Quantcast
Channel: Information rights management – Intralinks Blog
Browsing all 68 articles
Browse latest View live

Practicing Law Securely — Working with Information Rights Management

Information Rights Management (IRM) provides end-to-end control of a document. When beginning to work with IRM, here are the key questions you might have. The post Practicing Law Securely — Working...

View Article


General Data Protection Regulation: Protecting Both the Customers and the...

With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...

View Article


Microsoft Dublin Case Highlights Impending Data Privacy “Firestorm”

The U.S. Justice Department is seeking to access emails stored in a Microsoft data center in Ireland which could bring data privacy and regulatory change. The post Microsoft Dublin Case Highlights...

View Article

D’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches

While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...

View Article

Data Privacy Regulations: Bad for Business?

An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...

View Article


Practicing Law Securely — Security from the Start

Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...

View Article

Information Rights Management (IRM): What It Is and Why You Need It

Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...

View Article

Mistakes: Unfortunate. Unforeseen. Unforgivable.

With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....

View Article


Data Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?  

To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...

View Article


Intralinks’ Approach to Data Sovereignty Compliance

Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...

View Article

4 Easy Security Tips to Keep Data Protected

Everyone should take steps to keep their sensitive information safe. In light of World Password Day, here are some easy data protection tips you can follow. The post 4 Easy Security Tips to Keep Data...

View Article

Having Trouble Sharing Content Externally Using SharePoint? Intralinks Can Help.

Many companies neglect to address security gaps in how information is shared externally. There is a solution: Intralinks Content Collaboration Network™. The post Having Trouble Sharing Content...

View Article

Who Says the Security Perimeter is Dead? Content is the New Perimeter.

It's a tough job to build security around an organization's data and information. This is why we suggest building security into the data/information itself. The post Who Says the Security Perimeter is...

View Article


Data Privacy Regulations: Bad for Business?

An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...

View Article

Practicing Law Securely — Security from the Start

Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...

View Article


Information Rights Management (IRM): What It Is and Why You Need It

Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...

View Article

Mistakes: Unfortunate. Unforeseen. Unforgivable.

With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....

View Article


Data Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?  

To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...

View Article

Intralinks’ Approach to Data Sovereignty Compliance

Data sovereignty is a concern for compliance, privacy and legal teams who are responsible for ensuring the enterprise meets its regulatory obligations. The post Intralinks’ Approach to Data Sovereignty...

View Article

Cyber Risk and Data Security Top of Mind at Insurance and Risk Linked...

The cyber insurance market is growing significantly; it's more than doubled in the past two years growing from $1 billion in 2013 to $2.5 billion 2015. The post Cyber Risk and Data Security Top of Mind...

View Article
Browsing all 68 articles
Browse latest View live