We spend a lot of time in this industry talking about how to capture information and, through good records management practices, dispose of content when appropriate. But we don’t talk about how to use ECRM technologies to protect sensitive information. We should. The Wikileaks...
If you have the possibility to remove your own content, you might also be able to remove someone else’s content, for example using identify theft