Remove 11
Remove 2015 Remove Examples Remove Information governance Remove Security
article thumbnail

The Burden of Privacy In Discovery

Data Matters

The 2015 amendments to Rule 26(b)(1), however, were meant to resolve any doubt, returning the proportionality factors to their original place as part of the very definition of what is discoverable. 19 No longer are the proportionality considerations described as separate “limitations” on an inquiry governed solely by relevance.20

Privacy 97
article thumbnail

Cloud, Intelligent Content Services, and Digital Fragility: What’s on the RIM Horizon for 2020

ARMA International

Information Governance Programs Still a Work-In-Progress. In 2015, Forrester first posed the question “Have you restructured or re-organized your RIM and/or IT programs to support an information governance strategy?” The top challenge for RIM teams in 2019 is the same worry they had in 2017 and 2015.

article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. 2018, April 11). 2015, September 21). 2015, July 7). 1] Diamant, A. million, records show.