Remove 2018 Remove Computer and Electronics Remove Meeting Remove Risk
article thumbnail

FERC Approves NERC’s Supply Chain Risk Management Reliability Standards and Directs NERC to Expand Their Scope

Data Matters

FERC also used the rule to direct NERC to expand scope of the Reliability Standards so that they covered Electronic Access Control and Monitoring Systems (“EACMS”) associated with medium and high impact bulk electric system (“BES”) Cyber Systems. FERC’s final rule, issued on October 18, 2018, closely follows its proposed rulemaking.

Risk 66
article thumbnail

What IG Professionals Should Know About the Internet of Bodies

ARMA International

Another common name for the IoB is embodied computing , where the human body is used as a technology platform. Benefits and Risks. Each type of IoB device brings with it benefits and risks. Wearable technology began as any kind of electronic device designed to be worn on the user’s body. These devices can take many forms.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This means imaging the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

AI, Records, and Accountability

ARMA International

The risks and harms posed by AI will have to be addressed at a societal level and at an organizational level. Records management should have a role in addressing some of the risks posed by AI given its mission of creating reliable records and its ethical core value of promoting accountability. Definitions of AI.

article thumbnail

Finding the treasure in governement information management

CILIP

Do they have different tolerances to information management risk? Sharepoint came in 2018 and we could give named individuals in that third party company access to a particular area of our Sharepoint where we transferred the material due for the Public Inquiry. Who has the regulatory responsibility? Who answers the FOI requests?

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This means imagining the “art of the possible” for a new future using a cloud computing model to deliver transformative change. Part 3 will discuss how to manage the various DT risks. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption.

article thumbnail

2017 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

But first, it’s also worth noting that Tom O’Connor and I will be discussing some of these cases – and what the legal profession can learn from those rulings – on Thursday’s webcast Important eDiscovery Case Law Decisions of 2017 and Their Impact on 2018 at noon CT (1pm ET, 10am PT). DISCOVERY ON DISCOVERY. Cummins, Inc. Give me my metadata!