Key Takeaways For schools, text messages are public records. Regardless of protocol, staff messages on district devices are subject to retention requirements, FOIA requests, and ediscovery. Archiving gaps are compliance gaps. Carrier archiving only captures SMS. iMessage and RCS, which are now default on most smartphones, bypass the carrier gateway entirely and are invisible to […]
New on Jatheon Cloud: AI FOIA Request Automation, Expanded Case Tagging, and Liya Global Chat
Jatheon Cloud’s latest release introduces new features designed to help compliance teams work faster across growing data volumes. The main addition is AI-powered FOIA Request Automation, a new capability that helps teams reduce manual work when processing open records requests. This release also expands case tagging across more data types and introduces Liya Global Chat […]
HIPAA Encryption Requirements: The Complete Guide for Covered Entities and Business Associates
Key Takeaways HIPAA gives organizations flexibility on encryption, but the conditions for opting out are strict enough that most can’t meet them. NIST sets the technical bar: AES-256 for stored data, TLS 1.3 for data in motion. Getting encryption right can mean the difference between a contained incident and a public, regulated breach. Encryption is […]
Social Media Archiving for Police Departments: How-To Guide
Key Takeaways Social media gives law enforcement real benefits, from community engagement and emergency alerts to crime prevention. At the same time, it carries legal, privacy and reputational risks. A formal law enforcement social media policy is necessary to protect the public and the agency from misuse, liability and compliance failures. Law enforcement agencies are […]
5 Intradyn Alternatives for Compliance-Driven Archiving
Your archive should make investigations easier. At first, Intradyn makes a lot of sense. It’s straightforward, covers email, mobile messaging, and social media, and gives organizations multiple deployment options like cloud, virtual appliance, and on-prem hardware. For small to mid-sized teams, that’s often enough. But as retention volumes grow, attachment-heavy mailboxes expand, and legal or […]
What Is PHI in Healthcare and How to Stay HIPAA Compliant
Key Takeaways Protected Health Information (PHI) is health information that can identify an individual and is held or transmitted by a covered entity or business associate. The same data can be PHI in one context and not another. Who holds it matters as much as what it says. HIPAA’s 18 identifiers define what to remove […]
PII Compliance: How to Get It Right + Checklist
Key Takeaways PII compliance is a set of rules that govern how organizations collect, store, use, and dispose of personally identifiable information. There’s no single law that defines it. Depending on your industry and location, GDPR, HIPAA, CCPA, FERPA, FINRA rules, or several of these may apply. Organizations are expected to know what personal data […]
New on Jatheon Cloud: Unified Search, AI Dashboard, YouTube and SharePoint Archiving
Jatheon Cloud’s latest release introduces several important updates focused on visibility, efficiency, and compliance readiness. This update brings a more connected experience across search, analytics, and data capture. From Unified Search and AI-powered dashboard insights to expanded data coverage, these improvements help compliance and IT teams manage growing data volumes with greater control. Here’s what’s […]
What Law Establishes PII? A Guide to U.S. PII Laws and Regulations
Key Takeaways U.S. privacy law has no single authority. PII protection is split across multiple federal, state, and international frameworks, and which ones apply to you depends on your industry, your data, and where you operate. State legislatures are filling the gaps that federal law leaves open. California led the way with CCPA, but the […]
What Is PII? A Complete Guide to Personally Identifiable Information
Key Takeaways PII (Personally Identifiable Information) is any data that can identify an individual, alone or in combination with other data. PII information is divided into two categories: direct identifiers (high-risk, identify someone on their own) and indirect identifiers (lower-risk individually, but identifying when combined). Major privacy laws governing PII include GDPR, HIPAA, and CCPA. […]
