article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

RT philosophy is familiar to the cyber security community, which employs penetration (pen) testing and white hat, self-hacking activities. However, RT has applications across the IG spectrum, beyond info security. Devil’s advocates have long been paired with RT exercises. We have cyber security in place.

article thumbnail

JPMorgan’s $200 Million in Fines Ups the Ante for Recordkeeping Violations

AIIM

Late last year, the Securities and Exchange Commission announced that J.P. Morgan Securities LLC had agreed to pay $125 million to help settle charges of “widespread and longstanding failures by the firm and its employees to maintain and preserve written communications” over the course of several years.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Legislature Passes Bill to Establish the Genetic Information Privacy Act, Pending Governor’s Signature

Hunton Privacy

Not disclosing, subject to specified exceptions, a consumer’s genetic data to certain entities ( e.g. , those responsible for making decisions regarding health insurance, life insurance or employment). Department of Health and Human Services pursuant to HIPAA and the HITECH Act.

Privacy 85
article thumbnail

6 Motivators Every Job Seeker Must Consider

Information Governance Perspectives

So, before you walk a virtual mile in the shoes of innovative business leaders profiled in a book like Tomorrow’s Jobs Today , practice this simple exercise first. The security that comes with the job. Yet too many folks never carve out even five minutes to thoughtfully examine what drives them. The money you hope to earn.

article thumbnail

The Business Value of Enterprise Content Management (ECM) Solutions

AIIM

Information Governance: Many companies decide to adopt an ECM solution, but they forget that ECM is an information management solution. Information needs to be organized properly to facilitate its location and usage. Make ECM part of the corporate information governance strategy.

ECM 85
article thumbnail

Spotlight On: BCS Practitioner Certificate in Data Protection  

Managing Your Information

Compliance professionals including those working in Information Governance and Information Assurance . IT Security and IT managers, Chief Information Security Officers . Solicitors advising on information law . The course is suitable for: . Data Protection Officers . Human Resource managers .

GDPR 36
article thumbnail

Hello. Goodbye… Goodbye. Hello

ARMA International

The former cohort will have found that they’re now practicing at a time when talent is well recognized and remunerated, firms are jostling to secure the best people, and there are lots of attractive opportunities to move firms. So, caution should be exercised. It will also sometimes be the case that materials should be copied.