Information Management

Professional journal on records and information management.

Articles from Vol. 48, No. 5, September/October

10 Things Organizations Should Do to Protect against Hacking
A recent New York Times report about a Russian gang that collected the Internet security data of 1.2 billion people has stirred a maelstrom of pundits wondering if the situation is as dire as it sounds or just sensationalistic reporting. Regardless,...
Apple to Team with IBM
And they said it would never happen. Apple recently announced that it was teaming with its former nemesis to bring IBM's big data and analytics capabilities to iPhone® and iPad®. Together they will develop more than 100 industry-specific applications,...
BULLETIN BOARD: Vendors, Products & People
Recall Holdings Limited (ASX: REC), a global leader in information management, announced that it was awarded ISO/ IEC 27001:2005 Management System certification by SRI Quality System Registrar on December 19, 2013. Recall is the first information management...
Closing the Gap between Policy and ECM Implementation Using Privacy by Design
T he core idea of the Privacy by Design (PbD) software engineering approach is that privacy controls should be built into information systems that capture and manage personal information. Its focus is on consumerfacing applications and platforms, such...
Congress Asked to Help Protect Consumers' Data
The Federal Trade Commission (FTC) recently asked Congress to do more to protect consumers against the unchecked collection and sharing of their digital data by providing them with tools to view, suppress, and change their information. The agency also...
Cyber Crime Costs More Than $400B Annually
A new McAfee-sponsored report from the Center for Strategic and International Studies (CSIS) revealed that cyber crime is having a significant impact on economies around the world. More specifically, it has cost businesses worldwide between $375 billion...
Europe and Canada Embrace Right to Be Forgotten
PRIVACYThe right to be forgotten (RTBF) is gaining ground. Both Europe and Canada have implemented RTBF regulations and are looking at extending it beyond national boundaries.Europe's RTBF regulations went into effect May 30, and by July 3 Google already...
Europeans Call for a Single Copyright
The European Commission (EC) received an earful when it asked for public comment on the EU copyright rules earlier this year. It seems many European consumers want a single EU copyright. They are frustrated with being denied cross-border access to online...
Europe Turns Up the Heat on Google's Privacy Policy
It's taken more than two years and two appeals, but a privacy class action suit filed against Google in 2012 will be moving ahead, at least in part. The suit was filed in response to Google's adoption of a single, unified policy that allowed it to commingle...
Investing in Privacy and Your Career - by Design
Flipping through the "Up Front" section of most issues of Information Management reveals the extent to which privacy is a growing concern for governments, businesses, and consumers around the world.In this issue, for example, you can read several privacy-related...
Needed: Cybersecurity Professionals
The need for skilled cybersecurity specialists has grown exponentially as governments and businesses have raced to protect their networks from cyber attacks from all directions. Unfortunately, the supply doesn't begin to meet the demand, which some believe...
New Risk Maturity Index Emerges from Study
A recent Pricewaterhouse- Coopers (PwC) study found that most organizations (almost 60%) in Europe and North America are aware of the importance of their information and its role in gaining competitive advantage. The challenge is protecting it from internal...
NIST Drafts Cloud Forensic Standard
CLOUDThe increased use of cloud computing brings new and bigger challenges for those involved in digital forensics. As the National Institute of Standards and Technology (NIST) recently pointed out, "The characteristics that make this new technology...
Principles for Protecting Information Privacy
When it's done well, information privacy protection is part of an organization's policy and procedural infrastructure, working in the background like a silent sentinel that few realize is constantly on alert. When it's done poorly, it makes headlines...
Six Steps for Creating a 'Super Data Map'
Do you know where your records actually live - in which systems and on what media? How about your privacy information? Do you know what content is where when you need to place a legal hold?Multiple groups in an organization need to know what information...
Study: Mobile Users Shape the Cloud Computing Landscape
CLOUDThanks in lareg part to the increasing use of mibile devices for business purposes,the majority of the companies in the United States and Europe have made the move to the cloud, according to a new study by Frost & Sullivan. Although U.S. organizations...
Too Small for a Cyber Attack?
Small businesses don't need to worry about cyber attacks, right? After all, you only hear about large enterprises and some mid-size businesses being hacked.While the latter statement is true enough, that doesn't mean small businesses aren't at risk,...
Tossing the Tape? Implications of Making the Switch to Disk-Based Backups
In the last few years, production of electronically stored information (ESI) for business and other purposes has increased exponentially. As the amount of information that organizations maintain grows, so do the costs and risks associated with effectively...
U.S. and European Lawmakers Scrutinize Facebook
Facebook continues to draw fire from its users, privacy groups, and some lawmakers in both the United States and Europe. The uproar this time is over the recent disclosure of a blind research study the social network site conducted one week in January...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.