article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

Metadata resides at the center of many of the essential aspects of content management. In addition to helping organize and classify content, Metadata enables good findability, can trigger workflow and transactional processes, reveals document usage patterns and history, and helps establish retention and disposition events.

Metadata 160
article thumbnail

News Alert: Lumu announces launch of new threat hunting service to come at Black Hat USA 2023

The Last Watchdog

Lumu for Threat Hunting will assist threat hunters in the following ways: Trigger •Incidents: Provides coordinates and information from endpoints to trigger your threat hunting exercise •Playback: Lumu stores two years of metadata and compares prior metadata with new threat intelligence to defend against zero-day threats and emerging attacks •Global (..)

Metadata 100
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Pending Updates to Regulations of Archives in Colombia

AIIM

This is an exercise that demonstrates that the law is not unchangeable and that, on the contrary, it can also be subject to improvement or flexibility when the circumstances and needs of society and institutions so warrant.

Archiving 141
article thumbnail

Intelligent Information Management - Learning from CHOCOLATE?!

AIIM

One of the exercises I developed was called "The Taxonomy of Salad". on them, I'd switch that exercise out for a much sweeter one focused on developing a taxonomy of chocolate. We each had a different beverage and, in the spirit of the course, we had some interesting discussion about the metadata and taxonomy of beer and spirits.

article thumbnail

How to Keep Your Information Safe for Data Privacy Day 2020

Thales Cloud Protection & Licensing

The latter measure is especially important, as data-in-motion encryption helps shield an organization’s data, video, voice and metadata from eavesdropping, surveillance and other interception attempts. Fortunately, organizations can minimize the risk of these types of attacks by exercising key management. Key Management.

article thumbnail

EU Council Agrees on Proposed ePrivacy Regulation

Data Matters

Metadata : Not only the content of a communication but also the communication metadata (e.g., Metadata was also covered in the ePrivacy Directive (albeit “metadata” was referred to as “traffic data” in the Directive), but the current Council Draft broadens the options for electronic communications providers to process metadata.

GDPR 68
article thumbnail

EUROPE: e-Privacy Regulation – changes regarding electronic communications and digital marketing

DLA Piper Privacy Matters

On 26 July 2019, at the level of the Council, the Finnish government has issued a revised (Council) proposal for the e-Privacy Regulation with some amendments concerning electronic communication content, data & metadata, and further processing of metadata. 6 – all electronic communications data (content and metadata); Art.