Remove Communications Remove Information governance Remove Manufacturing
article thumbnail

Strategies for the Preservation and Production of Audio Recordings via Lexology

IG Guru

A large manufacturer of consumer products invests in new technology to record, store and analyze customer service calls. The company is sued regarding its consumer practices, and the plaintiffs issue document requests seeking all communications between the company and its customers regarding certain products.

article thumbnail

The Crowley Company Names Officers, Conversion Services Director

IG Guru

January 28th, 2019 In the wake of the passing of company president Christopher Crowley last month, worldwide digital scanner manufacturer and conversion services provider, The Crowley Company, names new officers and adds staff. Frederick, Md. – The Crowley Company announces […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

California Governor Signs into Law Bills Updating the CPRA and Bills Addressing the Privacy and Security of Genetic and Medical Data, Among Others

Hunton Privacy

AB-1184 : This bill amends the CMIA and California Insurance Code to require health care service plans or health insurers to accommodate requests for confidential communication of medical information regardless of whether there is a situation involving “sensitive” services ( g.

Privacy 98
article thumbnail

IG: The Whole Is More Than the Sum of Its Parts

Positively RIM

The following article appears -- in slightly different form -- as the lead contribution to a larger work on Information Governance published online by the International Legal Technology Association. Find it at [link] Written with assistance from Ronke' Ekwensi The whole is more than the sum of its parts: That’s Information Governance.

IT 40
article thumbnail

Everteam Solutions for Enhanced Cyber Security

Everteam

MITM (man-in-the-middle) attack: A man-in-the-middle (MitM) attack is when an attacker intercepts communication between two parties to secretly eavesdrop or modify traffic traveling between the two. These viruses are manufactured with great care to target computers, systems and networks. Everteam Security .

article thumbnail

Jason R. Baron of Drinker Biddle & Reath LLP: eDiscovery Trends 2018

eDiscovery Daily

Jason is a member of Drinker Biddle & Reath LLP ’s Information Governance and eDiscovery practice and co-chair of the Information Governance Initiative. The practice that I joined a few years ago at Drinker Biddle is an Information Governance and eDiscovery group. Today’s thought leader is Jason R.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Communication technologies have continued to change societies and human interaction. Inventions such as the telegraph, the wireless radio, magnetic recording, and the telephone have enabled faster and wider dissemination of information to wider audiences of business users and customers. The Genesis of Digital Transformation.