Digital Shreds: Armor Inside Documents

Landwehr, John
March 2006
Security: Solutions for Enterprise Security Leaders;Mar2006, Vol. 43 Issue 3, p70
Trade Publication
The article cites that security directors give top priority to protect government, corporate and customer information. The risks of data leaks are increasing and failure to protect information has serious consequences for companies of all sizes, including lost revenue, damaged corporate brands, customer lawsuits and jeopardized product development.


Related Articles

  • Compliance and value delivery dominate IT directors' forward planning for 2005. Jennings, Tim // Computer Weekly;11/2/2004, p36 

    This article focuses on future issues related to the IT sector. As IT directors plan for 2005, their thoughts will be dominated by two factors: compliance with information legislation and regulations, and the need to achieve and demonstrate the delivery of value to an organisation. This does not...

  • BABIES AND BATHWATER. Cowper, Jamie // Computer Weekly;4/19/2005, p54 

    The article presents information on the reliability of e-mail system. Concerns about the volume of unsolicited e-mail and its effect on productivity are increasingly outweighed by concerns about the reliability of the e-mail system itself. Although most e-mail users are willing to tolerate the...

  • Instant messaging can be useful business tool if kept in check. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);8/2/2004, Vol. 25 Issue 4, p21 

    Focuses on the usefulness of instant messaging as a business tool for companies in New Orleans, Louisiana. Contribution to business communication; Provision of guidelines for employees; Enhancement of employee-employer interaction.

  • INFRASTRUCTURE'S NEED FOR SPEED. Vizard, Michael // Baseline;Aug2007, Issue 75, p22 

    The author reflects on the inability of corporate networks to handle the growing use of business applications. He observes that corporations are starting to realize that the networks they depend on for business are not capable of meeting the demands of next-generation applications. He explains...

  • Stopping 'patent trolls'. Rothenberg, Matthew // eWeek;4/10/2006, Vol. 23 Issue 15, p41 

    The article discusses the operations of patent trolls in the U.S. Patent trolls are companies that gather portfolios of patents. Their main source of income is in suing companies on the verge of releasing products similar to what they have patented. Usually, they asked the court to issue an...

  • Plan Early To Avoid Big Damages.  // Design News;5/4/92, Vol. 48 Issue 9, p204 

    The article presents advice related to how companies can avoid paying heavy damages as a result of intellectual property lawsuits when they introduce new products. It has been suggested that companies should try to maintain control over their decisions as much as possible. It has been advised to...

  • RIM sues Samsung over BlackJack. Rash, Wayne // eWeek;12/18/2006, Vol. 23 Issue 50, p14 

    The article reports that Research In Motion Ltd. (RIM) plans to sue Samsung Electronics Co. Ltd. over the name of its new messaging device. RIM claims that Samsung's BlackJack device superficially resembles RIM's new BlackBerry Pearl. RIM claims that the name of Samsung's device is similar to...

  • E-Disclosure Business beware! Cromby, Andrew // Credit Management;Aug2006, p28 

    The article focuses on the dangers of electronic disclosure. It states that because most business transactions are done electronically nowadays, necessary documents were not created or sometimes in forms of e-mail and other electronic information. These electronic informations which are vital to...

  • Strategies for Minimizing Litigation Risks, Costs. Monta´┐Ża, John // Information Management Journal;Mar/Apr2008 Hot Topic Supplement, Vol. 42, p10 

    The article discusses strategies that corporations can use to minimize the risks and costs of litigation. The widespread use of electronic mail within businesses has made the messages a cornerstone of litigation. Because these messages offer tangible evidence of communication between business...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics