Remove Exercises Remove Information governance Remove Records Management Remove Security
article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

Program Director for University Records Management, Brandeis University. RT philosophy is familiar to the cyber security community, which employs penetration (pen) testing and white hat, self-hacking activities. However, RT has applications across the IG spectrum, beyond info security. We have cyber security in place.

article thumbnail

JPMorgan’s $200 Million in Fines Ups the Ante for Recordkeeping Violations

AIIM

Late last year, the Securities and Exchange Commission announced that J.P. Morgan Securities LLC had agreed to pay $125 million to help settle charges of “widespread and longstanding failures by the firm and its employees to maintain and preserve written communications” over the course of several years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Strategic, the Tactical, and Agile Records Management

Brandeis Records Manager

Program Director for University Records Management, Brandeis University. Goals over objectives over actions is a necessary exercise for anyone serious about developing a program-level endeavor. Rather, a proportion of tactical, opportunistic, and real-time point solutions must be a part of any result-oriented records program.

article thumbnail

OMB Updates Federal Information Management Policies

Hunton Privacy

In its press release announcing the revised document, OMB noted that “as government continues to digitize, we must ensure we manage data not only to keep it secure, but also [to] allow us to harness this information to provide the best possible service to our citizens.”

Privacy 45
article thumbnail

GDPR Compliance Obligations: The relationship between Data Controllers and Third-Party Processors

AIIM

Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. Third party processor agreements need to be reviewed in the context of GDPR compliance obligations, particularly, compliance accountability, data transfer provisions and data security requirements. Want more information?

GDPR 83
article thumbnail

Guest Post - Three Critical Steps for GDPR Compliance

AIIM

You might also be interested in: Mitigate Data Privacy and Security Risks with Machine Learning. The Privacy and Security Dichotomy. Article 30 of the GDPR requires data controllers and processors to maintain a record of processing activities. This is the eighth post in a series on privacy by Andrew Pery.

GDPR 83
article thumbnail

The Power of the Record

Brandeis Records Manager

Program Director for University Records Management, Brandeis University. And there is power in the record that can be promoted more aggressively. This may be an exercise in preaching to the RM/IG choir, but here goes…. Records and Records Management Needs Are Everywhere. George Despres, CRM.