General Data Protection Regulation: Protecting Both the Customers and the...
With the General Data Protection Regulation looming, organizations need to have stringent security policies and controls in place for protecting data. The post General Data Protection Regulation:...
View ArticleMicrosoft Dublin Case Highlights Impending Data Privacy “Firestorm”
The U.S. Justice Department is seeking to access emails stored in a Microsoft data center in Ireland which could bring data privacy and regulatory change. The post Microsoft Dublin Case Highlights...
View ArticleD’oh! Human Error/Careless Sharing Still a Top Cause of Data Breaches
While many assume the top causes of data breaches can be attributed to cyber thieves, the leading causes are actually due to "miscellaneous errors." The post D’oh! Human Error/Careless Sharing Still a...
View ArticleData Privacy Regulations: Bad for Business?
An international survey, commissioned by Intralinks and conducted by Ovum, explores the data sovereignty concerns around a cloud-based business environment. The post Data Privacy Regulations: Bad for...
View ArticlePracticing Law Securely — Security from the Start
Direction to use a secure repository / model at the outset and throughout the work for a General Counsel raises the level of protection for material information. The post Practicing Law Securely —...
View ArticleInformation Rights Management (IRM): What It Is and Why You Need It
Information Rights Management is a technology which protects sensitive information by embedding encryption and user permissions directly into the file. The post Information Rights Management (IRM):...
View ArticleMistakes: Unfortunate. Unforeseen. Unforgivable.
With the right permission, a secure collaboration solution with information rights management can give you the ability to UNshare anything. The post Mistakes: Unfortunate. Unforeseen. Unforgivable....
View ArticleData Privacy Day: How are Global Companies Reacting to New Data Privacy Regs?
To keep personally identifiable information safe in today’s digital world, national governments are enacting new data privacy laws around how information is stored, processed, and shared. The post Data...
View Article