Remove links-resources
article thumbnail

Red Teaming Your Information Governance Program

Brandeis Records Manager

RT philosophy is familiar to the cyber security community, which employs penetration (pen) testing and white hat, self-hacking activities. However, RT has applications across the IG spectrum, beyond info security. The solutions depend upon our resources, and I’ll assume that most of us don’t have much.

article thumbnail

The Business Value of Enterprise Content Management (ECM) Solutions

AIIM

Information Governance: Many companies decide to adopt an ECM solution, but they forget that ECM is an information management solution. Information needs to be organized properly to facilitate its location and usage. Make ECM part of the corporate information governance strategy.

ECM 85
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to implement data governance

Collibra

Prioritize: Establish tier 1 critical KPIs or use cases to prioritize data, resources, calculations and scope. Link: Ingest system metadata and link it to the business terms and KPI’s. If you need a cost justification exercise, it should be done outside of the strategy so as not to delay the development of the strategy.

article thumbnail

Join Our Webinar on November 16th: IGI & Preservica Address the Governance of Long-Term Digital Information

IGI

Please join the IGI and Preservica on November 16th at 11am ET for a webinar addressing The Governance & Preservation of Long-Term Digital Information. Barclay Blair, Founder and Executive Director, Information Governance Initiative (IGI). CLICK HERE TO REGISTER. Michael Hope, Director of Global Marketing, Preservica.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

4 The Federal Rules of Civil Procedure have begun — since their inception — with a guiding command for courts to seek “to secure the just, speedy, and inexpensive determination of every action and proceeding.”5 social security and credit card numbers, employee and patient health data, and customer financial records).”43

Privacy 97