March, 2017

article thumbnail

View From AIIM17: New Blood or Fresh Meat?

Weissman's World

Like so many others, I have lots of nice things to say about last week’s AIIM17 conference in Orlando, FL. Energy levels were high, sessions were engaging, exhibitors seemed happy, and a good time was had by all. However, rather than write yet another trip report on the subject (links to some are listed below), […]. The post View From AIIM17: New Blood or Fresh Meat?

ECM 159
article thumbnail

Will the latest marketing and consent guidance result in a financial shortfall for charities?

Data Protector

Concern has been mounting that the attitude the Information Commissioner’s Office is currently taking towards charities will result in it becoming even harder to raise funds from supporters and potential supporters. New guidance about how charities should obtain consent to contact supporters, and how this consent should be used, has recently been published by both the ICO and the Fundraising Regulator.

Marketing 120
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CNIL Publishes Six Step Methodology and Tools to Prepare for GDPR

Hunton Privacy

On March 15, 2017, the French data protection authority (the “CNIL”) published a six step methodology and tools for businesses to prepare for the EU General Data Protection Regulation (“GDPR”) that will become applicable on May 25, 2018. The six steps are summarized below. Step 1: Appointing a Data Protection Officer (“DPO”) or “Pilot”. The CNIL’s methodology first stresses the need for organizations to appoint a leader to pilot governance of data protection within their structure.

GDPR 75
article thumbnail

What is smart? Some communities are finding out.

CGI

What is smart? Some communities are finding out. harini.kottees…. Wed, 03/22/2017 - 07:00. Today, many affiliate the word “smart” with technology – smart phones, smart TVs, smart homes, etc. - but is infusing the latest technology in all aspects of life necessarily the smart thing to do? Not always. What is smart is to understand what your highest priorities are and invest in those areas to make improvements that produce maximum results.

article thumbnail

Prevent Data Breaches With Zero-Trust Enterprise Password Management

Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.

article thumbnail

IoT Hacking of Web-Connected Devices Gets Easier

Outpost24

Google is king when it comes to interoperability and extending the functionality of the web. But now those perceived benefits could be impacting our IoT security. Recently Google developed and supported two new HTML APIs that while work towards their goals, also have the ability to make the web less safe. Compound the APIs with existing security flaws of IoT devices and we could have a big problem on our hands.

IoT 64

More Trending

article thumbnail

DB2 for z/OS: Running REORG to Reclaim Disk Space

Robert's Db2

Think of why you run the DB2 for z/OS REORG utility, and a number of reasons are likely to come quickly to mind: to restore row order per a table's clustering key; to reestablish free space (for inserts and/or for updates ); to remove the AREO* status set for a table space following (for example) an ALTER TABLE ADD COLUMN operation; or to materialize a pending DDL change such as an enlargement of a table space's DSSIZE.

IT 48
article thumbnail

The Power of the Record

Brandeis Records Manager

George Despres, CRM. Program Director for University Records Management, Brandeis University. (The content in this blog reflects the opinions of the author, and not of Brandeis University.). After some recent gloom and doom posts about future challenges to the profession and fact denial and fake news , it’s probably time to take a slightly more glass half-full perspective of our job.

article thumbnail

Webinar on China’s New Cybersecurity Law

Hunton Privacy

China’s new Cybersecurity Law will impose new restrictions on information flows from operators of key information infrastructure, and will become effective in June 2017. Hunton & Williams LLP will host a webinar on China’s New Cybersecurity Law on March 7, 2017, at 12:00 p.m. EST.

article thumbnail

Darwin’s advice to the energy sector: get agile!

