Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

61 - 70 Results out of 131

Automating Information Governance – Assuring Compliance

Industry Watch

In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

SharePoint 2013 – Clouding the Issues

Industry Watch

In this report, we look at the adoption rates for SharePoint as an ECM/DM system, the ongoing issues of user adoption, and overall project success – or otherwise.

Information Governance – Records, Risks, and Retention in the Litigation Age

Industry Watch

In this report, we look at the risk profiles around electronic records, retain vs. delete options, e-discovery issues, and the implications of social and cloud on RM policies. We also look at the development of enterprise-wide governance policies, and how they translate into system strategies.

Electronic Records Management

What exactly is Electronic Records Management (ERM)? This quick study introduces ERM as a concept and describes some of the key business drivers associated with ERM today. 

How to Develop an ECM Strategy

The program strategy will outline the types of activities necessary to fulfill the mission of the program.

How to Create a File Plan in SharePoint 2013

Get guidance on how to establish a file plan to ensure effective records management in your SharePoint 2013 implementation.

How to Implement ECM

ECM, Enterprise Content Management, is the technologies used to capture, manage, store, preserve and deliver content and documents related to organizational processes. Implementing ECM can be a daunting task. This toolkit will help to make it a bit easier.

How to Handle Data Breaches

This toolkit will help you to establish a data breach management and notification process for your organization.

How to Develop, Deploy, and Maintain a Business Classification Scheme (BCS)

This toolkit will walk you through the process for developing a business classification system for your organization.

How to Design, Develop, Deploy, and Maintain a Records Retention Program

This toolkit will provide organizations with the necessary tools to design, develop, deploy, implement and maintain a Records Retention Program helping to mitigate some risk.

Back to Top Back to Top