April, 2016

article thumbnail

EU General Data Protection Regulation Finally Adopted

Hunton Privacy

On April 14, 2016, after four years of drafting and negotiations, the long awaited EU General Data Protection Regulation (“GDPR”) has been adopted at the EU level. Following the EU Parliament’s Committee on Civil Liberties, Justice and Home Affairs’ vote earlier this week and the EU Parliament in plenary session, the GDPR is now officially EU law and will directly apply in all EU countries, replacing EU and national data protection legislation.

GDPR 68
article thumbnail

Software is eating innovation: How trapped is your company?

Collaboration 2.0

Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why can’t we be briefed like the President?

Attensa

It started with a simple question posed by a senior marketing exec during a staff meeting. B lindsided a couple of times in the course of a month by information related to market events that that should have known, the exec went on to ask: “If the President of the United States can get a daily briefing on the state of the world, why can’t we get one on our own company?

article thumbnail

Wow. The People look like ants.

John Battelle's Searchblog

The post Wow. The People look like ants. appeared first on John Battelle's Search Blog. The post Wow. The People look like ants. appeared first on John Battelle's Search Blog.

64
article thumbnail

Optimizing The Modern Developer Experience with Coder

Many software teams have migrated their testing and production workloads to the cloud, yet development environments often remain tied to outdated local setups, limiting efficiency and growth. This is where Coder comes in. In our 101 Coder webinar, you’ll explore how cloud-based development environments can unlock new levels of productivity. Discover how to transition from local setups to a secure, cloud-powered ecosystem with ease.

article thumbnail

DB2 for z/OS: Should You Do Some Buffer Pool Consolidation?

Robert's Db2

19, 19, 23, 26. Know what these numbers have in common? They indicate the number of 4K buffer pools allocated for four different production DB2 for z/OS subsystems that I analyzed over the past couple of years. I believe that there are quite a few sites where a plethora of 4K buffer pools have been defined for a given DB2 subsystem. That's not illegal or anything (DB2 allows you to have as many as 50 different 4K pools for a single subsystem), but it does make the task of managing and monitoring

Access 48

More Trending

article thumbnail

CIPL and AvePoint Launch Survey to Benchmark Global Readiness for the EU GDPR

Hunton Privacy

With the recent adoption of the EU General Data Protection Regulation (“GDPR”) and the significant changes it will require from organizations, AvePoint has joined forces with the Centre for Information Policy Leadership (“CIPL”), a global privacy policy think tank at Hunton & Williams LLP, to launch the first global survey to benchmark organizations’ readiness for the GDPR.

GDPR 66
article thumbnail

Software is eating innovation: How trapped is your company?

Collaboration 2.0

Homogenized software can limit innovation as companies grapple with digital evolution options, while marketing continues to dominate tactical thinking.

article thumbnail

Accounting for the Pricing Journey

PerezBox

You will undoubtedly undervalue your product or services, and your pricing will be wrong; this I am sure of. It will be echoed by every seasoned business person, professional coach, and everyone. Read More. The post Accounting for the Pricing Journey appeared first on PerezBox.

IT 45
article thumbnail

Where I’ll Be For NewCo Boston April 26-7 – Come Join Me!

John Battelle's Searchblog

The post Where I’ll Be For NewCo Boston April 26-7 – Come Join Me! appeared first on John Battelle's Search Blog. The first ever NewCo Boston goes off in less than two weeks, and I’ve been studying the schedule and making my picks for the companies I most want to visit. The lineup is insanely great – Boston is brimming with innovative NewCos, 79 of which will open their doors on April 27th.

article thumbnail

15 Modern Use Cases for Enterprise Business Intelligence

Large enterprises face unique challenges in optimizing their Business Intelligence (BI) output due to the sheer scale and complexity of their operations. Unlike smaller organizations, where basic BI features and simple dashboards might suffice, enterprises must manage vast amounts of data from diverse sources. What are the top modern BI use cases for enterprise businesses to help you get a leg up on the competition?

article thumbnail

KMWorld Magazine: Evolving Data Issues Challenge RM Approaches

JKevinParker

I was interviewed by Judith Lamont, Ph.D. for a piece she wrote in KMWorld Magazine. The article is called " Evolving data issues challenge RM approaches ". For my contributions, I spoke about issues with the growing volumes of big data and how business and IT often have different priorities—if they've even thought about the implications of structured data on records management.

article thumbnail

In-depth analysis of the lessons we learned while protecting gmail users

Elie

This post provides an in-depth analysis of the lessons we learned while protecting Gmail users and their inboxes. We felt it was about time to share the key lessons we learned the hard way while protecting Gmail for over a decade, so everyone involved in building an online product can benefit from them. To that effect, with the help of various Gmail safety leaders and long-time engineers, I distilled these lessons into a 25-minute talk for Enigma called “Lessons learned while protecting Gmail”.

