Category Archives: Information Governance

Research confirms that Facebook, Twitter and Google are spying on users

big brother

big brother (Photo credit: Vince_Lamb)

Social networks: can robots violate user privacy?

ECM Plus +++ Recent news in the international media has revealed numerous Internet privacy concerns that definitely deserve attention and further investigation, which is why Geneva-based High-Tech Bridge  decided to conduct a simple technical experiment to verify how the 50 largest social networks, web services and free emails systems respect – or indeed abuse – the privacy of their users.

According to High-Tech Bridge, the experiment and its results can be reproduced by anyone, as we tried to be as neutral and objective as possible. Continue reading

Leave a comment

Filed under Analysis, Analytics & Metrics, Business Risk, Compliance, Content Curation, Content Governance, Content Management, Content management system (CMS), Content Protection, Content Security, Corporate Civic Responsibility (CCR), Corporate Governance, Customer Relations Management (CRM), Data mining, Data privacy, Data protection, Data storage, Digital asset management, Enterprise Content Management, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Information security, Intellectual Property (IP), Intelligent Search, Legal, Policy Management, Regulatory Compliance, Reporting, Risk Analysis, Risk Assessment, Risk Management, Security Content Management (SCM), Social Content Management, Trusted Cloud, UGC - User-generated content, WCM

Domain name campaigners battle corporate monopoly of gTLDs

ICANN Logo

ICANN  (Photot: Wikipedia)

‘Stop Corporate Takeover of Internet Names Petition” launched

ECM Plus +++ An internet activist has launched a petition to prevent large companies control over Chinese, Japanese, English and many other new top internet addresses.

“We believe this is an abuse of the New gTLD Program and it poses great risk of harm to consumers, business, and internet users globally” declares Tom Gilles, NewgTLDsite.com  TLD-vangelist and petition organizer. “These generic category top level domain names such as .app, .book, .music, and others should be open for the general public, not monopolized and closed off for use by one large corporation exclusively at their sole discretion.” Continue reading

Leave a comment

Filed under Industry News, Information Governance, Intellectual Property (IP), Intelligent Search, Telecommunications, Web compliance, Web governance

Oil giant demands disclosure of private emails

English: Chevron Corporation headquarters in S...

Chevron Corporation headquarters in San Ramon, California. (Photo: Wikipedia)

EFF and ERI fight to quash ‘speech-chilling’ subpoenas from Chevron

The Electronic Frontier Foundation and EarthRights International (ERI) have requested judges in California and New York to quash subpoenas issued by Chevron Corporation to three email providers demanding identifying information about the users of more than 100 email accounts. Continue reading

Leave a comment

Filed under Citizen Journalism, Document archiving & retrieval, Document Management, Email management, GRC (Governance, Risk & Compliance), Information Governance, Information Management, Legal

Big bank insider exposes $20bn UBS tax evasion, awarded $104m

National Whistleblowers Center – www.whistleblowers.org

Whistleblower bags massive $104 million reward for foiling bankster scam

By ECM Plus staff

ECM Plus /Washington, D.C./ +++ Former UBS banker Bradley Birkenfeld has won a massive whistleblower reward of $104 million for his contributions in providing the U.S. Government with insider information on UBS’ illegal offshore banking scheme.

According to the National Whistleblowers Center, this is believed to be the largest reward ever given to an individual whistleblower in the United States and the first major reward issued under the IRS tax whistleblower law. Continue reading

Leave a comment

Filed under Accounting, Asset management, Business Intelligence (BI), Business Rules, Capital Management, Compliance, Corporate Civic Responsibility (CCR), Corporate Governance, Corporate Social Responsibility (CSR), Document Management, eDiscovery, Electronic Document Management & Delivery, Finance, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Internal Controls, Investor Relationship Management, Legal, Policy Management, Private Finance, Private Wealth, Records & Information Management (RIM), Regulatory Compliance, Reporting, Risk Analysis, Risk Assessment, Risk Management, Segregation of Duties (SoD), Trade & Investment, Wealth Management

Foundation sues over email and phone hacking allegations

EFF_logo_white

Electronic Frontier Foundation

EFF says government ‘withholding information’ about ‘unconstitutional spying’

Washington, D.C. – The Electronic Frontier Foundation (EFF) sued the Department of Justice (DOJ) today, demanding answers about illegal email and telephone call surveillance at the National Security Agency (NSA). Continue reading

Leave a comment

Filed under Collaboration, Compliance, Content Governance, Content Protection, Content Security, Corporate Civic Responsibility (CCR), Corporate Governance, Customer Relations Management (CRM), Data Governance, Data mining, Data privacy, Data protection, Data storage, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Information Management, Information security, Internal Controls, Policy Management, Regulatory Compliance, Risk Management, Security Content Management (SCM), Segregation of Duties (SoD), Software, Telecommunications, Web governance

Location data takes centre stage in legal case

U.S. Supreme Court building.

