Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

61 - 70 Results out of 127

How to Develop an ECM Strategy

The program strategy will outline the types of activities necessary to fulfill the mission of the program.

How to Create a File Plan in SharePoint 2013

Get guidance on how to establish a file plan to ensure effective records management in your SharePoint 2013 implementation.

How to Implement ECM

ECM, Enterprise Content Management, is the technologies used to capture, manage, store, preserve and deliver content and documents related to organizational processes. Implementing ECM can be a daunting task. This toolkit will help to make it a bit easier.

How to Handle Data Breaches

This toolkit will help you to establish a data breach management and notification process for your organization.

How to Design, Develop, Deploy, and Maintain a Records Retention Program

This toolkit will provide organizations with the necessary tools to design, develop, deploy, implement and maintain a Records Retention Program helping to mitigate some risk.

How to Build a Global Records Program

Find step by step guidance to help you craft a global records initiative, identify your requirements, and develop a global records retention schedule.

How to Develop, Deploy, and Maintain a Business Classification Scheme (BCS)

This toolkit will walk you through the process for developing a business classification system for your organization.

How to Determine the Right Type of Taxonomy for Your Business

In order to reap the value of information, we need to be able to access it quickly and easily. Taxonomies provide us with a logical structure for organizing our information, thereby making it quicker and easier to locate and use.

How to Plan Your Digital Workplace

The digital workplace is a challenge given that there are so many technologies available both as on-premises and as cloud or SaaS applications. To make matters more challenging, today’s worker is not only using technology at work but also at home and in many cases the technology they are using at home is far superior to the technology they have to use in the workplace.

How to Gauge Your Records Audit Readiness

Third party audits of records management policies, procedures, and technologies are important to demonstrate that the organization complies with the regulations, standards and best practices of the industry. 

Back to Top Back to Top