IT 48
article thumbnail

CNIL and GPEN Analyze Impact of Connected Devices on Privacy During Internet Sweep

Hunton Privacy

On April 12, 2016, the French Data Protection Authority (“CNIL”) announced that it will participate in a coordinated online audit to analyze the impact of everyday connected devices on privacy. The audit will be coordinated by the Global Privacy Enforcement Network (“GPEN”), a global network of approximately 50 data protection authorities (“DPAs”) from around the world.

Privacy 53
article thumbnail

How collaboration and data sharing will help enable effective devolution

CGI

How collaboration and data sharing will help enable effective devolution. p.butler@cgi.com. Thu, 04/28/2016 - 06:22. Table. George Osborne’s March 16 th Budget upheld the Government’s previously announced drive to devolve powers to local authorities. Termed “a devolution revolution” in the Budget document, the Chancellor stated that, “this government is delivering on its commitments to transfer powers to each of the devolved administrations.”. .

article thumbnail

The Tumultuous IT Landscape Is Making Hiring More Difficult

After a year of sporadic hiring and uncertain investment areas, tech leaders are scrambling to figure out what’s next. This whitepaper reveals how tech leaders are hiring and investing for the future. Download today to learn more!

article thumbnail

Friends, Feedback and the Future of Digital Preservation: Preservica Global User Group 2016

Preservica

Last week I had the pleasure of taking part in our Global User Group Meeting and spending time with over fifty Preservica Users in Oxford – our biggest event to date! Having studied and lived in Oxford for many year’s it’s easy to take for granted the beautiful surroundings that the city has to offer. To ensure everyone had the best experience possible we held this year’s meeting at Queens College, steeped in history and with an enviable archive and library of its own it was the perfect location

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

Solution Success Means User Adoption

JKevinParker

The following is an excerpt from a post I published on the AIIM blog called " Solution Success Means User Adoption ". Of all the measures of success for information management solution implementations, there is one critical success factor that stands above the rest: user adoption. In other words, your solution is only successful if it is actually used by the people in your organization.

IT 40
article thumbnail

What to do With Paper Patient Charts When Transitioning to Electronic Medical Records

Shoreline Records Management

As Doctors across the country transition to Electronic Medical Record Systems, they’re confronted with a major decision, what do I do with my paper charts? Practices and Doctors have a few options to choose from: Continue to use the paper chart for all patient visits. Yes, Practices have the option to not implement an Electronic Medical Record System and continue to use paper charts like they always have.

Paper 28
article thumbnail

Improving the Accuracy of Generative AI Systems: A Structured Approach

Speaker: Anindo Banerjea, CTO at Civio & Tony Karrer, CTO at Aggregage

When developing a Gen AI application, one of the most significant challenges is improving accuracy. This can be especially difficult when working with a large data corpus, and as the complexity of the task increases. The number of use cases/corner cases that the system is expected to handle essentially explodes. 💥 Anindo Banerjea is here to showcase his significant experience building AI/ML SaaS applications as he walks us through the current problems his company, Civio, is solving.

article thumbnail

If a Data Breach Occurs and Nobody Accesses Customer Data, Does it Constitute “Publication”?

Hunton Privacy

As reported on the Hunton Insurance Recovery Blog , data breach claims involving customer data can present an ever-increasing risk for companies across all industries. A recent case illustrates efforts to recover the costs associated with such claims. A panel of the Fourth Circuit confirmed that general liability policies can afford coverage for cyber-related liabilities, and ruled that an insurer had to pay attorneys’ fees to defend the policyholder in class action litigation in Travelers Indem

article thumbnail

Future Cities – Is it time to dream big?

CGI

Future Cities – Is it time to dream big? p.butler@cgi.com. Tue, 04/26/2016 - 00:25. I found a business quote the other day from Victoria Beckham, yes the former Spice Girl that has created a £30m+ clothing business, where she said that 'if you can get your head around your dream, then your dream isn't big enough'. Table. I hadn't given the quote much thought until discussing my ' the whole is more than the sum of its parts ' blog with a client and the size of the challenge facing cities as they

IT 40
article thumbnail

Does your organization have a digital preservation strategy?

Preservica

Learn why you may need one in IGI’s interview with Preservica’s Mike Quinn. Recently, the IGI caught up with Mike Quinn, Commercial Director at Preservica, one of the newest IGI Supporters, to find out more about what organizations can do to better protect their valuable digital assets to ensure that it is both preserved and accessible in the future. read the full blog here.

article thumbnail

The Motivation And Design Behind Autogenerated Challenges

ForAllSecure

In nearly all CTF competitions organizers spend dozens of hours creating challenges that are compiled once with no thought for variation or alternate deployments. For example, a challenge may hard-code in a flag, making it hard to change later, or hard-code in a system-specific resource. At ForAllSecure, we are working to build automatically generated challenges from templates.

article thumbnail

Driving Responsible Innovation: How to Navigate AI Governance & Data Privacy

Speaker: Aindra Misra, Senior Manager, Product Management (Data, ML, and Cloud Infrastructure) at BILL

Join us for an insightful webinar that explores the critical intersection of data privacy and AI governance. In today’s rapidly evolving tech landscape, building robust governance frameworks is essential to fostering innovation while staying compliant with regulations. Our expert speaker, Aindra Misra, will guide you through best practices for ensuring data protection while leveraging AI capabilities.

article thumbnail

Digital Transformation In Action: 21 Things You Need to Know

JKevinParker

AIIM published a great ebook on Digital Transformation as a preview to the 2016 AIIM Conference. A great group of industry experts contributed their thoughts to this important topic, including me. The following were my contributions to two of the rules: RULE #11 - IF YOU CAN'T MEASURE IT - DON'T DO IT. Kevin Parker, NEOSTEK: "Use an IM maturity model and assessment (like the one from MIKE2.0 or NARA's RIM Maturity Model).

article thumbnail

What to do With Paper Patient Charts When Transitioning to Electronic Medical Records

Shoreline Records Management

As Doctors across the country transition to Electronic Medical Record Systems, they’re confronted with a major decision, what do I do with my paper charts? Practices and Doctors have a few options to choose from: Continue to use the paper chart for all patient visits. Yes, Practices have the option to not implement an Electronic Medical Record System and continue to use paper charts like they always have.

Paper 20
article thumbnail

Article 29 Working Party Releases Opinion on EU-U.S. Privacy Shield

Hunton Privacy

On April 13, 2016, the Article 29 Working Party (the “Working Party”) published its Opinion on the EU-U.S. Privacy Shield (the “ Privacy Shield ”) draft adequacy decision. The Privacy Shield was created to replace the previous Safe Harbor framework invalidated by the Court of Justice of the European Union (“CJEU”) in the Schrems decision. The Working Party also published a Working Document on the justification for interferences with the fundamental rights to privacy and data protection through s

Privacy 49
article thumbnail

Is utopia achievable in digital customer experience?

CGI

Is utopia achievable in digital customer experience? shobana.lv@cgi.com. Fri, 04/22/2016 - 05:30. I attended last week’s T-E-N (The Executive Network) Summit in central London on ‘The Customer Journey – Multichannel Customer Engagement. As a speaker at the event, I had an opportunity to speak to a broad audience of senior practitioners on their programmes and initiatives in digital customer engagement – there were some interesting recurring themes.

article thumbnail

How Top Tech CFOs Solve Annual Planning’s Biggest Challenges

Gearing up for 2025 annual planning? Our latest eBook from the Operators Guild is your ultimate guide. Discover real-world solutions and best practices shared by top CFOs, drawn directly from discussions within OG’s vibrant online community. Learn from senior executives at high-growth tech startups as they outline financial planning strategies, align CEO and board goals, and coordinate budgets across departments.

article thumbnail

OCR Settles Two Key HIPAA Privacy Rule Cases Involving X-Rays and Medical Reality TV Show

Hunton Privacy

The U.S. Department of Health and Human Services’ Office for Civil Rights (“OCR”) recently announced resolution agreements with Raleigh Orthopaedic Clinic, P.A., (“Raleigh Orthopaedic”) and New York-Presbyterian Hospital (“NYP”) for HIPAA Privacy Rule violations. Raleigh Orthopaedic. Following a breach notification report from Raleigh Orthopaedic in April 2013, OCR investigated and discovered that Raleigh Orthopaedic had improperly disclosed protected health information (“PHI”) to a third-party

Privacy 45
article thumbnail

Nuclear Industry Pursues Aggressive Defense Against Cyber Threats

Hunton Privacy

On March 30 through April 1, 2016, the 2016 Nuclear Industry Summit meetings took place in Washington D.C. In the nuclear industry, the issue of cybersecurity has grown steadily in importance over the past decade. This has been most apparent in the increasing attention and effort paid to cyber-based threats under the biennial Nuclear Industry Summit and its international meetings.

article thumbnail

Amended Tennessee Breach Notification Law Tightens Timing Requirement

Hunton Privacy

On March 24, 2016, Tennessee Governor Bill Haslam signed into law S.B. 2005 , as amended by Amendment No. 1 to S.B. 2005 (the “Bill”), which makes a number of changes to the state’s data breach notification statute, Tenn. Code § 47-18-2107. The amendments take effect on July 1, 2016. The Bill: Requires businesses and state agencies to notify affected individuals “immediately, but no later than 45 days from the discovery or notification of the breach, unless a longer period of time is required du