Proactive Approach Eases Mobile eDiscovery Challenges

By |2020-06-15T10:52:56-04:00January 29th, 2020|eDiscovery, Information Governance and Management|

Remember the old days, when eDiscovery involved searching email servers, PCs and shared folders on the network? Mobile technology has changed all of that. Traditional collection methods prove woefully insufficient to address the complexities of today’s information environment. Legal teams must stay up to date to meet mobile eDiscovery challenges. Studies show that 90 percent of today’s workers use mobile devices to conduct business. They check email on their smartphones, handle sales meetings from a laptop or carry out business conversations through messaging. Any of this information may prove relevant in the case of litigation. But several factors make collecting

Comments Off on Proactive Approach Eases Mobile eDiscovery Challenges

Control Mobile Data: Information Governance Essential

By |2020-06-15T11:18:58-04:00January 22nd, 2020|Cyber-Security, Information Governance and Management|

Information governance to control mobile data and reduce the associated costs of eDiscovery becomes essential. One of the biggest and costliest issues facing organizations under legal litigation is the ability to accurately provide electronic records as evidence when requested by the courts in eDiscovery. Organizations either have no idea what email or electronic document data exists in their systems and employee devices or where that data may reside. The Challenge of Mobile Data In today’s global communications environment, electronic messages can circumnavigate the globe in seconds. Messages can exist on cellular telephones, PDA’s, laptops, home computers and backup tapes. And

Comments Off on Control Mobile Data: Information Governance Essential

5 Benefits of Data Governance for SMB Retailers

By |2020-06-01T09:02:09-04:00January 15th, 2020|Data Compliance, Information Governance and Management|

2020 ups the privacy ante for businesses in the United States, with tough new privacy laws taking effect in California and New York. Small businesses may qualify for exemptions from specific regulations. However, the focus on information management brings an opportunity to harness key business benefits of data governance for SMB retailers. 1. Protect Valuable Assets Just two years ago, The Economist pronounced the world’s most valuable resource to be not oil, but data. In retail, data powers all aspects of the business, from sales and marketing to HR and customer service. When retail businesses treat data as an asset,

Comments Off on 5 Benefits of Data Governance for SMB Retailers

6 Steps to Privacy Law Compliance for Retailers

By |2020-06-01T09:05:09-04:00January 8th, 2020|Data Compliance, Information Governance and Management, Privacy|

The dawn of 2020 brought more than winter weather and New Year’s resolutions. Retailers must now demonstrate compliance with information privacy laws in the US, such as the California Consumer Privacy Act (CCPA) and, soon, New York’s SHIELD law. With strict customer privacy laws, retail information governance to achieve privacy law compliance takes on a key strategic role. For instance, CCPA mandates that businesses provide consumers control over their private information. That is, consumers can request disclosure of all personal data regarding themselves and their households. They can opt out of the sale of that data, and they can request

Comments Off on 6 Steps to Privacy Law Compliance for Retailers

Healthcare Cyber Security Best Practices to Protect Patient Data in 2020

By |2020-05-22T04:50:59-04:00January 3rd, 2020|Cyber-Security|

In recent years, hackers have turned their attention to healthcare organizations. Not only do hospitals store valuable personal data, but they often underspend on cyber security. This makes them highly attractive targets. Investing in solid healthcare cyber-security protects essential data and ensures regulatory compliance. More importantly, it can quite literally save lives. Late last year, East Ohio Regional Hospital discovered a ransomware attack. Thanks to multi-layer defense systems and reliable backups, the hospital managed to recover with minimal damage. Other hospitals around the country have not proven so lucky. From disruption of services to exposure and loss of critical patient

Comments Off on Healthcare Cyber Security Best Practices to Protect Patient Data in 2020

Improved Customer Experience, Informed Decisions and Compliance from Retail Information Governance

By |2020-05-22T04:04:53-04:00December 26th, 2019|Cyber-Security, Information Governance and Management|

In the retail industry, data reigns. From market analysis to determining the success of a sales promotion, retailers depend on data to inform decisions and guide strategy. But without a way to organize and protect that data, it provides little value and can even prove a significant liability. Retail information governance promotes data quality and security. Consider a typical scenario. A clothing retailer sells merchandise through its brick and mortar store, as well as online. It gathers financial information online and through point-of-sale terminals in the store. Customers submit product reviews and sign up for loyalty programs. Email campaigns and

Comments Off on Improved Customer Experience, Informed Decisions and Compliance from Retail Information Governance

Create Rules to Automatically Sort Incoming Mail in Outlook

By |2023-03-17T13:27:03-04:00December 19th, 2019|Email Management Tips|

When you receive a lot of email, your inbox becomes cluttered and difficult to navigate. Thankfully, you can use create Rules in Outlook to sort your incoming email. Here are the steps to set up a rule in Outlook that will automatically put incoming mail from a particular sender into a specific folder: Select an email in your Inbox from the sender you'd like to create a new folder for. Go to Rules > Create Rule on the toolbar. Check the "From…" box at the top of the Create Rule window. Check "Move the item to folder:" at the bottom of the Create Rule dialog box,

Comments Off on Create Rules to Automatically Sort Incoming Mail in Outlook

3 Email Security Threats and How to Safeguard Your Business in 2020

By |2020-06-01T09:11:52-04:00December 18th, 2019|Cyber-Security, Email Management Tips, Email Policy|

Email security threats play a major role in the cyber battleground. In fact, most companies report they encountered email-based attacks in the past year. In addition, CSO Online reports that 92 percent of malware finds its way into the network via email. To protect their business and their customers, organizations need to anticipate email security threats and develop corresponding strategies. Experts predict that for 2020, major threats to email cyber security will include spear phishing, cloud-targeting ransomware and insufficient password measures. Spear Phishing Phishing attacks remain the primary cause of data breaches. In these attacks, criminals pose as legitimate business

Comments Off on 3 Email Security Threats and How to Safeguard Your Business in 2020

3 Reasons Organizations Need an Email Policy and How to Build a Good One

By |2020-06-01T09:13:38-04:00December 11th, 2019|Email Management Tips, Email Policy, Safety and Cyber Security|

Despite of the proliferation of messaging apps and video conferencing, email remains the preferred method for business communication. It offers simplicity, flexibility and immediacy. At the same time, email introduces substantial risk to an organization. A well-crafted email policy helps businesses tap into the benefits of email while mitigating the risks. For example, with a single email, a team leader can instantly communicate with her entire team. She can attach project files to the email and link the information to a calendar event. Any responses become part of a permanent conversation. Months later, an employee can reference that conversation with

Comments Off on 3 Reasons Organizations Need an Email Policy and How to Build a Good One

Ease the Pain of Public Records Requests with eDiscovery Best Practices

By |2020-06-01T09:20:44-04:00December 5th, 2019|eDiscovery, Information Governance and Management, Technology|

Municipal governments typically field hundreds of public records requests each year. Fulfilling those requests can cost public agencies hundreds of thousands of dollars, in addition to substantial time and frustration. But approaching public records requests with eDiscovery technology streamlines the process and greatly eases the burden. Public Records Laws and eDiscovery Public records requests and eDiscovery refer to two distinct but related processes. Large organizations have dealt with eDiscovery requests for decades. Many of the best practices used by these organizations easily apply to public records requests, as well. In fact, the U.S. Attorney General advised using modern technology to

Comments Off on Ease the Pain of Public Records Requests with eDiscovery Best Practices
Go to Top