Remove 2009 Remove Document Remove Government Remove Presentation Remove Security
article thumbnail

Guest Post - How important is digital document consistency?

AIIM

A repository containing documents that were digitized inconsistently or inaccurately presents a new set of problems for an organization, problems that can hinder the productivity gains they had hoped to achieve. Obviously digital document accuracy is particularly important for government and regulated industries.

article thumbnail

Russian Cybersecurity Executive Arrested for Alleged Role in 2012 Megahacks

Krebs on Security

Nikita Kislitsin , formerly the head of network security for one of Russia’s top cybersecurity firms, was arrested last week in Kazakhstan in response to 10-year-old hacking charges from the U.S. Nikita Kislitsin, at a security conference in Russia. Department of Justice.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

German Government Moves on Draft Law Regarding Employee Data Protection

Hunton Privacy

On August 25, 2010, the German government approved a draft law concerning special rules for employee data protection, originally proposed by the Federal Ministry of the Interior. Employers must document the circumstances of the screening, and inform the relevant employee after the screening. CCTV : Covert monitoring is prohibited.

article thumbnail

Centre Hosts “Accountability on the Ground” Workshop at IAPP Privacy Academy

Hunton Privacy

The workshop, which featured presentations by Centre member companies, discussed in-depth examples of how organizations can implement an accountability program. In addition, the article reviews the essential elements of accountability articulated last year in the discussion document, “ Data Protection Accountability: The Essential Elements.”

Privacy 40
article thumbnail

GE's Enterprise Collaboration Backbone | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0

Paper 88
article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. Organizations use DRM technologies and solutions to securely manage intellectual property (IP) rights and monetize the content.

article thumbnail

Humanitarian Collaboration | ZDNet

Collaboration 2.0

Google unplugs Windows Google decides that a security invasion from China was the last straw and bans the use of. Windows 7 Microsofts Windows 7 arrived in late 2009 and kicked off a PC upgrade cycle thats expected to. Hot Topics iPhone iPad Enterprise 2.0 Microsoft Office Green tech Smart phones Collaboration 2.0