IT Management  >   Systems Operations  >   Data Management  >  

Data Governance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: DG
DEFINITION: Litigation hold (also known as "preservation orders" or "hold orders") is a stipulation requiring a company to preserve all data that may relate to a legal action involving the company. This requirement ensures that the data in question will be available for the discovery process prior to litigation. A company must preserve records when it learns of pending or imminent litigation,  … 
Definition continues below.
Data Governance Reports
51 - 75 of 792 Matches Previous Page  |  Next Page
How To Handle Unneeded Data During Shutdowns of Business Units
sponsored by SNP America, Inc.
WHITE PAPER: When business units shut down, your SAP system may end up with unneeded data – which can cause serious problems and toxic effects during upgrades. How can you simplify the shutdown process to avoid these effects? In this white paper, discover how you can better handle this excess data when eliminating business units.
Posted: 24 Jan 2017 | Published: 24 Jan 2017

SNP America, Inc.

Why Your Data Warehouse Needs a Data Lake and How to Make Them Work Together
sponsored by Zaloni
WHITE PAPER: Complementing your DW with a data lake can be a smart first step. But before tackling a DW augmentation project, it's a good idea to review your current resources and understand what you'll need. Explore 2 reasons why companies augment their DW, tips for seamlessly integrating a data lake into a DW, and more.
Posted: 19 Jan 2017 | Published: 19 Jan 2017

Zaloni

Business Value: The Key to Data Governance Software Selection
sponsored by SearchDataManagement
EBOOK: This expert buyer's guide explores how to narrow down your choices for purchasing a data governance tool. Discover how to align business objectives with the software's capabilities and learn how to build data quality management and big data strategies into your data governance initiatives.
Posted: 12 Jan 2017 | Published: 06 Jan 2017

SearchDataManagement

Six Steps to Effective Healthcare Data Breach Response
sponsored by Absolute
WHITE PAPER: Healthcare organizations must take into consideration these 6 steps to an effective data breach response. You'll learn how to not only minimize the damage from an incident, but also avoid reputational ruin through patient notification and timely updates of the situation.
Posted: 15 Dec 2016 | Published: 30 Nov 2016

Absolute

Overcome Storage Capacity Conundrums of Genomics and Precision Medicine
sponsored by Pure Storage
WHITE PAPER: Today's fastest compute environments are prevented from delivering on their promise for genomics as a result of constrained performance of the underlying storage infrastructure. Download this resource to learn how to overcome the capacity constraints of legacy storage and harness the possibility of precision medicine.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

Forecasting BI Trends In 2017
sponsored by Yellowfin
WHITE PAPER: This BARC Research Study reveals a comprehensive picture of regional, company and industry specific differences in the BI market. The study is broken down into 6 areas, discussing top trending topics in BI this year, which industries are best leveraging BI, how the perception of the importance of BI trends varies across the world and more.
Posted: 30 Nov 2016 | Published: 30 Nov 2016

Yellowfin

Data Preparation: How To Prepare For BI Success
sponsored by Yellowfin
WHITE PAPER: Discover how a built-in data preparation module can eliminate the cost of using two BI products, and reduce integration challenges. Then, learn about how you can leverage a metadata layer in your BI so that any changes made will be uniformly reflected across all content, and more.
Posted: 29 Nov 2016 | Published: 29 Nov 2016

Yellowfin

Building Better Business Analytics to Improve BI
sponsored by Pyramid Analytics
RESOURCE: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Learn about a business intelligence platform that empowers users outside of IT to dive into data with the security of a governed analytics environment.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Pyramid Analytics

EU data protection: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
Posted: 24 Nov 2016 | Published: 24 Nov 2016

ComputerWeekly.com

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

The Future of Model Risk Management for Financial Services Firms
sponsored by SAS
WHITE PAPER: This white paper covers the current state of model risk management (MRM) for financial firms, as well as posits some ideas about what the future of financial modeling is going to look like. Inside you'll learn about the impact that new regulatory developments for banks has had on MRM, 5 important new features of modeling technology, and more.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

