Search

1 to 3 of 3
Sort by

Blog Entry
Identifying Personally Identifiable Information

Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this...

Megan Mohrmann's profile image

Blog Entry
What are You Using Your RRS for – Part 2?

This is part 2 of my question to the community. What are you using your RRS for? I really don’t understand why organizations are in a hurry for a Records and Information Management Policy and Records Retention Schedule (RRS) when they are not going to use them. What is the point? ...

Helen Streck's profile image

Blog Entry
Are You Using Your Records Retention Schedule?

This blog is the first part of a series that asks the questions, raises some issues and maybe answers a few questions about the use of a Records Retention Schedule. When your senior management said “we must have a Records Retention Schedule (RRS)” did you feel a sigh of relief?...

Helen Streck's profile image