Transformations in Financial Technologies
The Difficult Road to a More Secure Future
AI becomes "Personal"
Gaining 360 Degree View of Consumers
Mold the technology with NetSuite to Fit the Business Needs
Rick Gemereth, CIO, Lionel LLC
The Force of Mobile and Wireless Technology: Driving Business Innovation, Increasing Productivity & Exceeding Customer Expectations
John Mason, CIO, Bottomline Technologies
VoIP Phone System Brings Exquisite Communications Makeover to MANA Products
George Alexandrou, VP & CIO, Mana Products
Business Continuity and Data Availability
Ed Toner, CIO, State of Nebraska
Harnessing the Potential of E-Discovery Workflows
By harnessing the potential of various processes and technology that are available today, e-discovery professionals can assist organizations with General Data Protection Regulation (GDPR) compliance to a greater extent. As the deadline for GDPR enforcement is finally closing by, organizations are rushing to modify their operations.
About two years after the approval by the European Parliament in 2016, organizations across the globe must comply with its requirements for data protection, privacy, processing, and consent. Unfortunately, if survey results are to be trusted, most organizations will not be ready as per the government guidelines. Many organizations have conducted research into the topic.
Take a look at some of the strategic ways in which technology experts can contribute to GDPR compliance:
Proactive data mapping and information governance strategies
Organizations need accurate data maps and ways to keep them updated through a process of custodian interviews and data source crawling and cataloging. As e-discovery can rapidly identify data, it enables responding to a case much quicker, more seamless, and economic.
Searching and providing data for subject access requests (SARs)
Most of the organizations cannot rely on ad hoc processes within the predefined time constraints. They must have defined workflows and technologies to ensure they meet the one-month deadline.
Preparing for and implementing “Right to be Forgotten” requests
Data subjects can request that personal information stored to be erased. This includes items that are posted online by the subject themselves. To comply, organizations must erase data “without undue delay.”