SAS

Data Analytics Used to Combat the Opioid Epidemic
sponsored by SAS
RESOURCE: Find out how the utilization of predictive analytics contributes to the development of better treatment protocols for the opioid epidemic. Learn how to take action with the comprehensive data management approaches outlined, such as automating data assembly and streamlining report generation.
Posted: 09 Nov 2016 | Published: 09 Nov 2016

SAS

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Shadow IT Guide: Protect Data and Avoid Compliance Violations
sponsored by Globalscape
WHITE PAPER: Are you sure that employees are only using IT-sanctioned ways of transferring data? If the answer is "no," then your sensitive data may be vulnerable. In this guide from Globalscape, you'll learn: what shadow IT is and its drawbacks, how to identify signs of a shadow IT problem, how to reduce shadow IT, and more.
Posted: 07 Nov 2016 | Published: 31 Oct 2016

Globalscape

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Big Data, Bad Data, Good Data: The Link Between Information Governance and Big Data Outcomes
sponsored by IBM
WHITE PAPER: Big data analytics offer companies an opportunity to derive new business insights and drive smarter decisions. But the outcome of any big data analytics project is only as good as the quality of data being used. In this IDC report, discover the link between good information governance and the outcome of big data analytics projects.
Posted: 08 Feb 2017 | Published: 01 Jan 2015

IBM

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

The Patient Journey: Improving Patient Experience and Satisfaction
sponsored by Microsoft
RESOURCE: 87% of healthcare providers believe that interoperability does not exist because of technical shortcomings of EHR systems. Access this HIMSS Media infographic to see where health IT is faltering, and how CRM is enhancing EHRs to improve the patient journey.
Posted: 10 Jan 2017 | Published: 30 Dec 2016

Microsoft

The Ideal Combination of Convenience and Productivity
sponsored by Ricoh- Techdata
BROCHURE: Knowledge is indeed power, but only if you can share it quickly and securely with others in their preferred format. Learn how you can leverage a multifunction copier to enable you to distribute your important information in multiple formats without putting security at risk.
Posted: 06 Jan 2017 | Published: 30 Dec 2016

Ricoh- Techdata

Analyst Report: Data Quality Tools
sponsored by Trillium Software
RESEARCH CONTENT: Access the report to learn how a leading data quality solution can help you achieve your long-term strategic objectives.
Posted: 02 Dec 2016 | Published: 23 Nov 2016

Trillium Software

Strategies For Effective Big Data Governance And Supporting Analytics Programs
sponsored by IBM
EGUIDE: Governing large and varied sets of big data is difficult. In this expert e-guide, Dr. Anne Smith, Principal Consultant at Alabama Yankee Systems, LLC reveals 7 best practices for instituting effective policies for governing sets of big data. Plus, learn how a solid data governance plan sows the seeds for a successful self-service analytics program.
Posted: 02 Dec 2016 | Published: 02 Dec 2016

IBM

Bringing Accounts Payable Out of the Paper Age
sponsored by Epson
WHITE PAPER: 80% of businesses would like to streamline their accounts payable (AP) processes, but are being held back by fear. But of what? Access this white paper to learn how you can automate your AP process and gain an understanding of the future of data and records management.
Posted: 30 Nov 2016 | Published: 31 May 2016

Epson

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

Getting a Grip on Content: Empowered Content Collaboration in the Cloud
sponsored by IBM
RESOURCE: Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.
Posted: 19 Oct 2016 | Published: 31 Dec 2015

IBM
51 - 75 of 792 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA GOVERNANCE DEFINITION (continued): …  or when litigation is reasonably anticipated. Litigation hold prevents spoliation (destruction, alteration, or mutilation of evidence) which can have a catastrophic impact on the defense. An attorney may issue a litigation hold letter or a company may issue a hold order internally. The order applies not only to paper-based documents but also to electronically-stored information (ESI)Implementing a litigation hold process can be challenging for storage administrators. All companies must establish a sound retention policy and apply that policy to their storage systems. Storage systems with a litigation … 
Data Governance definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement