Search

1 to 10 of 124
Sort by

Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...

Jennifer Chadband's profile image

Blog Entry
France’s Digital Republic Act Strengthens Privacy Safeguards

France’s new Digital Republic Act [1] significantly strengthens protections that control how French businesses use and retain personally identifying data. The law expands the scope and authority of the 1978 French Data Protection Act and brings the country to the foreground of modernizing the...

Frank Fazzio's profile image

Blog Entry
Bringing the Cloud Down to Earth

As companies of all sizes begin to store data in the cloud, privacy issues have become big news. Apple co-founder Steve Wozniak commented on the cloud, saying that “the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.” [1] A major problem...

Megan Mohrmann's profile image

Blog Entry
Upcoming Changes in International Data Retention Legislation

For companies that operate in international jurisdictions, it is vital to stay up-to-date on legislative actions that affect data retention policies and compliance. This allows companies to make internal adjustments as necessary and to avoid costly sanctions and other harmful penalties for non...

Megan Mohrmann's profile image

Blog Entry
Verfahrensdokumentation nach GoBD & selbstdokumentierende Archivsysteme

Mit den GoBD Grundsätze zur ordnungsmäßigen Führung und Aufbewahrung von Büchern, Aufzeichnungen und Unterlagen in elektronischer Form sowie zum Datenzugriff ist das Thema Verfahrensdokumentation aktueller denn je. Die Erstellung von Verfahrensdokumentationen ist für Buchhaltungs- und...


Blog Entry
Der Wert einer E-Mail?!

Welchen Wert, besser welchen rechtlichen Wert hat eine normale E-Mail in Deutschland? Wenn man liest, es sei ja nur eine offene "Postkarte", kommt man ins Grübeln. Und da bin ich einem Hinweis von Wolfgang Ksoll dankbar, der einige interessante Überlegungen hierzu angestellt hat. Anlass hierzu...


Blog Entry
Why a SOC 2 Type 2 Report is Important

Many large organizations, and some forward-thinking smaller ones, require their document scanning service provider have a SOC 2 Type 2 Report. The SOC 2 Report is the best way to gain information and assurance about a scanning company’s controls and processes that effect the security,...

Mitch Taube's profile image

Blog Entry
Security Governance Best Practices for SharePoint 2013 & Office 365 | SharePoint Online

Security Governance Best Practices for SharePoint 2013 & Office 365 | SharePoint Online EPC Group understands that security has never been a hotter topic in IT, but in most cases, even though it is being discussed by members of the organization and dominates a good deal of technology news...

Errin O'Connor's profile image

Blog Entry
eDiscovery Best Practices in SharePoint Server 2013 and Office 365

eDiscovery Best Practices in SharePoint Server 2013 and Office 365 "From the Consulting Trenches" Not only do records stored on users devices and in SharePoint become relevant in legal and compliance related cases and incidents, but emails as well as even Lync conversations also...

Errin O'Connor's profile image

Blog Entry
Data Breaches and Implementing Proactive Security Policies

Overview: Data Breaches & Implementing Proactive Security Policies Over the past few, there have been some very high profile instances of data breaches in environments of all types. The NSA IT Administrator Edward Snowden, who accessed and shared classified NSA data, has been the most...

Errin O'Connor's profile image