This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
If you’re reading this, you already know how valuable it can be to better manage your organization’s business-critical information, and improve the business processes that make that information available to those who need it, when they need it. (Information governance to the rescue!) If you’ve tried doing this, then you probably also know how hard […].
In business, we tend to focus on the incremental changes we are dealing with every day. The big opportunities always seem too far away to build into our monthly, quarterly or even annual plans. These opportunities, though, are the “moonshots” that completely change the world and generate growth for years to come. The big changes can come from unexpected places.
I see this was posted 3 months ago to Youtube, but its new to me. This being blogging, lets over-analyze. The General’s password is ihatemyjob1. Not a bad password. Using a passphrase is easy to remember. Easy to type. No doubt he should have capitalized the “I” Most systems can handle spaces, which would add some length. Putting in a “@” in for a and a “0” in for o would add some complexity.
On February 4, 2017, the Cyberspace Administration of China published a draft of its proposed Measures for the Security Review of Network Products and Services (the “Draft”). Under the Cybersecurity Law of China , if an operator of key information infrastructure purchases network products and services that may affect national security, a security review is required.
Incorporating generative AI (gen AI) into your sales process can speed up your wins through improved efficiency, personalized customer interactions, and better informed decision- making. Gen AI is a game changer for busy salespeople and can reduce time-consuming tasks, such as customer research, note-taking, and writing emails, and provide insightful data analysis and recommendations.
Alrighty. now that my RSA summary post is out of the way, let's get into a deeply personal post about how absolutely horrible of a week I had at RSA. Actually, that's not fair. The first half of the week was ok, but some truly horrible human beings targeted me (on social media) on Wednesday of that week, and it drove me straight down into a major depressive crash that left me reeling for days (well, frankly, through to today still).
Recently, a DB2 for z/OS professional I’ve known for some years sent to me a question about the relationship between the PGSTEAL and PGFIX options of the DB2 command -ALTER BUFFERPOOL. It took a few iterations of question and answer to get things straightened out, and I thought, “Hmm. If this person, who has lots of DB2 for z/OS experience and knowledge, needed a little help in getting PGSTEAL and PGFIX straightened out in his mind, it's likely that other DB2 people are in the same boat.
Sign up to get articles personalized to your interests!
Information Management Today brings together the best content for information management professionals from the widest variety of industry thought leaders.
Recently, a DB2 for z/OS professional I’ve known for some years sent to me a question about the relationship between the PGSTEAL and PGFIX options of the DB2 command -ALTER BUFFERPOOL. It took a few iterations of question and answer to get things straightened out, and I thought, “Hmm. If this person, who has lots of DB2 for z/OS experience and knowledge, needed a little help in getting PGSTEAL and PGFIX straightened out in his mind, it's likely that other DB2 people are in the same boat.
Insurers’ digital focus is looking through the wrong ‘lens’. harini.kottees…. Tue, 02/28/2017 - 03:52. Read any article on digital insurance and it seems to me that it is all about the insurers! Big data, fraud reduction, improved risk ratios, cross product customer engagement are common themes in the trade and advisor “blogsphere”. Whilst these are undoubtedly areas where the insurance operating model can be improved and indeed transformed by the use of new technology, they all seem to miss the
Why Technology Won’t Solve Your Business Process Problem. When I talk with folks about workflow issues, the focus of discussion typically turns to technology or the potential use of it. Until we understand the underlying reasons for the issue, technology alone will not resolve it completely and, in fact, has amplified the issue in some cases. My point is that in order to address workflow issues, organizations need to be aware of and embrace the concept that process management and automatio
Today’s Blog is sponsored by MER 2017, Cohasset Associates’ 25 th annual educational conference on electronic records management, in Chicago, May 8-10. Sorry to be the one to tell you, but “secure information” is an illusion. No records are really 100 percent secure. We protect our information, but we only create improvement, not assurance. If you think you can totally protect your information, forget it.
On February 6, 2017, the House of Representatives suspended its rules and passed by voice vote H.R 387 , the Email Privacy Act. As we previously reported , the Email Privacy Act amends the Electronic Communications Privacy Act (“ECPA”) of 1986. In particular, the legislation would require government entities to obtain a warrant, based on probable cause, before accessing the content of any emails or electronic communications stored with third-party service providers, regardless of how long the co
Keeper Security is transforming cybersecurity for people and organizations around the world. Keeper’s affordable and easy-to-use solutions are built on a foundation of zero-trust and zero-knowledge security to protect every user on every device. Our next-generation privileged access management solution deploys in minutes and seamlessly integrates with any tech stack to prevent breaches, reduce help desk costs and ensure compliance.
Now that I've had a week to recover from the annual infosec circus event to end all circus events, I figured it's a good time to attempt being reflective and proffer my thoughts on the event, themes, what I saw, etc, etc, etc. For starters, holy moly, 43,000+ people?!?!?!?!?! I mean. good grief. the event was about a quarter of that a decade ago. If you've never been to RSA, or if you only started attending in the last couple years, then it's really hard to describe to you how dramatic the chang
A spin through LinkedIn’s recently-released 2017 Annual Global Recruiting Trends report confirms that employer branding is one of the hottest topics – if not the hottest topic – in the industry. LinkedIn surveys some 4,000 HR pros each year and, just like the 2016 edition, employer branding features prominently in the report. It’s listed as one of the top five takeaways in the entire 32-page read.
Digital Transformation in UK General Insurance: Where do MGAs fit in? harini.kottees…. Tue, 02/28/2017 - 04:15. A lot of attention has been drawn to the digital developments that are being undertaken by insurers in the direct marketplace, but whilst direct is an important market, transformation of the indirect channel is also deserving of more attention.