U.S. Supreme Court building.

Government faces new warrantless surveillance battle after losing landmark GPS tracking case as defendant pushes to exclude cell phone location data obtained without a warrant

A federal district court is poised to determine whether the government can use cell phone data obtained without a warrant to establish an individual’s location.

In an amicus brief filed last Monday, the Electronic Frontier Foundation (EFF) and the Center for Democracy & Technology (CDT) argue that this form of surveillance is just as unconstitutional as the warrantless GPS tracking the U.S. Supreme Court already shot down in this case. Continue reading

Leave a comment

Filed under Content Protection, Corporate Social Responsibility (CSR), Data Governance, Data privacy, Data protection, Data storage, Governance Automation, Industry News, Information Governance, Information Management, Information security, Mobile Apps, Mobile communication, Mobile Content, Software, Telecommunications

Feds tap Open Text for DOI records management

The hierarchy of the U.S. Department of the In...

ECM behemoth proffers first U.S. Federal government Cloud-based information governance and records management programme

By ECM Plus staff

ECM Plus +++ the U.S. Department of the Interior (DOI) is deploying OpenText’s Enterprise Content Management software to power the agency’s Enterprise eArchive System.

According to OpenText, DOI is a Cabinet-level agency that manages America’s vast natural and cultural resources. The agency manages approximately 200 million emails with 35 terabytes of attached electronic content each year. Continue reading

Leave a comment

Filed under Enterprise Content Management, Information Governance, Records & Information Management (RIM), Vendor News

Inventor pioneer joins fight against GPS tracking

Artist Interpretation of GPS satellite, image ...
GPS tracking abuse challenged in court

Coalition urges U.S. Supreme Court to block government abuse of surveillance technology

By ECM Plus staff

ECM Plus +++ The principal inventor of the Global Positioning System (GPS) and other leading technologists have joined the Electronic Frontier Foundation (EFF) in urging the U.S Supreme Court to block the government from using GPS tracking without first getting a warrant, arguing that the massive collection of sensitive location data should require court oversight. Continue reading

Leave a comment

Filed under Content Delivery, Content Delivery Networks (CDN), Content Governance, Content Management, Content Protection, Data Governance, Data privacy, Data protection, Data storage, Database management, Industry News, Information Governance, Intelligent Search

New document scanning node opens in Stafford, England

Iron Mountain. Records and data storage facili...

Iron Mountain facility in Staffordshire, England.

Iron Mountain unveils Europe’s largest document scanning and indexing centres

By ECM Plus staff

ECM Plus +++ Iron Mountain has just opened one of Europe’s largest document scanning and indexing centres for organisations to manage information in the face of what it calls “increasingly stringent national and EU regulation”. Continue reading

Leave a comment

Filed under Data privacy, Data storage, Document archiving & retrieval, Document Automation, Document Management, Document scanning & imaging, Electronic Document Management & Delivery, Forms management, processing, eForms, Information Governance, Information Management, OCR - Optical Character Recognition, Records & Information Management (RIM), Regulatory Compliance, Vendor News

COMMENT: When will accountability be front and centre?

Scales Of Justice

Accountability: Systemic flaws need real independent oversight. Image: srqpix

Shameful News Corp. fiasco plumbs depths of disgusting depravity of institutions

BY PAUL QUIGLEY

ECM Plus +++ As the News Corp woes further unfold, it starts to call into question the whole systemic root of generic institutional accountability where conflict of interests issues are no longer allowed to be smokescreens to stop accountability and compliance being overhauled and independently monitored – true segregation of duties in governance terminology. Continue reading

Leave a comment

Filed under Business Process Management, Content Protection, Data privacy, Data protection, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Mobile communication, Mobile Content, Telecommunications

WEEKEND PLUS: News Corp woes shadow real issues

Slug from Atmosphere eavesdrops on Lucy?

Eavesdropping of voicemails should never have been technically possible in the first place. Image: Joe Howell

Infatuation with celebs and politicians clouds issue of weak data protection laws and further telecoms oversight by independent accountability councils of citizens

BY PAUL QUIGLEY

Truth is the first victim of war.

