The digital age demands efficient systems to organise, store and retrieve vast amounts of personal data. Personal Information Management (PIM) and file navigation represent core activities wherein ...
When we think of identity in today’s connected world, we increasingly associate it with risk. From leaked data points to entire identities stolen, using modern technology all too often involves ...
Erika Rasure is globally-recognized as a leading consumer economics subject matter expert, researcher, and educator. She is a financial therapist and transformational coach, with a special interest in ...
With AI now used in many apps that drive the digital workplace, more questions around the privacy implications are surfacing in the enterprise. With artificial intelligence (AI) now used in many of ...
This article provides an introduction to the new developments and suggests tips for privacy compliance teams responding to ...
Iain Henderson (of Project VRM) and Drummond Reed (of The Information Card Foundation) in May gave a presentation called “The Personal Data Eco-System,” a summary that has been posted on the Kantara ...
The concern isn't only cybercriminals sneaking into systems; far too often, corporate data is compromised by employees or trusted partners losing sensitive personal information. Australia's privacy ...
The rules come nearly eight years after the Supreme Court, on 24 August 2017, affirmed the Right to Privacy as a Fundamental ...
This is crucial, especially for data mesh, where everyone becomes a data user, and metadata, where everyone should access ...