Loading...
You are here:  Home  >  Articles by David Schlesinger  -  Page 2
Latest

Data Protection: How Does This Figure Into Your Architecture?

By   /  July 22, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. The credit reports that your company may keep when deciding to allow credit to a new customer just might be considered confidential, especially if your billing department included judgmental remarks and evaluations. The purchase requests from your accounts payable department could potentially show which ingredients you buy […]

Read More →
Latest

Data Governance Security Classifications: Are you “in the know?”

By   /  June 17, 2016  /  Big Data Blogs, Big Data News, Articles, & Education, Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  1 Comment

Click here to learn more about author David Schlesinger. In any enterprise of size, there is a cyber security department. Were you to partner with this team to classify corporate data you would find them able and willing to assist you. They would arrive at the data classification meetings with policies in binders and have […]

Read More →
Latest

4 Enterprise Data Security Protocols to Safeguard Your Personal Data

By   /  April 15, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Strategy Blogs, Data Strategy News, Articles, & Education, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Why Is ‘Phil’ Downloading the HR Database at 4:00 A.M.? Perhaps huge downloads of data from sensitive data structures are seen to be problematic and worrisome for your enterprise. The Product Price List is one thing, the HR database is quite another. Downloads from sensitive systems […]

Read More →
Latest

Where is the Data Security Officer on the Organizational Chart?

By   /  March 11, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click here to learn more about author David Schlesinger. Let us be clear, your system users are mostly brilliant workers, having great knowledge and expertise in their lines of endeavor: scientists, accountants, shipping specialists, logistic planners, attorneys, HR and property experts all keep your enterprise running. They are not, however, experts in every other process in […]

Read More →
Latest

All Your Data Belongs To Us – Data Security in a Global Infrastructure

By   /  February 1, 2016  /  Data Blogs | Information From Enterprise Leaders, Data Education, Data Governance & Data Quality | News & Articles, Data Governance Blogs, Enterprise Information Management, Information Management Blogs  /  No Comments

Click to learn more about David Schlesinger. A database management system (DBMS) is the embodiment in code of a logical process to store, move, analyze, select and output information. Within the code blocks that make up the DBMS program there is provision to limit a user’s rights regarding creating, reading, modifying or deleting data entries. […]

Read More →