Safeguarding Critical E-Documents: Implementing a Program for Securing Confidential Information Assets
- 4h 23m
- Robert F. Smallwood
- John Wiley & Sons (US)
- 2012
Managers and public officials are looking for technology and information governance solutions to "information leakage" in an understandable, concise format. Safeguarding Critical E-Documents provides a road map for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard their internal electronic documents and private communications.
- Provides practical, step-by-step guidance on protecting sensitive and confidential documents—even if they leave the organization electronically or on portable devices
- Presents a blueprint for corporations, governments, financial services firms, hospitals, law firms, universities and other organizations to safeguard internal electronic documents and private communications
- Offers a concise format for securing your organizations from information leakage
In light of the recent WikiLeaks revelations, governments and businesses have heightened awareness of the vulnerability of confidential internal documents and communications. Timely and relevant, Safeguarding Critical E-Documents shows how to keep internal documents from getting into the wrong hands and weakening your competitive position, or possible damaging your organization's reputation and leading to costly investigations.
About the Author
Robert F. Smallwood is a founding Partner of IMERGE Consulting and heads up its E-Records Institute, a specialty consulting practice, as Executive Director. Mr. Smallwood is a 30-year veteran of the information technology industry and has been recognized as one of the industry's "25 Most Influential People" and "Top 3 Independent Consultants" by KM World magazine. He consults with Fortune 500 companies and governments to assist them in making technology decisions and implementations. Some of his past research and consulting clients include Johnson & Johnson, Apple, Miller-Coors, AT&T, the Supreme Court of Canada, Xerox, and IBM. He has published more than 100 articles and given more than 50 conference presentations on document, records, and content management. He is the author of How to Manage Social Media Business Records (CreateSpace, 2011), Taming the Email Tiger (BB Publishing LLC, 2008), and several other books.
In this Book
-
Foreword
-
The Problem—Securing Confidential Electronic Documents
-
Information Governance—The Crucial First Step
-
Managing E-Documents and Records
-
Information Governance and Security for E-Mail Messages
-
Information Governance and Security for Instant Messaging
-
Information Governance and Security for Social Media
-
Information Governance and Security for Mobile Devices
-
Information Governance and Security for Cloud Computing Use
-
Information Governance and Security for Vital Records
-
Long-Term Preservation of E-Records
-
Technologies That Can Help Secure E-Documents
-
Safeguarding Confidential Information Assets
-
Building the Business Case to Justify the Program
-
Securing Executive Sponsorship
-
Safeguarding Confidential Information Assets—Where Do You Start?
-
Procurement—The Buying Process
-
Maintaining a Secure Environment for Information Assets
-
Conclusion