This issue of RIM + IG Around the World is sponsored by TAB Canada. 

    A best practice template for your imaging project
    Get a helpful guide for creating a successful document imaging project plan.

    Outsourcing records management: what you need to know
    Learn why organizations are choosing to outsource, and whether it is the right option for you.

    Tips for managing your shared drive
    Learn how to maintain a well-organized shared drive, whether local or in the cloud.

    RIM Around the World: July 2017

    Jul 10, 2017
    north_america_bannerFTC Halts and Fines Quick-Loan Sites That Unlawfully Sold Loan Application Info
    Blue Global Media, LLC has agreed to settle Federal Trade Commission charges that it misled consumers into filling out loan applications and then sold those applications to virtually anyone willing to pay for the leads. In its complaint, the FTC says the company operated websites that enticed consumers to complete loan applications the defendants then sold as “leads” to entities without regard for how the data would be used or if it would remain secure.
    More . . .  

    'The Days of the Nigerian E-mail Scam are Long Past Us,’ Says FBI Info-sec Exec
    According to Verizon's 2017 Data Breach Investigations Report, 81% of breaches occur because of stolen or weak passwords, often compromised through phishing. See what an FBI info-sec exec had to say about this finding – and about the ways such cyberattacks as WannaCry are executed and can be prevented. For example: “You have to understand that the attackers are interested in the path of least resistance. They are not going to waste their time and effort on some high [cost and complex] intrusions."
    More . . . 

    E-discovery of Text Messages is on the Rise
    Recent court decisions are making it clear that text messages are discoverable. Several factors had kept their e-discovery from becoming common practice: unfamiliarity with their data management, fear of reciprocal demands for their data, and the general objection that it presents an undue burden under discovery principles of proportionality and reasonableness.
    More . . . 

    RFQs are Welcome!
    The Louisville and Jefferson County Metropolitan Sewer District (MSD) invites responses to a Request for Qualifications (RFQ) from qualified firms for services related to an Information Architecture & Enterprise Content Management project. Proposal forms, including specifications and instructions, must be obtained from MSD’s website at http://www.msdbids.com/purchasing.  SOQ’s must be submitted – via  hand delivery or mail – to MSD on or before 1:00 PM EST, August 18, 2017.

    ARMA Plays Key Role in Legalweek Session on Issues of Attorneys and Social Media
    Legaltech News reported on a Legalweek West session titled “Social Media: Ethics and Records Considerations,” which considered questions surrounding attorneys’ obligations and risks with social media. The session stressed the idea that attorneys do not become private citizens on social media, and that any unethical online behavior will likely be uncovered and damaging. The article has remarks from ARMA’s new board president, Ilona Koti, as well as longtime ARMA contributor John Isaza. In one, Isaza emphasizes the attorney’s obligation to report a peer’s unethical social media behavior: “The bar expects us to self-monitor . . . . By extension if you are seeing colleagues of yours doing stuff that is not proper" [you have to tell the right authorities].
    More . . . 

    State of Nevada Passes Blockchain Law
    Nevada has passed a law that defines blockchain as “an electronic record created by the use of a decentralized method by multiple parties to verify and store a digital record of transactions which is secured by the use of a cryptographic hash of previous transaction information.” It stops local governments from (1) imposing any tax or fee on the use of a blockchain by any person or entity; (2) requiring any person or entity to obtain any certificate, license, or permit to use a blockchain; (3) or imposing any other requirement relating to the use of a blockchain by any person or entity.
    More . . .

    ROT or Not? Can a Retention Schedule Reduce the Garbage, Risks, and Costs?
    See the July/August issue of Information Management for attorney and CRM Tom Corey’s views on how a well-executed retention schedule can mitigate the risks and costs of ROT (redundant, outdated, and trivial information). His solution can be organized around four simple words: space, compliance, discovery, and breach. 

    Chemistry May Provide Newest Solution for Compressing Data
    Chemists at Case Western Reserve University may have found a way to store digital data in half the space current systems require. A study published in the Journal of Materials Chemistry C says researchers at the university can now demonstrate how commonly used polymer films containing two dyes can optically store data in a quaternary (four-symbol) code, potentially requiring about half as much space. "We're using chemistry instead of engineering to address data storage, but it's really complementary to what engineers are doing," said Emily Pentzer, assistant professor of chemistry at Case Western Reserve and study author.
    More . . .


    Germany is First EU Member State to Enact New Data Protection Act to Align with GDPR
    On July 5, almost a year before the General Data Protection Regulation will be applied, the new German Federal Data Protection Act passed the final stage of the legislative process, the so-called German Data Protection Amendment Act (GDPAA). It has been countersigned by the German Federal President and published in the Federal Law Gazette
    More . . .

    Social Media Giants Step up Joint Fight Against Extremist Content

    Google, YouTube, Twitter, and Microsoft are forming a global working group to combine their efforts to remove terrorist content from their platforms. Responding to pressure from international governments, the companies said they’ll (1) share technical solutions for removing terrorist content, (2) commission research to inform their counter-speech efforts, and (3) work more with counter-terrorism experts.
    More . . .

    Queensland to Spend AU$40m on Digital Transformation
    The Queensland government will spend an additional AU$40 million on digitizing government services, transforming the delivery of scientific information, and safeguarding state records.
    According to Leeanne Enoch, the Minister for Innovation, "A revolution is sweeping our economy. Our challenge is to improve government service delivery against this backdrop of digital transformation, open up our data to provide the building blocks for the knowledge economy, and make better use of government data to unlock Queensland's full potential.”
    More . . .

    Data Quality, Staffing Issues Still Plague Analytics Efforts
    According to a Forbes study, despite the growth in consumption and use of data, many organizations still struggle with their analytics efforts, complaining of poor data quality, insufficient expertise in-house, and a shortage of trained data professionals in general. Indeed, 59% of organizations surveyed say they are not using predictive models or advanced analytics. Forbes surveyed more than 300 senior executives in North America, Britain, and Ireland for the report. There is a lack of sophistication in how data is analyzed, as 23% of those surveyed are still using spreadsheets as their main method of storing data.
    More . . .

    IoT Spending to Surpass $800 Billion in 2017, Led by Hardware
    By 2021, global IoT spending is expected to total nearly $1.4 trillion, according to the research firm IDC. Overall, IDC expects IoT spending to grow 16.7% year-over-year in 2017, reaching just over $800 billion. By 2021, global IoT spending is expected to total nearly $1.4 trillion, led by enterprise investments IoT hardware, software, services, and connectivity. IDC expects long tail investments in smart home technologies will jump over the next five years, as well as airport facilities automation, electric vehicle charging, and in-store contextual marketing.
    More . . .
    Self-regulatory Regime “Seems Inevitable” in South Korea
    The Korea Communications Commission (KCC) recently said it will launch the Online Privacy Protection Regulation System, beginning with a pilot study targeted at these industries: online retail, search engines, gaming, broadcasting, and telecommunications. The study will involve 66 companies that will have to self-diagnose their operations through checklists provided by the KCC, which will then review the results in order to prepare customized checklists for the games, portals, and pay TV industries by the end of this year. “A self-regulatory regime seems to be inevitable now, considering the enormous number of players in the market and comparatively limited government resources to monitor and regulate each and every one of their activities. But we will see whether it will be successful,” said Kyoung Yeon Kim, a partner at Yulchon LLC.
    More . . .


    “At that time, we were generally more concerned with regulatory compliance and reputation risk than the direct criminal threat. Criminal, hacktivist, and state-sponsored threats were not as prominent, at least in regional and community banks. Data breaches were most often unencrypted lost tapes or other physical loss of media. Being good enough . . . meant ensuring a known consistent state of compliance while taking appropriate and reasonable measures to protect clients. The challenge remains knowing what excellence is before finding out it wasn’t good enough through an unfortunate situation."
                Tim Callahan, SVP and global CSO, Aflac, taken from CIOReview.com.
                (Callahan will speak on the topic of data security at ARMA Live! 2017, in
                Orlando in October. Register here.) 
    "The CDU [Merkel’s party] is, apparently with a straight face, trying to duplicate the U.S. data chaos to support EU industry, removing European companies' and the European legislative framework's biggest competitive asset.”
                Joe McNamee, executive director of European Digital Rights (EDRi), taken
                from ZDNet.com
    “ . . . the only people in the United States who want less internet privacy are CEOs and lobbyists for giant telecom companies who want to rake in money by spying on all of us and selling the private details of our lives to marketing companies.”
                Evan Greer, director of Fight for the Future, taken from DailyDot.com
    “I was often asked what kind of ‘records’ – as in music – I dealt with. There were very few available positions in RIM when I finished my MLS.”
                Susan Goodman, the focus of the Notable Pros feature in the July/August
                issue of Information Management

    “Reports that Trump administration officials have used practices that undermine transparency of public records are also unfortunately consistent with this administration’s problematic pattern of delaying or ignoring requests from minority members of Congress.”
                Senators Tom Carper (D-Delaware) and Claire McCaskill (D-Missouri), taken
                from DoverPost.com
    “Nova Scotia's privacy laws lack virtually all of the essential modern privacy protections found in other Canadian jurisdictions. Without fundamental privacy protections, databases of citizen information are not adequately protected for the 21st century."
                Catherine Tully, information and privacy commissioner, Nova Scotia, taken from
                CBC News
    “It is our goal that this unprecedented effort will lead to wider access to the Obama records and artifacts in our care as we move from a model that requires travel to a brick-and-mortar facility to one that makes our history available globally via the Internet.”
                David S. Ferriero, archivist of the United States, taken from ProcessHistory.org
    “The future looks bright for ECM and information governance. Don’t fight it…embrace it!”
                John P. Frost in his article “ECM’s Future and Its Impact on Information
                Governance,” taken from the July/August issue of Information Management
    © 2017, ARMA International