Surety Podcast Series: Electronic Content Management Silos, More of a Hindrance Than a Benefit

This is part three of a four part podcast series.

Podcast Presenters: Michael Elliot of Atrium Research & Consulting and Timothy Carroll, Partner at Loeb & Loeb, LLP.

Security by Leonid MamchenkovWhen it comes to enterprise-wide data-level security controls in an ELN environment, why are organizations putting in more robust controls when it comes to regulation by the Federal Drug Administration than in areas and units that are solely focused on drug discovery? What are the risks in this particular scenario?

Learn this and more on why implementing robust controls in certain silos of an organization’s infrastructure may prove to be more of a hindrance than a benefit.

What about organizations that are proactive versus reactive in electronic content management?

What are the pros and cons of each strategy and which one will come out on top?

  1. Risk of Enterprise-wide Disparate Data-level Security Controls: How Much is Good Enough?
    In this podcast, Elliot and Carroll talk through the motives of why organizations choose to use disparate data-level security controls. Just how much (security measures) is good enough?
    Register to download podcast segment. (6 MB)
  2. Safeguarding eData Against Tampering, Theft & Misappropriation
    Find out from Elliot and Carroll how disparate record keeping programs and an organization’s lack of safeguarding its electronic records is grounds for data theft or intellectual property misappropriation.
    Register to download podcast segment. (4 MB)
  3. Proactive vs. Reactive Electronic Content Management
    Proactive versus reactive security management of your electronic information, which strategy is best for electronic content management? Are there benefits to each? Where does your organization reside on the scale?
    Register to download podcast segment. (3 MB)

(Photo Credit: Leonid Mamchenkov)

Tags: , , , , , , , , , , , | Posted in: Content Management, Data Preservation, Data Tampering, eDiscovery, IP Protection, R&D, Records Management

Leave a Reply