Subscribe to DMU

Search DMU Library

Categories

Menu

Best Practices

Cyber-bullying and Online Harassment

The pervasive and anonymous use of social media has increased the rate and frequency of online harassment and cyber-bullying, endangering the data, safety, reputation, and even lives of many people Introduction It is no secret that people are bullied, harassed, and threatened over the internet, to the point where, if someone disagrees with another person, death threats often are the

Read More

Is Data Theft Your Biggest Information Governance Nightmare?

Data theft is a serious risk for every organization, regardless of industry or size. Establishing a strong Information Governance framework to defend against this risk is an essential practice. Introduction According to the Washington Post, Insurance Journal and other business sources, a recent study Data Theft by Employees Affects 69% of Businesses of 208 organizations revealed 69 percent “experienced an attempted or realized data

Read More

Examining Data Privacy Impact Assessments

A Privacy Impact Assessment, or PIA, is an analysis of how personally identifiable information (PII) is collected, used, shared, and maintained Introduction Along with all the other acronyms concerning privacy, PII (Personally Identifiable Information), GDPR (General Data Protection Regulation), DPO (Data Protection Officer), COPPA, (Children’s Online Privacy Protection Act), and many others, another one has emerged: PIA (Privacy Impact Assessment) .  PIAs

Read More

Foundations of Data Security

Effective data security ensures that the right people can use and update data as it was intended to be used, and that all inappropriate access and update is prohibited. Introduction Protecting sensitive data is the ultimate goal of all information technology and data security practices; some major objectives would be to avoid identity theft, protect data privacy, prevent resource /

Read More

Data Security or the Ethics of “Inappropriate Curiosity”

Ethical challenges to data usage can arise from many sources, including “inappropriate curiosity.” All organizations should enforce good ethical data management behaviors. Introduction Early reports have been disheartening. Several contractors for the Federal Government Department of State have been disciplined and dismissed for “inappropriate curiosity” over data held in their charge. What were they thinking! Any possible political motivation on

Read More

Contact us

  • This field is for validation purposes and should be left unchanged.

Request a free consultation
with a DMU Expert

  • This field is for validation purposes and should be left unchanged.