199 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 5
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 5
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 3
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 5
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 4
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 2
Top 10
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
Discovery Attender: Automatic Labels
Wed, Dec 9th 2015 6
Reducing eDiscovery Costs
Fri, Jan 8th 2016 6
White Paper: Implementing an Information Governance Program
Thu, Apr 3rd 2014 5
From LotusScript to Java: Part 3
Fri, May 2nd 2014 5
Justifications for Software Upgrades
Fri, Jun 13th 2014 5
Top 10 Horror Movies for Halloween
Thu, Oct 29th 2015 5
Why Data Mapping is Critical to Managing Corporate Data
Thu, Nov 5th 2015 5
Off the topic: Become a tailgating all-star
Thu, Nov 5th 2015 5
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 5


Sherpa Software
Blog Title Sherpa
Blog Description E-Discovery, Email Compliance and Email Archiving Blog
Blog URL http://www.sherpasoftware.com/blog/
RSS Feed http://www.sherpasoftware.com/blog/feed/
Validate Feed 2016-06-20 22:20:01 Failed to parse RSS file. (Invalid document end at line 2, column 1).

This could be a simple time out issue. Validate your feed here: feedvalidator.org or validator.w3.org
Feed Last Checked Oct 05, 2016 10:45:34 AM EST. Realtime Update:
Location


Recent Blog Posts
7
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 10:25a   Jeff Tujetsch
Ways to avoid Information Governance pitfalls Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is.  There are many components to IG, with the two major players being software and people. In this article, I will try to expose possible issues that you can hopefully avoid. For those of you that have had school-age kids, you can attest to the kids succeeding more when a routine is established and followed. So why am I talking about routine? Becaus
5
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 9:21a   Marta Farensbach
Finding PCI and PII Data with Discovery Attender Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit card numbers, social security numbers, social insurance information, and health care records. As described in a previous blog article, having this Personally Identifiable information (PII) or Payment Card Industry (PCI) data loose in your sy
5
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 12:25p   Harvey Coblin
With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes. Rather than transporting duplicate devices to distinguish between professional vs. personal data, employees can work where and when they please and with hardware and applications they are already familiar with. It is estimated worldwide that one in three employees are utilizing personal devices at the w
3
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 9:13a   Rick Wilson
If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding data protection regulation with the EU. It was adopted by the European Parliament Council and Commission in 2015, took effect in 2016 and enforcement is scheduled to begin in May of 2018. At its core, the GDPR is intended to provide citizens of the EU with greater control over their personal data a
5
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 2:04p   Marta Farensbach
Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a strong Information Governance (IG) platform, can introduce substantial risk into your organization. In the worst cases, data breaches, adverse judgements, or non-compliance penalties could thrust a company into the glare of national headlines. Poor policy can affect more than just the finances of a
0
[Video] Sherpa Altitude IG: An Overview
Wed, Oct 28th 2015 2:45p   Stephanie DiPaolo
Introducing Sherpa Altitude IG, the complete, cost-effective solution for Information Governance & eDiscovery. Altitude IG provides a comprehensive suite of tools to support multiple organizational functions from a single platform. Offering a high degree of flexibility, Altitude IG allows information professionals to craft a solution that best fits their individual information governance and eDiscovery needs. Watch the video to learn more! The post [Video] Sherpa Altitude IG: An Overview ap
1
Altitude IG October 2015 Updates
Wed, Oct 28th 2015 2:44p   Sherpa Software
The Altitude IG October update introduces new features for policy management and eDiscovery modules as well as a few administrative additions.  The following list details the changes: eDiscovery Module Updates: Allows Groups to be added as eDiscovery Custodians DeNISTing of search results* Added an option to provide the full-text of original documents and emails when viewing search result details on the console Policy Management Module Updates: Added an action to Copy/Move messages from O365




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition