagga (08/2019), Mana (09/2019), YAKKA (01/2020). They also stated the hypothesis of possible overlaps with the Gorgon APT group, but no clear evidence confirmed that. ’i am not a coder!