Yesterday I passed two parts of the ICRM exam. The lead up to it caused me to delay links of the day. Sorry for the delay. Please read, enjoy, share and do your part to mature the InfoGov community. Companies Still Struggle With Information Governance, Survey Finds. Despite years of talking about information governance and compliance, less than half of companies surveyed have a compliance culture — and many companies apparently have no governance strategy at all.
Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.
On February 22, 2017, the Federal Trade Commission announced that it had reached settlement agreements (“the Proposed Agreements”) with three U.S. companies charged with deceiving consumers about their participation in the Asia-Pacific Economic Cooperation Cross-Border Privacy Rules (“APEC CBPR”) system. The three companies are Sentinel Labs, Inc. (which provides endpoint protection software), SpyChatter, Inc.
On February 17, 2017, Horizon Blue Cross Blue Shield of New Jersey (“Horizon”) agreed to pay $1.1 million as part of a settlement with the New Jersey Division of Consumer Affairs (the “Division”) regarding allegations that Horizon did not adequately protect the privacy of nearly 690,000 policyholders. The settlement stemmed from the theft of two laptops stolen from Horizon headquarters in November 2013, when personnel from outside vendors performing renovations and moving services at Horizon’s N
On February 13, 2017, the Parliament of Australia passed legislation that amends the Privacy Act of 1988 (the “Privacy Act”) and requires companies with revenue over $3 million AUD ($2.3 million USD) to notify affected Australian residents and the Australian Information Commissioner (the “Commissioner”) in the event of an “eligible data breach.”. The Privacy Act defines “personal information” to include “information or an opinion about an identified individual, or an individual who is reasonably
On February 2, 2017, the UK government published a white paper entitled The United Kingdom’s exit from and new partnership with the European Union (the “white paper”). The white paper strikes a conciliatory tone, making it clear that the UK intends to maintain close ties with the European Union and its 27 remaining Member States after Brexit. A large portion of the white paper is devoted to discussing the issues at the heart of the 2016 Brexit referendum, such as immigration controls, continuing
Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?
On February 16, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) entered into a resolution agreement with Memorial Healthcare System (“Memorial”) that emphasized the importance of audit controls in preventing breaches of protected health information (“PHI”). The $5.5 million settlement with Memorial is the fourth enforcement action taken by OCR in 2017, and matches the largest civil monetary ever imposed against a single covered entity.
Protecting the bank in a digital world. shobana.lv@cgi.com. Wed, 02/22/2017 - 01:58. Today's digital world of multi-dimensional, organized criminal threats ruthlessly exposes the weak points in any financial institutions anti-financial crime (AFC) defences. Criminals are long gone usually before you even realize you are a victim. The challenge is how to more proactively defend against these new threats.
10 measures for good IT security governance. harini.kottees…. Wed, 02/15/2017 - 01:58. The sophistication and persistence of cyber-attacks are driven by the attractiveness of an organization’s role and assets. Often they are conducted by highly skilled international organized crime groups or foreign nation states that aim their attacks not just at government entities, but also at corporations, including those with large-scale financial and credit card assets and foreign investments, and those in
In today’s information age Information Governance is essential to be prepared for eDiscovery. People are hungry for information and submit Freedom of Information Act (FOIA) request at a startling pace. We live in a very litigious age and the only way to be prepared for eDiscovery request whether via FOIA or a lawsuit is by having a strong Information Governance foundation.
After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!
On February 1, 2017, the U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) announced a $3.2 million civil monetary penalty against Children’s Medical Center of Dallas (“Children’s”) for alleged ongoing violations of the Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy and Security Rules, following two consecutive breaches of patient electronic protected health information (“ePHI”).
Seizing the opportunities of digital transformation. shobana.lv@cgi.com. Thu, 02/02/2017 - 06:22. Digital transformation is having a huge impact on all organizations—large and small, private and public. Competition from new market players, fast-changing consumer and citizen demands, and the proliferation of new business models is disrupting the status quo.
On February 6, 2017, the FTC announced that it has agreed to settle charges that VIZIO, Inc. (“VIZIO”), installed software on about 11 million consumer televisions to collect viewing data without consumers’ knowledge or consent. The stipulated federal court order requires VIZIO to pay $2.2 million to the FTC and New Jersey Division of Consumer Affairs. .
On February 15, 2017, the Centre for Information Policy Leadership (“CIPL”) at Hunton & Williams LLP submitted two sets of formal comments to the Article 29 Working Party (the “Working Party”). CIPL commented on the Guidelines for identifying a controller or processor’s lead supervisory authority (“Lead Authority Guidelines”), and on the Guidelines on the right to data portability (“Data Portability Guidelines”).
Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage
When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.
As previously published on the Data Privacy Laws blog, Pablo A. Palazzi, partner at Buenos Aires law firm Allende & Brea, provides the following report. Earlier this month, the Argentine Data Protection Agency (“DPA”) posted the first draft of a new data protection bill (the “Draft Bill”) on its website. Argentina’s current data protection bill was enacted in December 2000.
Optimizing healthcare value with prescriptive analytics – Part 2. shobana.lv@cgi.com. Mon, 02/20/2017 - 08:00. Moving from “what if” to “what’s best”. In my previous blog on this topic , I discussed the need to shift analytics from monitoring and reporting of what has happened, to using analytics to make decisions. More specifically, to achieve continuous improvements in terms of quality of care, access to care and cost of care, our decisions need to be informed by data and directed by prescript
On February 23, 2017, the French Data Protection Authority (“CNIL”) launched an online public consultation on three topics identified by the Article 29 Working Party (“Working Party”) in its 2017 action plan for the implementation of the EU General Data Protection Regulation (“GDPR”). The three topics are consent, profiling and data breach notification.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content