Remove tag service-provider
article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

During this step, conduct interviews, surveys, or workshops to gain input from business, IT, and records management stakeholders. We've provided a blank table template in Figure 2 below. Will such models also be communicated to external service providers; for example, scanning service bureaus? Final Thoughts.

Metadata 163
article thumbnail

The UK and Australian Governments Are Now Monitoring Their Gov Domains on Have I Been Pwned

Troy Hunt

As this service has grown, it's become an endless source of material from which I've drawn upon for conference talks, training and indeed many of my blog posts. I've written extensively about how HIBP has grown over the years and doing so has been a cornerstone of the philosophy of how I've run the service - with maximum transparency.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FTC Releases Report on Facial Recognition Technology

Hunton Privacy

The report, which was developed after a workshop on facial recognition technology and subsequent public comments requested by the FTC, sets forth several best practices for the use of facial recognition technology. According to the report, the notice could be posted at the entrance to the store, or on or near the sign itself.

Privacy 40
article thumbnail

Day two at OSNBC 2008

ChiefTech

Here is a summary of two sessions from the afternoon: Paul Salvati, Smart Service Queensland Due to the demographic profile of Queensland's population, they need to engage with a sparse population across a large geographic area. Dheeraj Chowdhury, NSW Department of Education Dheeraj works in the department's Centre for Learning Innovation.

article thumbnail

Expanded enterprise social software vendor taxonomy

ChiefTech

This "vendor taxonomy" divides the world of enterprise social software into the following areas: Platform vendors; Social software suites; Wiki and blogging (and forum) software; White-label community services (e.g. Ning, Lithium); and Public networks (e.g. LinkedIn, Facebook). or a Web 2.0 infrastructure.

CMS 40
article thumbnail

This is the old ChiefTech blog.: Out on the SharePoint Frontier

ChiefTech

Technorati tags: CMS Watch , Microsoft SharePoint 2007 , MOSS 2007 , Gartner , Intranets at 5:42 PM View blog reactions 3comments: Alex Manchester said. Hi James, I was having a very similar conversation the other day with James Robertson at Step Two (following an intranet workshop session run by James). More on this another time.

CMS 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

So, you know what we're doing is we're providing a discount for them. Black Girls hack and other organizations are providing the platform for InfoSec professionals to teach or at least reach out to the next generation of hackers. And then this becomes an opportunity for hackers to give back to the community.