article thumbnail

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

AIIM

Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. But one of the most important data privacy milestones on the horizon in 2018 has its roots far earlier, and has been of utmost concern to multinational organizations. is no longer sufficient.

GDPR 85
article thumbnail

Introducing the Information Governance Maturity Model (IGIM)

ARMA International

These include authoritative frameworks, standards, regulations, privacy requirements, risk tolerance, and organizational culture. Capabilities reflect what’s in place to guide information through the organization throughout the information lifecycle. Is your organization’s technology architecture mapped and rationalized?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Digitizing the credit management journey

CGI

To meet them, financial institutions must offer credit interactions that are accurate, timely, convenient, secure and confidential. . Today’s market leaders know, however, that change is unavoidable. Customer expectations are rising on a daily basis. To remain competitive, there is simply no time to lose.

article thumbnail

GDPR – The Year in Review

HL Chronicle of Data Protection

Following the one-year anniversary of the coming into effect of the GDPR, Hogan Lovells’ Privacy and Cybersecurity practice has prepared summaries of key GDPR-related developments of the past 12 months. The summaries cover regulatory guidance, enforcement actions, court proceedings, and various reports and materials.

GDPR 40
article thumbnail

ALL Data as a Service (DaaS/BDaaS) - EAs in a New Role, as DaaS Enablers

Interactive Information Management

And, you'd like this information (all of it, or lots of it) right now, in an easily consumable, visual, semantically-relevant way - to share with your community and to be automatically (or easily) ingested by your other systems or analysis tools. Secure & compliant, fast, portable, standardized if necessary, high quality.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives?