This presentation, delivered at the AIIM23 conference in New Orleans on April 26, 2023, described how to leverage good privacy practices, including data minimization, to build customer trust.
On-demand recording link:https://info.trustarc.com/WB-2019-06-19-GDPR-Compliance-Convince-Customers-Partners-Board.html?utm_source=slideshare
Many companies have invested significant time and resources trying to design and implement GDPR compliance programs. Internally, they may have generated hundreds or thousands of pages of project plans, policies, processes and reports – including records of processing, DPIA reports and much more. But how can you demonstrate to internal stakeholders, clients and partners that you have a comprehensive program and that your processes and products are GDPR-compliant?
This webinar will provide these key takeaways:
-The current state of an official GDPR certification and codes of conduct
-Case studies of how companies are demonstrating compliance
-The benefits of an external third party GDPR validation
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
Privacy is a topic that inevitably emerges whenever people speak about technology or business. What is it, really? How can you build a program to support it and balance it within our businesses? This session will cover the basics of a privacy program for organisations, some of the more applicable regulations on privacy, how to find the right balance and how to begin to implement your program. We will also discuss how to position your privacy program as a business enabler, establish some lightweight internal governance processes as well as customer and employee communications and awareness, too. Bring your questions and cases to review and analyse.
Records Managers within Law Firms have a tough job, providing and enforcing policies, building out defensible procedures and overseeing an information lifecycle program. Over the years process has changed, regulations have been tightened and expectations have heightened.
In this presentation, understand how Information Governance (IG) is playing a major role in the evolution of Records Management within Law Firms. Information Governance is a term being thrown around and many (or at least those brave enough to admit it) are unsure of what it really means. IG relies on automation, systems, tools and compliance to succeed. With records managers focus on risk avoidance, join us to better understand the new expectations of records managers to protect your firm as well as steps to implementing an IG Program.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
Join Andrew Ysasi, Vice President of IG Advocacy for Vital Records Control, President of IG GURU®, MS, FIP, FIIM, CIPM, CIGO, CISM, PMP, CRM, IGP, CIP, CSAP, as he explains why organizations need to have an organized and intentional approach to address privacy matters.
On-demand recording link:https://info.trustarc.com/WB-2019-06-19-GDPR-Compliance-Convince-Customers-Partners-Board.html?utm_source=slideshare
Many companies have invested significant time and resources trying to design and implement GDPR compliance programs. Internally, they may have generated hundreds or thousands of pages of project plans, policies, processes and reports – including records of processing, DPIA reports and much more. But how can you demonstrate to internal stakeholders, clients and partners that you have a comprehensive program and that your processes and products are GDPR-compliant?
This webinar will provide these key takeaways:
-The current state of an official GDPR certification and codes of conduct
-Case studies of how companies are demonstrating compliance
-The benefits of an external third party GDPR validation
Building an effective Information Security RoadmapElliott Franklin
As company information security functions continue to grow each year with increasing attacks and regulations, how are you handling the
pressure? Are you constantly battling to run the business projects and reacting to customer requests? Have you blocked off a few hours each week
on your calendar to close your email, turn off your phone and try to build, assess and maintain an effective vision for your security team? This
presentation will discuss a cascading approach to creating such a roadmap that is easily understood by executives and has helped gain quick buy
in for multiple enterprise wide security projects.
Privacy is a topic that inevitably emerges whenever people speak about technology or business. What is it, really? How can you build a program to support it and balance it within our businesses? This session will cover the basics of a privacy program for organisations, some of the more applicable regulations on privacy, how to find the right balance and how to begin to implement your program. We will also discuss how to position your privacy program as a business enabler, establish some lightweight internal governance processes as well as customer and employee communications and awareness, too. Bring your questions and cases to review and analyse.
Records Managers within Law Firms have a tough job, providing and enforcing policies, building out defensible procedures and overseeing an information lifecycle program. Over the years process has changed, regulations have been tightened and expectations have heightened.
In this presentation, understand how Information Governance (IG) is playing a major role in the evolution of Records Management within Law Firms. Information Governance is a term being thrown around and many (or at least those brave enough to admit it) are unsure of what it really means. IG relies on automation, systems, tools and compliance to succeed. With records managers focus on risk avoidance, join us to better understand the new expectations of records managers to protect your firm as well as steps to implementing an IG Program.
Due to the evolution of personalized, data-driven digital marketing, companies now have infinite amounts of personally identifiable information (PII) about their customers; and this stockpile of information continues to grow—at an exponential rate. In fact, according to the Pew Research Center, the volume of business data worldwide—across all industries—doubles every 1.2 years.
But how should you use this treasure trove of data? And at what point does the information known about your consumers—and the ways you use this information—risk consumer privacy? Is there such thing as too much data?
Attend this webinar to learn:
• What your responsibilities are in today’s ‘big data universe’
• How to use your data and meet compliance laws
• Tips for integrating data across channels and platforms
• How to implement the principles of ‘Privacy by Design’
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...Aggregage
Join Andrew Ysasi, Vice President of IG Advocacy for Vital Records Control, President of IG GURU®, MS, FIP, FIIM, CIPM, CIGO, CISM, PMP, CRM, IGP, CIP, CSAP, as he explains why organizations need to have an organized and intentional approach to address privacy matters.
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
CCPA is in full effect and - as of July 1, 2020 - is being fully enforced. The “wait and see” game is officially over and organizations must be fully compliant in order to avoid regulatory fines and negative publicity. There are many requirements set forth by the CCPA, and building a strong compliance plan can be daunting. Not only does the compliance plan need to be set-up for future growth and changes, but it also needs the flexibility to produce on-demand, customized reports to provide to stakeholders.
TrustArc has helped organizations of all sizes and maturity with CCPA compliance from simple assessments to full automation. Investing time upfront to perform the proper analysis and planning is key to feeling confident that your CCPA compliance program will efficiently and effectively mitigate risk while meeting business objectives.
Join this webinar to see how TrustArc CCPA solutions help organizations of all sizes and maturity achieve and maintain compliance.
This webinar will review:
-Stages of CCPA program maturity
-TrustArc CCPA solutions for every stage of compliance
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/building-pia-dpia-program-webinar.html
DPIA/PIA guidance, tips for success and case studies from the field.
The GDPR mandates Privacy by Design and requires documented Data Protection Impact Assessments (DPIAs) for high risk processing. How can you build this into a sustainable program across your business? Having a good understanding of what DPIA/PIAs are and how to implement them can be the key to embedding privacy in the heart of your organization as well as achieving GDPR compliance.
Watch this webinar on-demand to:
- Hear PIA best practices
- Review GDPR compliance requirements
- Receive a range of tips and tools to help streamline and embed the process
- Hear how Volvo Financial Services has approached assessments across their organization
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Most of the attention around Analytics goes to the results of the Analytics activity - a better customer profile, a new target market, more efficient product design. What about the process and infrastructure that is needed to get the data to the point in which it is useful to the Analytics community? This presentation addresses the less glamorous, but critically important side of Analytics: the people, process and technology infrastructure that enable an analytics-driven organization.
The presentation will cover these questions:
• How do you align your information assets to your Analytics goals? What data do you need and where do you find it?
• What are the organizational constructs that need to be considered to integrate Data Governance and Analytics?
• What organizational change can be anticipated and how should it be addressed?
• How do you design your data management and data governance programs to support Analytics? How is this different than an operational use case?
This slide deck is drawn from a tutorial presented jointly with Samra Sulaiman of ConsultData at Enterprise Dataversity 2015.
The Privacy and Security Behaviors of Smartphone, at USEC 2014Jason Hong
Talk presented at USEC 2014.
Smartphone app developers have to make many privacy-related decisions about what data to collect about end-users, and how that data is used. We explore how app developers make decisions about privacy and security. Additionally, we examine whether any privacy and security behaviors are related to characteristics of the app development companies. We conduct a series of interviews with 13 app developers to obtain rich qualitative information about privacy and security decision-making. We use an online survey of 228 app developers to quantify behaviors and test our hypotheses about the relationship between privacy and security behaviors and company characteristics. We find that smaller companies are less likely to demonstrate positive privacy and security behaviors. Additionally, although third-party tools for ads and analytics are pervasive, developers aren’t aware of the data collected by these tools. We suggest tools and opportunities to reduce the barriers for app developers to implement privacy and security best practices.
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
Do you ever wonder how data-driven organizations fuel analytics, improve customer experience, and accelerate business productivity? They are successful by governing and mastering data effectively so they can get trusted data to those who need it faster. Efficient data discovery, mastering and democratization is critical for swiftly linking accurate data with business consumers. When business teams can quickly and easily locate, interpret, trust, and apply data assets to support sound business judgment, it takes less time to see value.
Join data mastering and data governance experts from Informatica—plus a real-world organization empowering trusted data for analytics—for a lively panel discussion. You’ll hear more about how a single cloud-native approach can help global businesses in any economy create more value—faster, more reliably, and with more confidence—by making data management and governance easier to implement.
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
Today, growing an organization through Mergers & Acquisitions (M&A) has become a popular business practice. This can lead to great success but it can also cause a potential liability to the acquirer if global data privacy laws and regulations are not considered during the acquisition. Businesses that adopt this strategy need to be aware of how to handle the data involved in the acquisitions.
Between new and evolving data privacy laws, an increased focus on regulators, and increased liability on the acquirer, incorporating data privacy practices is necessary for the M&A transaction process.
Emerging Data Quality Trends for Governing and Analyzing Big DataDATAVERSITY
Business initiatives across industries are applying more data than ever to drive analytics and AI in the quest for new competitive insights. As the volume and variety of data gathered by organizations continues to escalate, both on-premises and in the cloud, traditional methods of Data Quality are transforming to meet this Big Data challenge. This webinar looks at these emerging trends in Data Quality to address Data Governance, entity resolution at scale, AI and machine learning, and establishing Data Quality as a core tenet of data literacy.
Emerging Data Quality Trends for Governing and Analyzing Big DataPrecisely
Business initiatives across industries are applying more data than ever to drive analytics and AI in the quest for new competitive insights. As the volume and variety of data gathered by organizations continues to escalate, both on-premises and in the cloud, traditional methods of data quality are transforming to meet this Big Data challenge.
View this Dataversity-sponsored webinar on-demand as we look at these emerging trends in data quality to address data governance, entity resolution at scale, AI and machine learning, and establishing data quality as a core tenet of data literacy.
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
This presentation highlights the major principles and rights enshrined in the General Data Protection Regulations (GDPR) as well as 10 steps organisations (whether large or small) can take to ensure compliance.
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
One North’s Managing Director of Technology Ryan Horner and legal process and technology consultant Bob Beach share details on how the EU’s General Data Protection Regulation (GDPR) could impact digital assets.
This webinar is designed to educate digital marketers, share actionable examples, and provide an overview of how One North can help clients ensure their digital properties are in compliance with the regulation and execute on those efforts. Beyond GDPR compliance, the session will also highlight important information for marketers as data privacy continues to become a critical and strategic component of digital.
Access the recording: https://youtu.be/ruQpN70LGt0
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
Over the past few months, we’ve seen employees quit in record numbers. While there are many reasons for “The Great Resignation”, a standout is employee trust. A study from Gallup suggests that only one in three employees strongly agree that they trust the leadership of their organization.
Employees want to trust the companies they work at and the people they work with. They want to feel comfortable coming to HR with their complaints and concerns. But building trust takes time, and effort. As organizations are planning their post-pandemic strategies, now is a perfect time to place an intentional emphasis on building trust.
Enterprise search, once a hot topic, now faces new challenges with the adoption of hybrid and cloud environments. In SharePoint and Office 365, search isn’t equal, and before jumping on the Office 365 band wagon, organizations need to know as much as they can about potential challenges and pitfalls. Even in a SharePoint stand-alone environment, the consumption of content is forcing a renewed look at security, information lifecycle management, and non-compliance. Join us on Tuesday, October 28th, at 11:30am – 12:30pm EDT for this webinar packed with information on how to address search issues in SharePoint stand-alone, Office 365 hybrid, or cloud-only environments.
If you’re not sure how you would answer any of the below questions below, then this webinar is for you:.
• Does an enterprise search engine that provides the same transparency both on-premise and in the cloud matter to you? Does it matter to your users?
• With the huge push for Office 365, is enterprise search getting lost?
• Will the announcement of Delve push you over the edge in adopting Office 365? Why?
• What about managing content in the cloud? Do you have any reservations about security,or records, and what your users are doing in the cloud? (Bet you’ll be surprised.)
• What about migration? What goes where?
• How will you know what’s on your users’ OneDrives? Is DLP enough?
• Is your SharePoint search good enough? Have you calculated the ROI you can gain by improving it?
• How are you going to manage the ever increasing consumption of organizational content?
How to Build and Implement your Company's Information Security ProgramFinancial Poise
Data is one of your business’s most valuable assets and requires protection like any other asset. How can you protect your data from unauthorized access or inadvertent disclosure?
An information security program is designed to protect the confidentiality, integrity, and availability of your company’s data and information technology assets. Federal, state, or international law may also require your business to have an information security program in place.
This webinar will provide the basics of how to create and implement an information security program, beginning with identifying your incident response team, putting applicable insurance policies into place, and closing any gaps in the security of your data.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/how-to-build-and-implement-your-companys-information-security-program-2021/
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
More Related Content
Similar to 20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Milwaukee chapter on April 25, 2024, reviewed the 6 eras of records management, defined the characteristics of the age of privacy, outlined the concepts of defensible disposition and data minimization, and presented a recommendation to move in the direction of purpose-based retention and a personal information retention schedule.
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsTrustArc
CCPA is in full effect and - as of July 1, 2020 - is being fully enforced. The “wait and see” game is officially over and organizations must be fully compliant in order to avoid regulatory fines and negative publicity. There are many requirements set forth by the CCPA, and building a strong compliance plan can be daunting. Not only does the compliance plan need to be set-up for future growth and changes, but it also needs the flexibility to produce on-demand, customized reports to provide to stakeholders.
TrustArc has helped organizations of all sizes and maturity with CCPA compliance from simple assessments to full automation. Investing time upfront to perform the proper analysis and planning is key to feeling confident that your CCPA compliance program will efficiently and effectively mitigate risk while meeting business objectives.
Join this webinar to see how TrustArc CCPA solutions help organizations of all sizes and maturity achieve and maintain compliance.
This webinar will review:
-Stages of CCPA program maturity
-TrustArc CCPA solutions for every stage of compliance
Building Your DPIA/PIA Program: Tips & Case Studies [TrustArc Webinar Slides]TrustArc
Watch the webinar on-demand: https://info.trustarc.com/building-pia-dpia-program-webinar.html
DPIA/PIA guidance, tips for success and case studies from the field.
The GDPR mandates Privacy by Design and requires documented Data Protection Impact Assessments (DPIAs) for high risk processing. How can you build this into a sustainable program across your business? Having a good understanding of what DPIA/PIAs are and how to implement them can be the key to embedding privacy in the heart of your organization as well as achieving GDPR compliance.
Watch this webinar on-demand to:
- Hear PIA best practices
- Review GDPR compliance requirements
- Receive a range of tips and tools to help streamline and embed the process
- Hear how Volvo Financial Services has approached assessments across their organization
To register for upcoming/on-demand webinars visit: https://www.trustarc.com/events/webinar-schedule/
Most of the attention around Analytics goes to the results of the Analytics activity - a better customer profile, a new target market, more efficient product design. What about the process and infrastructure that is needed to get the data to the point in which it is useful to the Analytics community? This presentation addresses the less glamorous, but critically important side of Analytics: the people, process and technology infrastructure that enable an analytics-driven organization.
The presentation will cover these questions:
• How do you align your information assets to your Analytics goals? What data do you need and where do you find it?
• What are the organizational constructs that need to be considered to integrate Data Governance and Analytics?
• What organizational change can be anticipated and how should it be addressed?
• How do you design your data management and data governance programs to support Analytics? How is this different than an operational use case?
This slide deck is drawn from a tutorial presented jointly with Samra Sulaiman of ConsultData at Enterprise Dataversity 2015.
The Privacy and Security Behaviors of Smartphone, at USEC 2014Jason Hong
Talk presented at USEC 2014.
Smartphone app developers have to make many privacy-related decisions about what data to collect about end-users, and how that data is used. We explore how app developers make decisions about privacy and security. Additionally, we examine whether any privacy and security behaviors are related to characteristics of the app development companies. We conduct a series of interviews with 13 app developers to obtain rich qualitative information about privacy and security decision-making. We use an online survey of 228 app developers to quantify behaviors and test our hypotheses about the relationship between privacy and security behaviors and company characteristics. We find that smaller companies are less likely to demonstrate positive privacy and security behaviors. Additionally, although third-party tools for ads and analytics are pervasive, developers aren’t aware of the data collected by these tools. We suggest tools and opportunities to reduce the barriers for app developers to implement privacy and security best practices.
Data at the Speed of Business with Data Mastering and GovernanceDATAVERSITY
Do you ever wonder how data-driven organizations fuel analytics, improve customer experience, and accelerate business productivity? They are successful by governing and mastering data effectively so they can get trusted data to those who need it faster. Efficient data discovery, mastering and democratization is critical for swiftly linking accurate data with business consumers. When business teams can quickly and easily locate, interpret, trust, and apply data assets to support sound business judgment, it takes less time to see value.
Join data mastering and data governance experts from Informatica—plus a real-world organization empowering trusted data for analytics—for a lively panel discussion. You’ll hear more about how a single cloud-native approach can help global businesses in any economy create more value—faster, more reliably, and with more confidence—by making data management and governance easier to implement.
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
Today, growing an organization through Mergers & Acquisitions (M&A) has become a popular business practice. This can lead to great success but it can also cause a potential liability to the acquirer if global data privacy laws and regulations are not considered during the acquisition. Businesses that adopt this strategy need to be aware of how to handle the data involved in the acquisitions.
Between new and evolving data privacy laws, an increased focus on regulators, and increased liability on the acquirer, incorporating data privacy practices is necessary for the M&A transaction process.
Emerging Data Quality Trends for Governing and Analyzing Big DataDATAVERSITY
Business initiatives across industries are applying more data than ever to drive analytics and AI in the quest for new competitive insights. As the volume and variety of data gathered by organizations continues to escalate, both on-premises and in the cloud, traditional methods of Data Quality are transforming to meet this Big Data challenge. This webinar looks at these emerging trends in Data Quality to address Data Governance, entity resolution at scale, AI and machine learning, and establishing Data Quality as a core tenet of data literacy.
Emerging Data Quality Trends for Governing and Analyzing Big DataPrecisely
Business initiatives across industries are applying more data than ever to drive analytics and AI in the quest for new competitive insights. As the volume and variety of data gathered by organizations continues to escalate, both on-premises and in the cloud, traditional methods of data quality are transforming to meet this Big Data challenge.
View this Dataversity-sponsored webinar on-demand as we look at these emerging trends in data quality to address data governance, entity resolution at scale, AI and machine learning, and establishing data quality as a core tenet of data literacy.
Data protection: Steps Organisations can take to ensure complianceEquiGov Institute
This presentation highlights the major principles and rights enshrined in the General Data Protection Regulations (GDPR) as well as 10 steps organisations (whether large or small) can take to ensure compliance.
#1NWebinar: GDPR and Privacy Best Practices for Digital MarketersOne North
One North’s Managing Director of Technology Ryan Horner and legal process and technology consultant Bob Beach share details on how the EU’s General Data Protection Regulation (GDPR) could impact digital assets.
This webinar is designed to educate digital marketers, share actionable examples, and provide an overview of how One North can help clients ensure their digital properties are in compliance with the regulation and execute on those efforts. Beyond GDPR compliance, the session will also highlight important information for marketers as data privacy continues to become a critical and strategic component of digital.
Access the recording: https://youtu.be/ruQpN70LGt0
5 Ways to Build Employee Trust for Less Turnover and Fewer IncidentsCase IQ
Over the past few months, we’ve seen employees quit in record numbers. While there are many reasons for “The Great Resignation”, a standout is employee trust. A study from Gallup suggests that only one in three employees strongly agree that they trust the leadership of their organization.
Employees want to trust the companies they work at and the people they work with. They want to feel comfortable coming to HR with their complaints and concerns. But building trust takes time, and effort. As organizations are planning their post-pandemic strategies, now is a perfect time to place an intentional emphasis on building trust.
Enterprise search, once a hot topic, now faces new challenges with the adoption of hybrid and cloud environments. In SharePoint and Office 365, search isn’t equal, and before jumping on the Office 365 band wagon, organizations need to know as much as they can about potential challenges and pitfalls. Even in a SharePoint stand-alone environment, the consumption of content is forcing a renewed look at security, information lifecycle management, and non-compliance. Join us on Tuesday, October 28th, at 11:30am – 12:30pm EDT for this webinar packed with information on how to address search issues in SharePoint stand-alone, Office 365 hybrid, or cloud-only environments.
If you’re not sure how you would answer any of the below questions below, then this webinar is for you:.
• Does an enterprise search engine that provides the same transparency both on-premise and in the cloud matter to you? Does it matter to your users?
• With the huge push for Office 365, is enterprise search getting lost?
• Will the announcement of Delve push you over the edge in adopting Office 365? Why?
• What about managing content in the cloud? Do you have any reservations about security,or records, and what your users are doing in the cloud? (Bet you’ll be surprised.)
• What about migration? What goes where?
• How will you know what’s on your users’ OneDrives? Is DLP enough?
• Is your SharePoint search good enough? Have you calculated the ROI you can gain by improving it?
• How are you going to manage the ever increasing consumption of organizational content?
How to Build and Implement your Company's Information Security ProgramFinancial Poise
Data is one of your business’s most valuable assets and requires protection like any other asset. How can you protect your data from unauthorized access or inadvertent disclosure?
An information security program is designed to protect the confidentiality, integrity, and availability of your company’s data and information technology assets. Federal, state, or international law may also require your business to have an information security program in place.
This webinar will provide the basics of how to create and implement an information security program, beginning with identifying your incident response team, putting applicable insurance policies into place, and closing any gaps in the security of your data.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/how-to-build-and-implement-your-companys-information-security-program-2021/
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Northeast Ohio Chapter on April 9, 2024, outlined the purpose and benefits of building a RIM Playbook, described the elements of a playbook, described the elements of a ply, and outlined the steps to take to build a playbook.
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Oklahoma chapter on February 15, 2024, introduced attendees to the idea of a business and RIM playbook. Attendees learned about the benefits of a playbook, the elements of a playbook, and the elements of a play. The session concluded with a review of the process for building a playbook from scratch.
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...Jesse Wilkins
This presentation, delivered virtually to the ARMA Chattanooga chapter on February 13, 2024, described the elements of a business assessment, a technical assessment, and a maturity assessment in support of an information management initiative.
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...Jesse Wilkins
This presentation, delivered virtually on February 2, 2024 as part of the Austin ARMA Annual Conference, introduced the idea of a records management playbook. I described the purpose and benefits of a playbook, then outlined the elements of a playbook and the individual plays.
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater St. Louis Chapter on January 18, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptxJesse Wilkins
This presentation, delivered virtually to the ARMA Greater Kansas City Chapter on January 10, 2024, outlined how to build a records management playbook. The presentation described the benefits of building a playbook, the elements of a playbook, the elements of a play, and how to actually build and maintain one.
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....Jesse Wilkins
This presentation, delivered virtually to the ARMA Madison Chapter on December 7, 2023, outlined the value of a business playbook and, specifically, a records and information management (RIM) playbook. Attendees learned about the elements of a playbook and of individual plays and how to construct their own playbooks using a provided template.
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...Jesse Wilkins
This presentation, delivered virtually to the ARMA Florida Gulf Chapter on December 19, 2023, outlined the value of certifications and described three class of certifications including RIM, "RIM-adjacent", and "Other". Attendees received an overview of the 6 RIM certifications and a table comparing their exams and programs. The session concluded with a framework for determining how to select the most appropriate certification based on costs, context, and program visibility and market awareness.
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...Jesse Wilkins
This presentation was delivered virtually to ARMA San Diego on October 5, 2023. It compared and contrasted the various information governance / information management-related certifications and presented a framework for deciding which one(s) to pursue based on an individual's career goals.
20230719 ARMA Canada Professional Development.pptxJesse Wilkins
This presentation, delivered at the ARMA Canada Information Conference on July 19, 2023 in Toronto, outlined a framework for professional development in the IM industry. Attendees learned about the 4 types of learning and the 5 domains IM professionals need to understand. Attendees also received a professional development plan template.
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptxJesse Wilkins
This presentation, delivered on July 17, 2023, at the ARMA Canada Information Conference, compared and contrasted the various IM and IM-adjacent certifications. Attendees also learned how to determine the right certification for them based on their career goals.
20230919 ARMA New England Keynote on IG Industry Trends.pptxJesse Wilkins
This keynote, delivered at the ARMA New England Win with IG seminar on September 19, 2023, outlined the state of the IG industry from three perspectives: what industry analysts are talking about, what the key conference sessions are about, and what individual chapters and vendors are talking about. The session concluded with ways for individuals to keep abreast of developments in IG.
20230117 ARMA MHD Building Your RM Playbook.pptxJesse Wilkins
This presentation, delivered to the ARMA Mile High Denver Chapter on January 17, 2023, outlined the value and benefits of building a records management playbook. Attendees learned about the elements of a playbook and the individual plays within the playbook. The session concluded with a discussion of how to actually build a RM playbook.
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social MediaJesse Wilkins
This presentation, delivered to the ARMA Boston Chapter on June 2, 2016, outlined how to apply information governance practices to social media posts. It described specific social media security threats and gave attendees an opportunity to participate in roundtable discussions.
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...Jesse Wilkins
This presentation, delivered at the MER conference in Chicago on May 23, 2023, introduced attendees to the concept of an information governance playbook. Attendees learned the purpose and value of a playbook, as well as the structure of a playbook and of individual plays. The session concluded with a discussion of how to build and maintain a playbook.
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...Jesse Wilkins
This presentation, delivered to the AIIM True North chapter virtually on September 12th, introduced ChatGPT and other generative AI tools. I briefly introduced and demonstrated ChatGPT and some other generative AI tools. We reviewed some of the more popular use cases and benefits of using generative AI. We also reviewed some of the challenges these tools present for the organization. Finally, we discussed some practices to use these tools safely and effectively in support of real business outcomes.
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptxJesse Wilkins
This session provided the conclusion to the ARMA Nebraska 2023 Spring Seminar in Omaha, Nebraska. Attendees learned what a playbook is, what plays are, and how to develop a RIM/IG playbook tailored to their organization.
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptxJesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, introduced the professional development matrix and walked attendees through how to leverage the matrix to develop their own personal professional development plans.
20230419-2 ARMA Nebraska Modernizing Your Retention Schedule in the Age of Pr...Jesse Wilkins
This session, delivered at the ARMA Nebraska Spring Seminar 2023 on April 19, 2023, described an approach for modernizing a records and information retention schedule to take into account privacy considerations.
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
3 Simple Steps To Buy Verified Payoneer Account In 2024SEOSMMEARTH
Buy Verified Payoneer Account: Quick and Secure Way to Receive Payments
Buy Verified Payoneer Account With 100% secure documents, [ USA, UK, CA ]. Are you looking for a reliable and safe way to receive payments online? Then you need buy verified Payoneer account ! Payoneer is a global payment platform that allows businesses and individuals to send and receive money in over 200 countries.
If You Want To More Information just Contact Now:
Skype: SEOSMMEARTH
Telegram: @seosmmearth
Gmail: seosmmearth@gmail.com
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
Taurus Zodiac Sign: Unveiling the Traits, Dates, and Horoscope Insights of th...my Pandit
Dive into the steadfast world of the Taurus Zodiac Sign. Discover the grounded, stable, and logical nature of Taurus individuals, and explore their key personality traits, important dates, and horoscope insights. Learn how the determination and patience of the Taurus sign make them the rock-steady achievers and anchors of the zodiac.
Implicitly or explicitly all competing businesses employ a strategy to select a mix
of marketing resources. Formulating such competitive strategies fundamentally
involves recognizing relationships between elements of the marketing mix (e.g.,
price and product quality), as well as assessing competitive and market conditions
(i.e., industry structure in the language of economics).
buy old yahoo accounts buy yahoo accountsSusan Laney
As a business owner, I understand the importance of having a strong online presence and leveraging various digital platforms to reach and engage with your target audience. One often overlooked yet highly valuable asset in this regard is the humble Yahoo account. While many may perceive Yahoo as a relic of the past, the truth is that these accounts still hold immense potential for businesses of all sizes.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
The 10 Most Influential Leaders Guiding Corporate Evolution, 2024.pdfthesiliconleaders
In the recent edition, The 10 Most Influential Leaders Guiding Corporate Evolution, 2024, The Silicon Leaders magazine gladly features Dejan Štancer, President of the Global Chamber of Business Leaders (GCBL), along with other leaders.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challengesHolger Mueller
Holger Mueller of Constellation Research shares his key takeaways from SAP's Sapphire confernece, held in Orlando, June 3rd till 5th 2024, in the Orange Convention Center.
Event Report - SAP Sapphire 2024 Orlando - lots of innovation and old challenges
20230426 AIIM23 How to Leverage Privacy Practices to Build Customer Trust.pptx
1. How to Leverage Privacy Practices
to Build Customer Trust
Jesse Wilkins, CIPP/US, CIPM, IGP, CRM, ICE-CCP
President and Principal Consultant
April 26, 2023
4. The Age of Privacy
• 137 countries have privacy and data protection laws in place
• U.S. is late to the party!
• 6 states have passed comprehensive privacy and data protection laws
• Indiana, Montana, Oklahoma, Tennessee, and New Hampshire poised to pass
• Some include individual rights to action – i.e. customers can sue
5. Customers and the Age of Privacy
• Organizations with more mature privacy practices are getting higher
business benefits than average
• 93% of organizations are reporting privacy metrics to their Boards
• 90% of organizations surveyed said their customers will not buy from them if
they are not clear about data practices and protection
• 76% of companies that invest in a robust privacy program see increased
loyalty and trust from their customers
Source: Cisco 2021 Data Privacy Benchmark Study
https://www.cisco.com/c/dam/en_us/about/doing_business/trust-center/docs/cisco-privacy-benchmark-
study-2021.pdf
6. Customers and the Age of Privacy
• Customers don’t care about the nuances of, e.g., CCPA.
• Customers don’t care about fines.
• Customers care that you safeguard their information.
• Customers care that you use their information appropriately.
• For the reason you collected it for -
• And no other reason.
8. Elements of a Privacy Program
• Understanding of the regulatory environment and risks
• Understanding of corporate culture and tolerance for risk
• Privacy team
• Inventory of systems and information
• Personal or sensitive information
• High-impact systems
• Third-party systems
• Data mapping
• Systems & information inventories
9. Elements of a Privacy Program
• Policies & procedures
• Privacy policy and notices
• DPIA
• DSAR response
• Breach response
• Controls
• Access controls including need to know
• Reporting and metrics
• Employee awareness and training
• Annual assessment
11. A Customer-Centric Privacy Policy
• Easy to find on the website or app.
• Jargon-free: Let them know their data is safe.
• Transparent: Tell them what you collect and how you will use it.
• Opt-out clause – again, easy to find.
13. Retention and Privacy
• Retention and disposition started as
facilities management
• Then came to deal with corporate
malfeasance
• Then we tried Big Bucket Theory™
• In the age of privacy, retention needs
to be more granular
• Data minimization should be the
default
17. Building Customer Trust – A Checklist
• What personal data are you collecting?
• Do you need to collect all of that?
• Why are you collecting it?
• Who are you sharing it with?
• Who are they sharing it with?
• What (else) are you using it for?
• How do you protect it?
• How long do you keep it?
• Would you trust the way you handle
your data?
18.
19. About the Speaker
• Jesse Wilkins, CIPP/US, CIPM, IGP,
CRM/CIGO, edp, ICE-CCP
• President and Principal Consultant,
Athro Consulting
• More than 25 years experience in
information management
• Internationally-known speaker, trainer,
and writer
• AIIM Fellow #223
• IG Hall of Honor #5
20. For More
Information
Jesse Wilkins, CIPP/US, CIPM, IGP, CRM-CIGO, edp, ICE-CCP
Principal Consultant, Athro Consulting
https://www.athroconsulting.com
jesse.wilkins@athroconsulting.com
Twitter: @jessewilkins
LinkedIn:
https://www.linkedin.com/in/jessewilkins