You will have to deal with this risk, which is what we call big data risk management. Therefore, ask yourself if your organization: Can handle Big Data effectively in case of litigation
AIIM True North would like to invite you to a webinar on June 15, 2022 at 11:30 AM ET. The presentation will discuss the benefits and risks of using artificial intelligence for information governance. You can register here. This webinar is eligible for 1 CEU. Please complete the CIP...
From ZyINDEX to the ZyLAB eDiscovery and Information Risk Management platform. From Wordstar to the Cloud, from 640 kB RAM to several Gb’s, from 10 Mb hard disks to servers holding hundreds of Tera Bytes of data
This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance
Thanks for sharing. I registered but don't see the meeting link. What is the URL for joining this event? Thanks. -- Sara Truscott PNNL --
We’ve all heard that content is exploding. One big contributor is user-generated content associated with various “social” interactions – wikis, blogs, Tweets, notifications, votes, profiles, etc. How can we apply records management principles to these types of content? ...
If a record is destroyed, but that information is still documented in an attachment on someone’s e-mail or floating around somewhere in your organization then that is still eligible for discovery. Risk management in information governance means looking at e-mail management, social media policies and BYOD policies since these are all areas information can reside that has potential to harm your organization in court
Speaker: Ahava Leibtag, President , Aha Media Group, LLC Following this Seth Earley will lead a panel discussion with Ahava Leibtag, Trisha Torrey (Every Patient’s Advocate) and Dr. Joe Leonard (Risk Management expert and board member of PLICO, a physician owned medical professional liability insurance company)
The need for security by government agencies, public corporations and private business is underscored by recent document leaks and what can happen when sensitive documents are freely distributed by unauthorized parties. Unfortunate consequences occur when companies lose control over confidential...
Reminder to register here for AIIM True North's webinar "What are the top five determinants for a successful digital transformation?" It is not late!! -- Amitabh Srivastav, CIP, IGP, PMP Board Member AIIM True North --