Remove Information governance Remove Mining Remove Ransomware Remove Security
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Organizations use DRM technologies and solutions to securely manage intellectual property (IP) rights and monetize the content. Introduction. Digital Rights Management (DRM). Closely associated with DAM is DRM.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. How will organizations use so-called “vaccine passports” related to employees and customers and how will organizations secure their protected health information (PHI) in response to changing health directives?

article thumbnail

What Is Our Professional Future?

Brandeis Records Manager

Like most people, I prefer to have a reasonable sense of job security, as long as my interest is engaged. When we consider that fixed, controlled records following recordkeeping principles and information governance are typical objectives in our programs, it’s not unreasonable to get a little scared by this.