Practicing Law Securely — Working with Information Rights Management
Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...
View ArticleGeneral Data Protection Regulation: Protecting Both the Customers and the...
With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...
View ArticleMicrosoft Dublin Case Highlights Impending Data Privacy “Firestorm”
The U.S. Justice Department is seeking to access emails stored in a Microsoft data center in Ireland which could bring data privacy and regulatory change. The post Microsoft Dublin Case Highlights...
View ArticleD’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches
While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...
View ArticleData Privacy Regulations: Bad for Business?
An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...
View ArticlePracticing Law Securely — Security from the Start
Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...
View ArticleInformation Rights Management (IRM): What It Is and Why You Need It
Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...
View ArticleMistakes: Unfortunate. Unforeseen. Unforgivable.
With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....
View ArticleData Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?
To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...
View ArticleIntralinks’ Approach to Data Sovereignty Compliance
Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...
View Article4 Easy Security Tips to Keep Data Protected
Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...
View ArticleHaving Trouble Sharing Content Externally Using SharePoint? Intralinks Can Help.
Many companies neglect to address security gaps in how information is shared externally. There is a solution: Intralinks Content Collaboration Network™. The post Having Trouble Sharing Content...
View ArticleWho Says the Security Perimeter is Dead? Content is the New Perimeter.
It's a tough job to build security around an organization's data and information. This is why we suggest building security into the data/information itself. The post Who Says the Security Perimeter is...
View ArticleData Privacy Regulations: Bad for Business?
An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...
View ArticlePracticing Law Securely — Security from the Start
Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...
View ArticleInformation Rights Management (IRM): What It Is and Why You Need It
Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...
View ArticleMistakes: Unfortunate. Unforeseen. Unforgivable.
With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....
View ArticleData Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?
To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...
View ArticleIntralinks’ Approach to Data Sovereignty Compliance
Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...
View ArticleCyber Risk and Data Security Top of Mind at Insurance and Risk Linked...
The cyber insurance market is growing significantly; it's more than doubled in the past two years growing from $1 billion in 2013 to $2.5 billion 2015. The post Cyber Risk and Data Security Top of Mind...
View Article