Remove Authentication Remove Information governance Remove Libraries
article thumbnail

e-Records 2017: “Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365”

The Texas Record

Information Governance: Take Control and Succeed. The Public Information Act and Updates from the 85th Legislative Session. Establishing Information Governance for Local Governments in Microsoft SharePoint and Office 365. Involve your stakeholders in your Information Governance Plan.

article thumbnail

LibSSH Flaw Allows Hackers to Take Over Servers Without Password

IG Guru

October 16, 2018Mohit Kumar A four-year-old severe vulnerability has been discovered in the Secure Shell (SSH) implementation library known as Libssh that could allow anyone to completely bypass authentication and gain unfettered administrative control over a vulnerable server without requiring a password.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Information Management Umbrella

Brandeis Records Manager

Your industry may dictate your relationship with your library people, if you even have a relationship with them. In academia, records management tends (not exclusively) to be grouped organizationally with library and archival units. In one sense, we are the Charlie Brown of an academic library department.

article thumbnail

Get Governed by Morgan Templar (A Review)

Information is Currency

The book “ Get Governed: Building World Class Data Governance Programs ” by Morgan Templar is an excellent book for any information professional to read. In the world of information governance, data governance is only a small slice of the pie.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

For example, organizations can re-package video libraries, songs, research, and course material for different audiences – customers, researchers, academics, students, and so on; and they can monetize the content via CaaS. Blockchain, Provenance, and Authentic Information. One use case is supply chains.

article thumbnail

RIM in the Cloud -- segmented

Positively RIM

It is not a panacea, but it is a powerful tool for information governance. The principles of Records and Information Management (RIM), however, are always the same. This principle assures users that records are what they say they are: authentic, original documents that have not been altered.

Cloud 40
article thumbnail

Preservica makes it easier for organizations to meet long-term GDPR obligations

Preservica

Security: Security of processing is enhanced with the addition of two-factor authentication to prevent unauthorized disclosure or access to personal data (Article 32). Preservica will be presenting on the need to meet long-term GDPR obligations at major information governance conferences in May.

GDPR 40