The disgusting charade that has been paraded this last week or so over the News Corporations’ alleged invasion of people privacy’s tends to mask the real problem. That is, how could this loophole of privacy invasion has been possible in the first place?

Insecure voicemail systems and processes.

And who is it who hosts these systems of privacy invasion? Continue reading

Leave a comment

Filed under Business Process Management, Corporate Social Responsibility (CSR), Data Governance, Data privacy, Data protection, Industry News, Information Governance, Internal Controls, Mobile communication, Mobile Content, Regulatory Compliance, Risk Management, Telecommunications

Document management helps detect jobsworth jiggery-pokery

NAMM 2007 - Mr Jobsworth.

The Enemy Within? Public sector jobsworth internal fraud increasing. (Image by Eleventh Earl of Mar via Flickr)

Preventing rising public sector employee ‘jobsworth’ fraud tackled by document management, says document management vendor Version One

By ECM Plus staff

ECM Plus +++ Reported cases of internal fraud are increasing following spending review cuts, according to dcument magement software vendor Version One.

The company said it was now urging public sector departments, agencies and quangos to invest in its electronic document imaging and cheque printing software, to combat rising levels of so-called ‘jobsworth terrorists’ or ‘jobsworth-jacking’ – public sector employee fraudsters. Continue reading

Leave a comment

Filed under Analysis, Compliance, Content Protection, Content Security, Data privacy, Data protection, Data storage, GRC (Governance, Risk & Compliance), Information Governance, Internal Controls, Risk Analysis, Risk Management, Segregation of Duties (SoD)

LATEST FEATURE: Enterprise Apps Forecast – Cloudy But With Chance of Transformation

Enterprise
Enterprise. Image: justshootingmemories

Today’s enterprise application forecast: Cloudy with a Chance of Transformation


By ROB PRINZO


The rapid pace of technology innovation combined with market forces creates the opportunity for organizations to find additional operating efficiencies through technology. These efficiencies are being found through consolidation, shared services, outsourcing and new deployment models such as SaaS and cloud computing. Continue reading

Comments Off on LATEST FEATURE: Enterprise Apps Forecast – Cloudy But With Chance of Transformation

Filed under Business Process Management, Business Risk, Enterprise Application Integration (EAI), Enterprise architecture (EA), Enterprise Resource Planning & Management, Enterprise Resource Planning (ERP), Features, Information Governance, Information Management, Risk Management, SaaS (Software-as-a-Service)

EFF launches campaign to protect privacy

Reporters Without Borders Internet censorship ...
Internet censorship around the world

Tor programme to support open internet and protect privacy

By ECM Plus staff

ECM Plus +++ The Electronic Frontier Foundation has just launched a new campaign to promote internet privacy. Dubbed as the ‘Tor Challenge’, the campaign is to encourage Internet users all over the world to support the Tor network by operating relays. Continue reading

Leave a comment

Filed under Data privacy, Data protection, Industry News, Information Governance, Information security, Risk Management, Web governance

Digital asset firesale as Autonomy mops up at Iron Mountain

Autonomy CEO Mike Lynch

Autonomy’s moves into the cloud platform to expand to 25 petabytes of customer data under management

By PAUL QUIGLEY

ECM Plus +++ Autonomy has just acquired selected key assets of Iron Mountain’s digital division including archiving, eDiscovery and online backup.

In a digital asset firesale that observers see as a stratgic move into the cloud for Autonomy, this means access to Autonomy’s technology for information governance in secure, private clouds in data centres. Continue reading

Leave a comment

Filed under Analytics & Metrics, Archive management, Asset management, Business Intelligence (BI), Business Process Management, Citizen Journalism, Cloud Computing, Compliance, Data Governance, Desktop Virtualization, eDiscovery, Enterprise Cloud, Enterprise Content Management, Enterprise Search, Industry News, Information Governance, Information Management, Private Cloud, Records & Information Management (RIM), Regulatory Compliance, Virtualization

American business leaders demand rebuttal of EU standards straightjacket

José Manuel Durão Barroso

Attempts to impose restrictive standards on America's business innovators

American trade groups and associations urge USTR to reject EU proposal that restricts choice of international standards

By ECM Plus staff

ECM Plus +++ The U.S. Chamber of Commerce, National Association of Manufacturers, National Foreign Trade Council and more than a dozen industry trade associations sent a joint letter to the United States Trade Representative (USTR) stating their strong objections to a European proposal in current World Trade Organization (WTO) Non-Agricultural Market Access (NAMA) negotiations. Continue reading

Leave a comment

Filed under Compliance, Corporate Governance, Data Governance, GRC (Governance, Risk & Compliance), Industry News, Information Governance, Regulatory Compliance, Risk Management

Galileo pontificates cloud payments for banks

Credit cards

Safety in numbers?: Cloud payment plans from Galileo

Cloud processing for regional and smaller banks and financial firms

ECM Plus – Galileo Processing has just taken the wraps off its new suite of solutions that enable payment card issuing banks and payment card programme managers to use cloud computing while ensuring levels of security, availability and regulatory compliance.

According to Galileo, their cloud processing offers clients a dedicated virtual environment where clients can preserve intellectual property. Users can develop their own app and functionality to support their card programmes. Continue reading

Leave a comment

Filed under Analytics & Metrics, Billing & Customer Care Systems (BCCS), Cloud Computing, Compliance, Customer Relations Management (CRM), Data Governance, Data privacy, Data protection, Information Governance, Information Management, Information security, Intellectual Property (IP), Trusted Cloud, Vendor News

Doculex pumps up Archive Studio for robust email capture

Sen. Paul Sarbanes (D–MD) and Rep. Michael G. ...

Sarbanes and Oxley

Document management firm releases V4 for Exchange 2010 archiving

BY PAUL QUIGLEY

ECM Plus – Powering automated email capture and archiving for document management, regulatory requirements and accounts receivable workflow processing

DocuLex’s WebSearch component of the Archive Studio Software Suite V4 now has the capability to pull all inbound, outbound and inter-company email from Exchange 2010. Continue reading

Leave a comment

Filed under Archive management, Business process automation (BPA), Compliance, Document archiving & retrieval, Document Automation, Document Management, Document scanning & imaging, Email management, Enterprise architecture (EA), Information Governance, Regulatory Compliance, Vendor News

Upcoming UK Census data offshoring destined for more debacles

Divisions of the United Kingdom

ONS offshoring Briton's personal data for £150m

Report reveals 2011 UK Census of private data set to go offshore to foreign agencies, increasing probability of yet more Government-sanctioned personal data breaches

ECM Plus – A new Guardian report indicates that the British Government’s Office of National Statistics is to pay a foreign agency £150 million in taxpayer money to undertake the collection and processing of Britain’s families and personal income data, with new extra questions in this year’s Census demanding to know the details of sources of incomes as well as additional personal data in the 32-page questionnaire, now destined to go offshore in the government cutbacks and ‘efficiency-savings’ outsourcing deal. Continue reading

Leave a comment

Filed under Business Intelligence (BI), Content Categorisation, Content Fingerprinting, Content Management, Content Monetization, Content Protection, Content Security, Data centres, Data Governance, Data privacy, Data protection, Data storage, Document archiving & retrieval, Document Management, Document scanning & imaging, Forms management, processing, eForms, Information Governance, Information security, Records Management, Scanning, Search, Security Content Management (SCM)

FEATURE: Key considerations for ‘cloudsourcing’ contracts – CAMM

Cloud computing sample architecture

Cloud computing sample architecture

BY JOHN WALKER

Economics dictates that the CEO, and CFO have a balancing act delivering security, and quality operational services, whilst at the same time, attempting to reduce the organisational and operational costs of delivering the business’ mission.

One opportunity in focus is that of ‘CloudSourcing’, where, depending on the size and type of business, they may be considering engaging in a contract in which part, or all, of their operations are placed into the hands of a Cloud Provider, be this SaaS, PaaS, IaaS or any other such ‘Anything-as-a-Service’ that may accommodate the operational model. Continue reading

Leave a comment

Filed under Business continuity, Cloud Computing, Compliance, Consultancy/Consulting/Systems Integration, Content Security, Data centres, Disaster Recovery, Features, High Availability, Hybrid Cloud, IaaS (Infrastructure-as-a-Service), Information Governance, Information Management, Information security, PaaS (Platform-as-a-Service), Private Cloud, Public Cloud, Regulatory Compliance, Risk Management, SaaS (Software-as-a-Service), Security Content Management (SCM), SIP, Telecommunications, Virtualization, VPS Cloud

FEATURE: Cloud computing – the calm before the storm

Sourcefire

Sourcefire. Picture: joelesler

Enterprises across the world are hunting down the best way to scale their computing capability. Finding ways to work smarter has become increasingly important in today’s cost-controlled market. IT departments searching for a solution often demand that the infrastructure has to be quick, cheap and dynamic and this is one of the reasons that cloud computing is being touted as a potential corporate game changer.

