So for true security of data, a layered approach to data security that bases security on the sensitivity of the information (content) itself, or one that is “content-aware”, is required versus just looking at access controls
1 Comment - no search term matches found in comments.
I find myself reading an article this morning titled “ Court: No warrant needed to search cell phone ”, posted by Bob Sullivan on MSNBC’s the Red Tape Chronicles and wondering how ECM, ERM, content security and disposition would play into the scenario presented
Lessons learned: Companies’ investments in paperless delivery often end up unused due to security concerns
It was challenging but interesting work, and it paid the bills at the time - but there is absolutely no way I would want to manage IT, and more specifically IT security, for anyone today
This might seem pessimistic, but despite all the legal clauses, let’s not forget that all the data will be in the hands of humans, and that they are often the weakest security link
Be it arbitration, mediation or litigation, good information governance provides you with the security needed to protect your risks, be it market, credit, legal or operational
The other side of the problem now, is that users don’t know where to look, meaning the physical location, they must have the correct security for remote access, and they may be using multiple devices to communicate
Without further ado I’ll get into the counter arguments to the author’s “five reasons why cloud file sharing platforms can’t touch document management software platforms from an enterprise functionality standpoint” … Security at all costs – If the author had written something about data residency I would have bought it, probably
There are some privacy and security concerns here, so make sure you take the time to setup secure passwords, device locks and remote wiping in case you leave your tablet in the back of some seedy cab after the AIIM 2011 conference
We have already several experts willing to help us on a number of topics, but would like some more experts for the below topics for an in-person workshop in Baltimore Tuesday, May 3, through Thursday, May 5; Digital Rights Management Mobile applications Text analytics Business intelligence Cloud computing Telecommuting support E-discovery Email archiving Security Those who participate in development of the examination will be allowed to take the certification exam at no cost