The Business-Technology Weave:

content management

May 15, 2010  9:20 AM

Insecurity: A State Agency’s Data “Security” Posture

Posted by: David Scott
acceptable use, business security, content management, data breach, data theft, IT security, IT Wars, security policy, the business-technology weave


I’ve been doing a little work for a big State agency.  By “big,” I mean big budget, large number of...

April 27, 2010  1:02 PM

An IT Deficit

Posted by: David Scott
acceptable use, accpetable use, backup and recovery, BIT, business implementation team, business liabilitiy, centralized data, content, content management, data, data backup, data liability, data management, data recovery


A couple articles ago, I talked about a business deficit.  It’s only fair we...

April 23, 2010  8:55 AM

Workplace Privacy

Posted by: David Scott
acceptable use, content management, data access, data privacy, workplace privacy

According to a recent ruling by the New Jersey Supreme Court, a former employee’s past company should not have read e-mails that she sent from a private, password-protected, web account.   Bookmark and Share     0 Comments     RSS Feed     Email a friend

March 24, 2010  9:03 AM

Data Security and Transport – How Do You and Your Organization Operate?

Posted by: David Scott
business security, content, content management, content security, data security, data transport, portability


An interesting thing came to my attention last week when I was using a thumb drive to transport files back and forth between secure...

March 4, 2010  7:11 AM

Data Breaches and the Business-Technology Weave (BTW)

Posted by: David Scott
content management, data breach, data security, data theft, identity theft, IT security

Everyone in the organization needs to be a mini-Security Officer these days. What does that mean? It’s time for each person to recognize that every action must be viewed through the prism of security, and activity must be conducted in accordance with...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: