Tag: Information Governance
Kevin Parker, #InfoGov18 Speaker Interview Series
We’re pleased to bring you a series of interviews with some of the presenters at The Information Governance Conference 2018. The Information Governance Conference...
Morgan Templar, #InfoGov18 Speaker Interview Series
We’re pleased to bring you a series of interviews with some of the presenters at The Information Governance Conference 2018. The Information Governance Conference is...
The Information Governance Conference Announces 2018 Keynote Speaker
Drones and related technologies continue to tangle up courtrooms - with implications on downstream information, autonomous vehicles, manufacturing, healthcare, and so much more.
That's why we're...
Artificial Intelligence for Records Management
Friday, June 15, 2018 - 11:12
By Anthony Woodward
Automation is the best way to address the major challenges of records management today. But what is...
5 keys to innovating without sacrificing privacy, security or compliance
By
Heidi Maher
Published
May 29 2018, 6:30am EDT
In the wake of the Facebook data compromise debacle, every company that wants to innovate needs to challenge the...
Strategic Planning Meeting Produces New Vision and Mission for ARMA
April 16, 2018
The professions of information management and information governance continue to evolve to meet the needs of a business environment where information is...
Towns scramble to keep sensitive data from online records
By Julia Perkins
Published 12:00Â am, Sunday, March 25, 2018
BROOKFIELD — When town officials posted thousands of municipal records online years ago, they thought they were...
Approaches to managing social media records with long-term retention periods
January 29, 2018
Government use of social media are many and varied, but in total, it is used to communicate and to engage the community regarding...
ARMA makes first installment of IGBOK available to members for free.
Developed through a collaboration of ARMA volunteers and leading Information Management (IM) and Information Governance (IG) experts, IGBOK: The Foundation is the first component of the full IGBOK, which is to be published this spring. IGBOK will be the first comprehensive reference of IM and IG best practices, giving more authority to these professions and our professionals.
The Privacy Fight Is Dead In DC, And Not Even The...
Despite Republican concerns that the FBI misused the Foreign Intelligence Surveillance Act to gain a warrant to monitor Carter Page, Congress renewed the act less than a month ago.
The Boards Role in Managing Cybersecurity Risks
Cybersecurity can no longer be the concern of just the IT department. Within organizations, it needs to be everyone’s business — including the board’s.
AHIMA Launches IGHealthRateâ„¢ for Healthcare Organizations to Measure their IG Maturity
Use IGHealthRateâ„¢, an industry best practice tool for assessing information governance (IG) maturity within your organization and benchmark against others. IGHealthRateâ„¢ assists in your...
Search Every Data Breach Since 2005
Sometimes it is difficult to make a case for protecting information. Despite the number of breaches that have occurred some still feel a breach couldn't...
InfoGovCon: What is Information Governance?
Information Governance is the overarching strategy and tactics that connects together all of the diverse disciplines that leverage organizational information. Information Governance is the bridge between Records Management and Data Science, between Process and Policy, between collaboration and security. Information Governance is the umbrella that covers all organizational information. Information Governance balances the value of information with the risk that information poses; it determines the people, the resources, the processes, the functions, the organization, and the technology requirements of organizational information.
Jon Taffer to Keynote NAID 2018 Conference
While his background is in hospitality,
his science of business success can be
applied to any industry, including secure
data destruction. NAID welcomes Taffer
as the keynote speaker for the NAID 2018
Conference & Expo.
ARMA Announces New Website and New Perspective
Source:Â http://www.arma.org/?page=Perspective#
By Jocelyn Gunter on December 18, 2017
Since starting at ARMA in 2013, I have experienced, along with many practitioners, a bit of confusion...
LTO-8: JUST THE FACTS, MA’AM
Source:Â http://www.drunkendata.com/?p=5332
by John Toigo on NOVEMBER 9, 2017
With so many pre-announcements of LTO-8 tape technologies and products crossing the transom, some of the actual LTO-8 standard specifications...
Cybersecurity Leadership Book for Professionals
Are you looking for a quality read to introduce you to information security? Look no further than Dr. Mansur Hasib and his book Cybersecurity...
State Department will release 2,800 of Huma Abedin’s work documents –...
by Peter Kurilecz
The State Department is set to release portions of 2,800 of Hillary Clinton
aide Huma Abedin's work-related emails and other documents, all recovered
last...
Library Of Congress Announces It Will Be Selective In Which Tweets...
by Peter Kurilecz
Since 2010, the Library of Congress has been collecting every single tweet
published on Twitter. The idea was to create a comprehensive public...
Risk mitigation followup: positive incentives for records creation/retention
by Maarja Krusten
Good morning from Washington, DC! In my last post here (December 23,
2017), I mentioned the challenge of finding positive incentives (beyond
legal...
NISO to Manage U.S. Group Dedicated to Document Description and Processing...
*Baltimore, MD - January 04, 2018 -* The National Information Standards
Organization (NISO) has been accredited by the American National Standards
Institute (ANSI) to take over...
Data Breaches are Records Management Problems
https://nextgenrm.com/2018/01/02/data-breaches-are-records-management-problems/
Posted on January 2, 2018 by Don Lueders
As I’ve said here many times, records managers have always provided the same vital service: we manage recorded information –...
Critical flaws revealed to affect most Intel chips since 1995
Most Intel processors and some ARM chips are confirmed to be vulnerable, putting billions of devices at risk of attacks. One of the security researchers said the bugs are "going to haunt us for years."