How do you deal with employee data after termination? In this article, various companies provide answers in post-termination situations dealing with electronic and company data.
In this publication, the details and secrets of excellent record retention programs are unlocked. Learn how to update traditional methods to better fit your modern workplace. Find a starting point, execute an effective and compliant schedule and evolve with new regulations.
While the Cybersecurity Regulations require several technical controls (e.g., monitoring network activity and implementing multi-factor authentication and encryption), most of the requirements involve instituting information governance (“IG”) practices and structures to manage cyber risks. In the following, we set out five steps which address the key IG issues and requirements that can help your organization come into compliance with the Cybersecurity Regulations.
Everyone should have a plan for when they pass away and that includes your digital assets. Read through this guide to gain tips and know-how for your next steps.
Starting a business is easier than ever these days. But it's also easier than ever to get yourself into trouble. Practice these policies that help ensure the success of your new business.
This brief resource outlines the top ten steps to operationalise the General Data Protection Regulation (GDPR).
The European Union (EU) Directive on the security of network and information systems directive (NIS Directive) aims to bolster the security of Europe's critical infrastructure by imposing a minimum level of security for digital technologies, networks and services across all Member States. It also makes it compulsory for certain businesses and organisations to report significant cyber incidents.
This is a sample computer security and mobile device policy.
This is a sample information technology security roles and responsibilities policy.