Knowledge Vault: Data and Information Assurance

Quick Links:  Supply Chain Data | Personnel Records | Transactional Records | Data Protection | Public Sector Information | Data Retention | E Discovery | Big Data | Data Breaches
Subscribers can read our best practice resources on data and information assurance.

Knowledge is power. Data and information assurance plays a significant role in helping the organisation get both competitive and collaborative advantage when mined, interpreted and processed correctly. Data and information held electronically can include master and secondary data, business records, contracts, personnel files, supplier and customer contact lists, product development notes, and other business-critical know-how.

Latest articles

European Court Declares Data Retention Directive Invalid

data retention policy, data breach, data retention directive, eradar, e radar

On 8 April 2014 the European Court of Justice ruled that the Data Retention Directive 2006/24/EC interferes in a particularly serious manner with the fundamental rights to respect for private life and to the protection of personal data. The Directive is declared invalid. Today’s guest post by Sylvie Rousseau and Matthias Vierstraete explains what the court decided […]

53 Essential IT Security Tips For Your Digital Business (1) (1)

As IT and the Internet matures we are all becoming much wiser about many of the online threats facing us personally and the organisations where we work. However, cyber criminals are becoming cleverer and more sophisticated too! New threats, different ways of attacking network and information systems, and more sophisticated malware demand that we keep […]

Access Assist – Data Protection App

apple, ipad

International law firm Allen and Overy are certainly thinking outside the box! For the corporate law firm launched a data protection app back in 2012 that aims to help organisations respond to subject access requests (SARs). The app requires iOS 4.3 or later and is compatible with iPad. Known as Access Assist, this smart little […]

UK Data Retention Periods

retention periods, data retention

Trying to understand and decide upon how long you should keep electronic records is a complex challenge for organisations. Especially those organisations with a global presence. Different business sectors all have their individual requirements, as do countries around the world. So, if you are doing business electronically and across international borders, you will need to be […]

Auto ID And The Open Global Supply Chain


Auto ID (auto identity) is the unique identity expressed in an automatically recognisable format. Examples of auto id technologies include the bar code and the radio frequency identification (RFID) tag. Auto ID forms the basis for encoding products as they flow through the supply (and demand) chain. Auto ID is a key feature in electronic […]

PSI: Commercial Opportunities In The Public Sector

psi, public records

PSI – public sector information – is the single largest source of information in Europe, and includes digital maps, meteorological, legal, traffic, financial, economic and other data. No wonder it’s valuable to governments looking to balance the books post recession. E RADAR investigates this most interesting product which is turning public sector bodies into commercial […]

Mobile Digital Evidence

e-contract, infrastructure contracts, online contract, contracting online, mobile digital evidence

Keith Cottenden, CY4OR’s Director and Head of Investigations Team discussed the issues and challenges facing digital forensics and mobile enterprise at E RADAR’s Trust in Mobile Enterprise Summit, held in Manchester on 10th October 2013. Conference delegates heard that most small and medium-sized firms are putting themselves at risk by not having in place a forensic […]

5 Ways to Safeguard Your Smartphone Data

smartphone data

Our Washington-based Tech Editor Jim Richardson looks at how your company can safeguard its smartphone data. With 58 percent of the mobile market dominated by smartphones according to comScore, they can be found in plenty of pockets. These phones are present in many aspects of people’s lives, from checking bank accounts to playing “Angry Birds.” Yet the […]

IT Forensics – Digital Evidence For Business

it forensics

Can you prove that an electronic transaction has taken place or an event within cyberspace has occurred? Even better, can you prove that they cannot have happened? IT forensics concerns forensic investigations across information and communications systems and networks – usually prompted by a suspected attack (DDOS attack, break-in, theft, etc.). A critical feature of IT forensics […]

HIPAA – Health Insurance Portability and Accountability Act of 1996


The Health Insurance Portability and Accountability Act of 1996 (HIPAA) (text) is an act of the United States Congress which aims to improve the efficiency and effectiveness of the US healthcare system. Under HIPAA, the US Department of Health and Human Services (HHS) is required to adopt national standards for electronic health care transactions and code sets, […]