Reducing the burden of FOIA

Responding to open records requests comes with the territory when you work for a government agency. Unfortunately, many struggle with compiling and producing the requested information in a timely manner. In this three-part series, Smarsh provides you with knowledge to help reduce the burden of responding to record requests, and to stay compliant with the Freedom of Information Act (FOIA) and state and local open records laws.
Get Whitepaper

The Public Sector Guide to Text Messaging Policy and Retention

This guide contains practical steps that will help public sector organizations and departments develop a text message policy and retention strategy to protect against the risk involved with use of this popular, universal form of communication. It also outlines some smart text recordkeeping practices so you’ll be better prepared to respond to open records requests or other e-discovery needs when they arise.

Get Whitepaper

Smarsh Electronic Communications Compliance Survey Report

Against the backdrop of political shifts in Washington and growing popular distrust of “big finance,” the seventh annual Smarsh survey of compliance professionals in the financial services industry reveals that the electronic communications compliance landscape has become broader, more complex and more scrutinized.

More firms are finding that gaps in retention and supervision programs have consequences. Examinations have become more comprehensive, with regulators focusing in particular on supervision processes. FINRA reported 99 books and records cases in 2016, resulting in $22.5million in fines. Compared to 2015, that represents a 423% increase in fines. Download our whitepaper to learn how you can protect your company!

Get Whitepaper

Key Issues for E-Discovery and Legal Compliance

Good electronic discovery (eDiscovery) practices and the technologies that support them are an essential best practice for any organization because they:

  • Enable organizations to preserve content, place content on litigation hold, and prevent this information from being deleted prematurely.
  • Enable the retention, protection, search and production of relevant content in support of an organization’s litigation efforts.
  • Minimize risk by significantly reducing the likelihood that an organization cannot satisfy a court or regulator request for information in the appropriate form and timeframe. Without good eDiscovery, organizations that encounter court orders or regulatory obligations to produce information run the risk of sanctions, fines or other penalties.
  • Allow organizations to index, classify, search for and produce business records and other information for reasons other than an eDiscovery order. Records may be used to satisfy a regulatory requirement to produce information, help managers perform an early case assessment, or gather information for a Freedom of Information Act (FOIA) request.

Implementing best practices around eDiscovery should be a high priority for every organization. Download our whitepaper to learn more!

Get Whitepaper

The Chief Risk Officer and the Dreadful, Horrid, Inefficient, Very Bad Day

These days, it's not enough for your organization to simply manage risk after the fact. You must spot it as soon as it happens to prevent it from spiraling out of control. Despite the increased organizational focus on broad risk-management issues, many companies still lack best practices and technology solutions to deal with one facet of business that inherently carries high levels of risk: the many flavors of electronic communications shared internally and externally with colleagues, clients, prospects, business partners, third-party vendors, and even the general public. Getting a good handle on supervision of your company's electronic communications data can help you realize more effective risk detection, mitigation, and management in the long run. Download our whitepaper to learn more!

Get Whitepaper

The Naked Truth: A Guide to Successfully Adopting AI

Enterprises are increasingly recognizing the need to transform digitally in order to remain competitive. The business world of today is fast-moving, relying on speedy data analysis to feed rapid, agile responses to changing business situations. Adopting AIOps advances businesses into an entirely new business practice which can wield new and existing tools for maximum efficiency.

Download the whitepaper to learn more about Adopting AI into your business

Get Whitepaper

What is GDPR Compliance & How to Comply with Ease

Centralized AI-powered machine data analysis platform to help you maintain compliance.

Loom’s solution is a state of the art (SOTA) Artificial Intelligence Operating System platform that makes it easy for companies of all sizes to comply with GDPR.

Our solution empowers DevOps and IT professionals to speedily analyze both log and unstructured machine data for immediate visibility into the IT environments.

Our solution is designed with data protection and privacy in mind. The following features map how Loom helps users maintain compliance with a click of a button.

Download the whitepaper to learn more about GDPR compliance and Loom Systems' solution

Get Whitepaper

How To Move VMware Data Protection To The Cloud

The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos.

Protecting these virtualized environments, however, and the ever-growing amount of structured and unstructured data being created, still requires a complex, on-prem secondary storage model that imposes heavy administrative overhead and infrastructure costs. The increasing pressure on IT teams to maintain business continuity and information governance are changing how businesses view infrastructure resiliency and long-term data retention—they are consequently looking to new solutions to ensure immediate availability and complete protection of the data that resides within their VMware environments.

Get Whitepaper

Making The Business Case For VMware Cloud Backup

The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. Protecting these virtualized environments, however, as well as the ever-growing amount of structured and unstructured data being created, still requires a complex, on-premises secondary storage model that imposes heavy administrative overhead and infrastructure costs.
Get Whitepaper

Public Safety Departments & Text Messaging – Simplify Public Records with Policies and Procedures

Prior to fully embracing SMS/text messaging, organizations need to assess how and why their employees want to use text communications, develop and communicate use policies, and ensure all information sent via text can be retained and archived. Remember, any communication sent or received by government organizations—including public safety departments and their employees—is subject to open records requests.

In this report, we examine how public safety agencies can create policies that allow for compliant use of SMS/text messaging, and how to retain and archive those communications for a more efficient response to open records requests.

Read our guide to learn:

  • How other public safety departments are using text messaging
  • What you need to consider for public record requests
  • What to consider when building your communications policy
Get Whitepaper

The Public Sector Guide to Social Media Strategy and Policy

Social media can greatly improve communication, deliver constituent services, help optimize processes, and aid response to emergencies within your community. It can also allow public sector organization employees to be more accountable, transparent, and open. Along with the benefits comes increased awareness of security, privacy, and records management challenges on social media.

A solid social media strategy can help your organization and departments connect with the community in an easy, time and cost-effective manner that most people can access. The strategy doesn’t need to be complicated. Whether this is your first time developing a social media strategy, or you already have one in place, remember to keep it simple. Here are a few things to consider while developing or rounding-out your strategy:

  • Available social media tools and capabilities
  • Internal policies and approvals
  • External requirements for preserving records and responding to information requests
  • Your organization’s overall objectives and the needs of the community
Get Whitepaper

5 Actions to take for an Airtight Mobile Use Strategy in Government

Text messaging is an immediate and simple way of communicating, so many government employees prefer it over email or other traditional methods. However, FOIA laws require all electronic communications used for business to be archived and available for public record requests. It doesn’t matter whether an employee uses his/her personal or government-issued cell phone, both are fair game.

In this guide we’ll show how public sector organizations can build an airtight mobile strategy. Learn about device scenarios, policy creation, mobile device management, and the archiving process.

Read our guide to learn:

  • Device ownership scenarios – advantages and disadvantages
  • Key questions to answer for an airtight policy
  • How to retain & report text message content
Get Whitepaper

The Financial Advisor’s Guide to Social Media Strategy and Policy

The U.S. Securities and Exchange Commission (SEC) and Financial Industry Regulatory Authority (FINRA) recognize social media’s growing role in firms’ marketing and communications strategies, and have provided guidance on extending compliance programs for this dynamic channel.

This guide contains practical steps that will help you develop a social media strategy and policy that meets social media recordkeeping and supervision regulatory requirements, while gaining maximum business value from your social efforts. With smart compliance practices and supporting technology, you can be prepared to present your social media records and evidence of your supervisory procedures in the event of a regulatory request or exam.

Get Whitepaper

3 Ways Text Messaging Exposes Financial Services Firms to Massive Risk

While 97% of Americans with a smartphone use them to send texts, many organizations don’t have any supervision or management of mobile communication in place. While it is intuitive and reliable, text messaging can pose serious litigation and reputation risks if employees are conducting business conversations without clear policies and supervision. Read this guide to understand the ways companies are exposed to risk through texting and how you can reap the benefits of text message archiving with implementation of smart policies and solutions.

Get Whitepaper

Recognizing The Five Hidden Costs Of Guaranteeing Power At The Network Edge

Critical edge environments require reliable IT solutions and infrastructure.

Reliability means availability. And availability begins with power. Your computing performance depends on reliable, UPS-provided, backup power at the network edge. But that costs money. And expenses extend well beyond the point of sale. Many of those costs are hidden.

Download this free whitepaper to learn the five areas where costs are not so obvious:

Get Whitepaper