Posted inFrom the Archive

Information Governance: How to Destroy Data … for Good

Much of the emphasis on effective data management focuses (and understandably so) on processes that control the creation, transmission, and storage of data. There is, however, the equally pressing concern of effective data destruction. Records that no longer are useful, and that the organization isn’t legally required to maintain, present risks. “If you leave data […]

Posted inFrom the Archive

Info Governance: Tracking Data After It Has Left the Building

It’s difficult enough maintaining visibility and control over data located within the confines of the company. So what happens when data leaves the building, perhaps headed for a cloud provider, a third-party benefits administrator, or to the Comfort Inn inside a traveling employee’s laptop or tablet? Given the network of third parties, including resellers, vendors, […]

Posted inFrom the Archive

Companies Respond to Increased Whistleblower Protections

Most companies are finding they need to do more to add protections for an expanding group of potential whistleblowers, as new regulations on retaliation against employees who raise concerns proliferate. Not only have employers needed to comply with new whistleblower protections included in the Dodd-Frank Act administered by the Securities and Exchange Commission and the […]

Posted inFrom the Archive

Catching and Managing New Data

Just how much data are companies generating these days? Well the numbers are measured in Exabytes, a unit of measurement with 18 zeros. From the dawn of civilization until 2003, humankind generated roughly five exabytes of data. These days, according to Google Chairman Eric Schmidt, we produce five exabytes every two days, and the pace […]

Posted inRisk Management

Info Governance: Crafting an Effective Data Security Policy

How concerned are companies about data breaches? In a recent survey, executives said they worried more about leaks of customer or employee data than natural disasters or investigations by the Securities and Exchange Commission. The survey, conducted last year by Chubb found that corporate executives rank “an electronic security breach of customer or employee data” […]

Posted inEthics & Culture

Managing Compliance Risks in the Supply Chain

Last week, China-based electronics manufacturer Foxconn, best known as the contract manufacturer of Apple iPhones, admitted that underage “interns” as young as 14 were found working at one its factories. Incidents and allegations of sweatshop-like conditions at Foxconn have caused constant embarrassment for Apple and other electronics companies. Apple is hardly alone in having concerns […]

Gift this article