BY LEON WARD

Cloud Computing has been described as, arguably, the third revolution of IT, following the Personal Computer and Internet revolutions. But like most revolutions, progress towards widespread acceptance of the new regime is likely to take some time, amidst suspicion, a lack of confidence, wise skepticism and some false starts.

Many CIOs are in the process of moving applications and services into the Cloud. Some are considering Cloud-based computing due to economic reasons, while others are looking to create new dynamic IT services. Regardless of the reasons, with organisations contemplating moving to a Cloud environment many are forgetting a potentially fatal element, security. Before an IT director can make a clear sensible decision about a future Cloud strategy, let’s investigate where some risks lie, and work out where responsibility and accountability falls.

Ensuring a security evaluation is undertaken is a ‘must do’. Never simply assume that a service provider’s security is up to scratch. It must be checked. Matt Watchiniski, Sourcefire’s Director of Vulnerability Research Team, endorses this view. He says that as more and more enterprises and organisations move their applications to SaaS platforms, some provider is bound to fail miserably. We haven’t seen the major compromise, but this risk has to be on the horizon. So with storm clouds ahead, who is going to be in the dock when there is a failure? An understanding of accountability needs to be clear. Businesses using these types of services need to make sure they understand who is responsible for fixing these problems when they crop up, and who is legally accountable for the data loss. Outsourcing your data to the Cloud does not equate to outsourcing the risk, if your Cloud provider was responsible for the loss of your customer’s data, you could still find yourself accountable.

The impact of failure

Serious failures within a cloud infrastructure can have repercussions that reach much further than within a single enterprise. Last year, after a major server outage, thousands of users of the Sidekick mobile phone and messaging service were warned that their personal data and photos had “almost certainly been lost”. Over a week later Microsoft, owner of Danger the cloud-computing provider, confirmed that they had managed to recover “most, if not all the customer data”. This example publically highlights the potential danger of entrusting trusting personal data to the cloud, but it doesn’t mean there’s a major design flaw in the Cloud-Computing concept. It’s implementation specific, but it negatively impacts confidence in the whole market.

On the positive side, Cloud service providers typically have more resources to put into security and reliability than most businesses, and far more than a small business. Where would you rather your sensitive, client and internal data was stored? Public clouds advertise a robust, highly physically secure data centre. Additionally there should be a team of on-site security experts focused on protecting that information stored. Compare this to the alternative of the data being stored on a laptop which is continually moving around and being accessed in different locations. The data centre now seems the smart choice, but don’t forget you are handing over your information to someone else, and therefore losing direct control over it.

Compliance matters

Those considering a move to the Cloud need to consider how their market is regulated. Strict codes of conduct apply to many businesses and in some cases, regulations might stipulate that personal data has to remain within a specific country thus ruling out the use of certain providers who distribute data globally. In some situations the storage and processing of information away from a user or the enterprise is seen as a real advantage, a good example of this would be in a government, military or other high-security environment. Because of this advantage I expect to see some near-term implementations of Government controlled and designed community Cloud infrastructures. If those who are accountable for potential data loss are in control of the Cloud constructed to protect it, many of my concerns dissipate and central responsibility can be re-established around critical information that has traditionally been distributed. Imagine a world where DVDs of sensitive data are no longer lost in the post; they are simply re-referenced within the Cloud.

Make sure your house is in order

If the idea of storing and working with your critical data in a shared external infrastructure looks attractive in terms of cost metrics, before looking for a provider it is clear that some research needs to be undertaken.

Firstly, you need to prepare a list of mandatory security controls that you demand around the data you consider most sensitive, and then come up with suggestions of how a provider could potentially demonstrate these controls to you in action. Only then start to research the providers that believe they can meet the demands you place on your data. This should be part of ­any due diligence process. As the service consumer you should be in control of your data wherever it is, and you should have the ability to demand that any provider can prove their security capability, as it is likely that you will ultimately be accountable for a breach. Find out who you call if there is a problem and details around what service can you expect? In times of crisis you need guarantees that it will be prompt and responsive. The Cloud provider needs to be transparent.

