Monday, July 13, 2020
Home 2019 March

Monthly Archives: March 2019

Getting to Know California’s Privacy Law Requirements

Ken Lynch - Reciprocity Labs The rise in technology has increased the risks of data breaches in organizations...

How is tape backup doing in 2019?

Industry experts say tape isn't going away and the technology is actually improving. The problem, they say, is vendors aren't talking enough about this 'old-school' backup method.

You’ll Never See Privacy in The Same Way Again

MER CONFERENCE 2019 | MAY 20-22 Dr. Kosinski will forever change how...

MySpace admits losing 12 years’ worth of music uploads

By Zoe KleinmanTechnology reporter, BBC News  18 March 2019Technology MySpace, one of the first online social...

Keeping Kids Safe Online

Message from the Editor: Keeping kids safe is a parents and communities job. Chris Roberts, a world-renowned cyber security professional,...

In-house and Outsourced Archives Digitization

Digitization can be performed either in-house or outsourced. In-house implies that a department of the institution captures the images—supplying hardware and software, trained personnel,...

NAID Publishes Second-hand Device Study Principles

It’s been twenty years since Dr. Simpson Garfunkel conducted the first study analyzing the extent to which personal information remained on second-hand...

Webinar Today! – GDPR and its Impact on Info Management & Governance

It’s no secret. Between GDPR in Europe, LGPD in Brazil, and the new privacy acts in California and Colorado,...

RSA Conference 2019: What You Need to Know by Dan Lohrmann

The 2019 version of RSA Conference in San Francisco has come and gone. Here are some of the product and session highlights, major themes and excellent resources to dig deeper into myriad cybersecurity and technology topics.

Winning Tactics for Becoming a Certified Records Manager (CRM)

So you want to become a Certified Records Manager (CRM)? For those of us in Records and Information Management (RIM), becoming a Certified...

Talking Shop with Tejoury

Salman Alsudeary discusses his business and the unique RIM market in the Middle East.

The sun may be setting on the old privacy rulebook

by David McCabe via Axios Privacy policies have been the standard approach to online privacy for the entire existence...

Intellectual Property: A Funny Thing Happened When Seeking the Truth about an Altered...

by Robin Thompson I had a unique experience involving my love of information and documents that I want to share...

Book Review: Information Governance for Healthcare Professionals: A Practical Approach

Robert Smallwood’s latest book on Information Governance is part of the HIMSS book series.  The book is titled: Information Governance for Healthcare Professionals: A Practical...

CISO: The C-Level executive missing from your board

By a CyberFeminist Hacker, currently Regional Business Information Security Officer

Cloud Danger

February 25, 2019 There is much talk, hype, promise and motion around companies moving into the cloud. From pulling...

OSI Model for beginners…

by Chris Roberts Thought it was time to update this based on the number of folks coming into the...

Selection for Digitization – Best Practices

The development of selection policies is a core component of digital projects, and many selection guidelines and criteria have been developed by institutions, national...

Results of the Partial Federal Government Shutdown Survey on Archives and Records Management Operations

2/22/2019 1:00 PM (Washington, D.C.) – On February 12, 2019, the National Association of Government Archives and Records Administrators...

45 years and so many more to come – This Year’s Anniversary blog my...

This is a rendering my daughter made for me of what I...