CGI

Darwin’s advice to the energy sector: get agile! shobana.lv@cgi.com. Thu, 03/30/2017 - 07:00. What does Charles Darwin have to do with digital transformation in the energy sector? More than you might think. Darwin’s theory—that it isn’t the strongest of the species that survives, but the ones most responsive to change—can point the way for utilities to move faster toward a sustainable energy system.

article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

Hospitals Pwned with Obsolete Malware - KillDisk

Outpost24

Hospital administrators read the news. They know that their industry is the most popular target for hackers by a huge margin. Therefore, many hospitals are upgrading their defenses—but it doesn't seem to be working.

IT 63
article thumbnail

InfoGov Links Of The Week 03-31-2017

Information is Currency

AIIM 2017 State of Information Management. For purposes of context for our survey, we positioned digital transformation as the concept of being paperless, using multi-channel inbound capture, and the impact digital transformation will have on individuals, business organizations, and operational processes. What we found is that there is progressive movement, albeit not the hockey stick inclination everyone hopes for, but movement nonetheless.

ECM 40
article thumbnail

Reflection on Working From Home

The Falcon's View

In a moment of introspection last night, it occurred to me that working from home tends to amplify any perceived slight or sources of negativity. Most of my "human" interactions are online only, which - for this extrovert - means my energy is derived from whatever "interaction" I have online in Twitter, Facebook, email, Slack, etc. It turns out that this can be highly problematic.

IT 40
article thumbnail

Intelligent Information Management and AIIM17

JKevinParker

Read my reflections on the 2017 AIIM Conference on LinkedIn Pulse: Intelligent Information Management and AIIM17. In that post, I also link to others' reflections on AIIM17.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

Neiman Marcus Agrees to Settlement in Data Breach Class Action

Hunton Privacy

On March 17, 2017, retailer Neiman Marcus agreed to pay $1.6 million as part of a proposed settlement (the “Settlement”) to a consumer class action lawsuit stemming from a 2013 data breach that allegedly compromised the credit card data of approximately 350,000 customers. The consumer plaintiffs sued Neiman Marcus in March 2014, alleging that the company failed to protect customers’ privacy and waited 28 days to inform affected customers of the breach.

article thumbnail

Architecting in a digital world: Anticipating and accommodating change

CGI

Architecting in a digital world: Anticipating and accommodating change. shobana.lv@cgi.com. Tue, 03/21/2017 - 02:49. Digital transformation success requires anticipating and accommodating change in every area of the organization, including the architecting of IT solutions that run the business and drive digitalization. In fact, evolution is part of the definition of architecture in the ISO/IEC 42010:2011 standard.

article thumbnail

Aligning Wireless Networks with Compliance in Healthcare

Outpost24

In transmitting and storing critical patient data, wireless devices are integral to the response time (and often the resulting quality of care) offered by our healthcare systems. However, thanks largely in part to government acts like the. Health Insurance Portability and Accountability Act (HIPAA) (1) and. Health Information Technology for Economic and Clinical Health (HITECH) Act (2) have increasingly been prodding healthcare providers to adopt more and more technology in order to fully comply

article thumbnail

It’s Time For Facebook to Start Making Media

John Battelle's Searchblog

The post It’s Time For Facebook to Start Making Media appeared first on John Battelle's Search Blog. There’s only one company that can possibly spin media gold on Facebook. And that’s Facebook. Round and round and round goes the debate —  Facebook’s not a media company , Facebook’s not a traditional media company , Facebook’s a new kind of media company.

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Transitioning from my CISO role at DataGravity

Andrew Hay

As of today I’m transitioning out of my CISO role at DataGravity and am on the hunt for a new full-time gig. Though I appreciate your condolences, I see this as a good thing and the transition is an amicable one. What this really means, however, is that I get to explore exciting opportunities with exciting companies. Who is looking… This guy.

article thumbnail

CMSWire Article: Why You Need a Unified Information Strategy

JKevinParker

Today my first CMSWire article was published: Why You Need a Unified Information Strategy. Information is one of the most important business assets, yet organizations continue to struggle with growing information chaos. Even with continuing advances in technology, buying more tech is not solving the problem. Yes, technology is part of the solution, but to get it right, you must get your information strategy right.

IT 40
article thumbnail

Hunton Releases ‘Seeking Solutions,’ a Report on the Attributes of Effective DPAs

Hunton Privacy

Hunton & Williams LLP, in coordination with the U.S. Chamber of Commerce, recently issued a series of recommendations to enhance the effectiveness of data privacy regulators. The report, Seeking Solutions: Attributes of Effective Data Protection Authorities , identifies seven key attributes of data protection authorities (“DPAs”) that contribute to effective data protection governance.

article thumbnail

Making instant payments pay

CGI

Making instant payments pay. harini.kottees…. Fri, 03/17/2017 - 08:00. In the UK, instant payments went live on May 27, 2008, some nine years ago. As a service brought about by regulation and the government’s desire to improve the efficiency of the country’s payment systems, little attention was paid to its potential uses and impact on the market. Standing orders (a UK payment instruction to make regular fixed transfers to a beneficiary) were converted at launch, but overall take up was gradual,

article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

“You’re My New Best Friend, Counselor”

Positively RIM

Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Few records managers work solo. Nor should they. Today’s RIM requires expertise and contributions from a variety of disciplines beyond the scope and/or capabilities of any one person. Not many RIMmers are technologically super-savvy, and few techies understand RIM.

article thumbnail

My Latest Article Published at Document Strategy Magazine

Getting Information Done

Creating a Culture of Information Management Excellence Last year, I wrote an article titled, “ What Does Culture Have to Do with Information Management? ” which made the case for addressing culture as a part of any successful information management implementation project. Today, I wanted to offer some practical advice on how to create or install a culture of information management excellence.

40
article thumbnail

We have your data: how to fight ransomware

Andrew Hay

Of all the cybersecurity threats out there, one consistently strikes a nerve: ransomware. Maybe it’s because being held for ransom is so personal, or perhaps it’s the fact that you’re totally frozen out of your … The post We have your data: how to fight ransomware appeared first on DataGravity Blog.

article thumbnail

2017 AIIM Leadership Award for Community Engagement

JKevinParker

At the annual AIIM Conference , I was honored with the 2017 AIIM Leadership Award for Community Engagement. This is the second year AIIM has given Leadership Awards, and it is the second year that I received one. I also nominated a couple of this year's recipients. From the press release : "The AIIM Leadership Award recognizes individuals whose outstanding leadership within our community goes above and beyond to benefit the advancement of the information management industry and AIIM.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

CNIL Unveils 2017 Inspection Program and 2016 Annual Activity Report

Hunton Privacy

On March 28, 2017, the French Data Protection Authority (“CNIL”) published its Annual Activity Report for 2016 (the “Report”) and released its annual inspection program for 2017. The Report presents the main accomplishments in 2016 and highlights the diversified activity at both the national and EU level with the adoption of two major pieces of legislation, namely: The EU General Data Protection Regulation (“GDPR”), which imposes new accountability obligations, including the obligation to (1) k

article thumbnail

Leave the “running” of cybersecurity to trusted partners to focus on digital transformation

CGI

Leave the “running” of cybersecurity to trusted partners to focus on digital transformation. harini.kottees…. Wed, 03/08/2017 - 08:00. My previous blog discussed how the path to greater cybersecurity maturity requires viewing security as more than just mandatory to running the business, but also as a key enabler of change and growth. This blog continues our cybersecurity insights from the CGI Global 1000 outlook , drawn from in-person conversations with 1,000 senior business and technology leade

article thumbnail

InfoGov Links of The Week 03-10-2017

Information is Currency

Blockchain & ECM. Blockchain in some ways defeats the point of centralized records management but the likelihood is that more specialized applications will be adding this kind of functionality to their systems. Potentially disrupting the traditional approach to RIM. The More Things Change – ECM Isn’t Really Dead. ECM is not a technology, methodology, or process.

ECM 40