If you have performed in-depth research before looking at service offerings you should understand the problems that face Cloud providers. Never be scared to call foul when you see a complex problem with an over simplified solution. It’s a cliché, but if it sounds too good to be true, it probably is. Always make sure you keep the horror show that is accountability in mind. Out of sight should never mean out of mind.

Leon Ward is Senior Security Engineer, Sourcefire – www.sourcefire.com

 

1 Comment

Filed under Cloud Computing, Compliance, Content Security, Data Governance, Data storage, Features, IaaS (Infrastructure-as-a-Service), Information Governance, Information security, PaaS (Platform-as-a-Service), Security Content Management (SCM)

Identity Document Act kills ID Cards and NIR database

UK National Identity Card (Front)

House of Lords consign ID cards and register to history. Picture: ZapTheDingbat

Last night in the Lords at 9.49 pm, Royal Assent was given to the Identity Documents Act.

All existing ID cards will now be cancelled within one month.

The National Identity Register, the database which contains the biographic and biometric fingerprint data of card holders, will also be destroyed within two months.

According to sources, this saves £835 million in planned future expenditure.

Leave a comment

Filed under Asset management, Content Security, Data Governance, Data privacy, Data protection, Database management, Document archiving & retrieval, Document Management, Document scanning & imaging, Industry News, Information Governance, Information security, Records Management

Xerox arm does ‘documents on demand’ compliance bundle

Before the signing ceremony of the Sarbanes-Ox...

Before the signing of the Sarbanes-Oxley Act

Mr. Copy launches DocuShare on Demand hosted ECM for document management

ECM Plus – Xerox’ Mr. Copy has just launched DocuShare on Demand targeting small-to-medium-sized businesses

The D-o-D system is a hosted enterprise content management solution which enables users to undertake document management, collaborate, review and approve as well as web publishing.

Xerox said that when coupled with Xerox scan-enabled multifunction devices from Mr. Copy, DocuShare on Demand provides a complete document management solution from one trusted vendor.

“It’s important to offer services that will help customers improve business operations and productivity” commented Bob Leone, president of Mr. Copy. “We developed DocuShare on Demand for companies committed to business modernization and green technology initiatives. We work closely with customers to contain costs and implement sustainability processes. In addition, we ensure document integrity and follow rigorous security standards, including SAS 70, Red Flag and HIPAA certifications.”

Xerox also claims that DocuShare on Demand can save users up to 90 percent of operational and storage costs relating to document management. It added that the new service would improve operational efficiencies by cutting the time it takes to find vital information by up to 80 percent.

The company also boasts compliance for HIPAA, FERPA, Sarbanes-Oxley and 37 other state privacy laws were also bundled in the package.


Leave a comment

Filed under Compliance, Data Governance, Data privacy, Data protection, Document archiving & retrieval, Document Management, Document scanning & imaging, Enterprise Content Management, Information Governance, Information Management, Information security, Vendor News, Web compliance, Web governance

Open Text and Oracle intertwine as consolidation looms

text, pages, open book

Compliance, governance issues dominate consolidation moves

Open Text taps Oracle for database access and compliance

BY PAUL QUIGLEY

ECM Plus – Open Text is to embed Oracle technology for enterprise content management. The two corporations have just inked agreements on mutual distribution and technology transfer..

Open Text added that it actually will embed Oracle’s technology into its own in order to offer new enterprise content solutions, the company has confirmed.

According to the two firms, the move caters for archiving, eDiscovery and regulatory compliance.

Open Text confirmed it was obtaining a technology and distribution license specifically for Oracle Universal Online Archive Content Management SDK.

As part of the agreement, Open Text will embed Oracle technology into its products, enabling it to use the capabilities of Oracle’s Database 11g as an enterprise content repository.

The partners said such a move would also enable a ‘rapid uptake of Oracle Fusion Middleware 11g’ and ‘other Oracle platform capabilities’.

Such a deal would also, the firms stated, enable Open Text customers to capture large volumes of emails, documents, images, and application data and manage their entire lifecycle in an integrated environment.

The firms said that by using Oracle technology, Open Text would also be able to offer secure archiving and risk mitigation solutions.

Rich Buchheim of Open Text said the move with Oracle was “a strategic priority for us” and added that the deal was also to “expand our information governance capabilities”. Buchheim added that content was now “exploding out of control” for organisations.


Leave a comment

Filed under Archive management, Compliance, Data Governance, Database management, Document Management, eDiscovery, Enterprise Content Management, Industry News, Information Governance, Information Management, Records & Information Management (RIM), Records Management