In launching the Ritter Academy, I, along with the entire team, are doing something we believe to be unique—creating visual-based knowledge assets and training tools that empower professionals to access, acquire and retain complex information about the rules with which we are to manage digital information. At other education levels, particularly K-12, extensive innovation is occurring in using visual maps to teach. There are a few examples of maps entering college classrooms, and the number is increasing. But we were not aware, as we launched the Academy, of any other initiatives like ours. You wonder each day if the work in which we have invested over five years of development is truly going to make a difference. I know, … Read More
In the next few days, the digital doors will be opening on The Ritter Academy. This event is a celebration of outstanding teamwork, with professionals that share my passion to build trust in digital information. Our objective is simple: by creating unique, innovative and designed learning for all of the professionals that must manage digital information as evidence, we can create better awareness of the value of rules-based design, and accelerate the velocity with which we all proceed to build reliability and integrity into the most important digital records—those that serve as evidence to prove the truth. Legal researchers, video producers, e-learning experts, web developers, open source coders, voice talent, proof-readers—all have collaborated to produce something that may make a … Read More
It did not surprise me that the second indictment after Bernie Madoff charged his software developers. To succeed as the wizard of lies, the title given to him by Diana B. Henriques in her new book, Madoff needed to create digital information that was accepted as evidence of the truth. No matter how gracious he could be as a salesman, investor or executive, the data had to be convincing. And we know the rest of the story. The software itself served up convincing presentations but was, itself, designed to deceive.
I have not had the time to fully investigate all of the fine reporting done by others; I look forward to doing so. But I am fairly confident that the … Read More
On May 3, 2011, I will be in New York City. The day is a first for me—two keynote addresses at two different events, with two very different audiences.
First, I will be opening the day reprising for IANS at their New York Users Forum my keynote presentation on Governing Security: Charting a Path Forward. I gave this address at their Washington, DC event and am thrilled to be invited to deliver again the gospel of rules-based design for governing security.
Then, later in the day, I will be speaking to the LRN Knowledge Forum, a by-invitation only event for their corporate partners. I serve as a subject-matter expert for LRN’s Ethics and Compliance Alliance and will be speaking … Read More
It’s really exciting to know that what I am doing with visual maps is at the cutting edge. Now, with nearly 2 million users, MindJet has invited my team to join their Developer Network, which allows us to connect our passion to mapping law and technology together to some of the most innovative developers for integrating mapping into other practical applications and solutions.
MindJet realized that mappers who create really cool content and developers creating really cool apps can achieve even more when they connect. This is an exciting development for us as we move forward toward the launch of the Ritter Academy, an online training facility that uses visual-based learning to build trust in digital information.
Thanks MindJet—we … Read More
On April 12, 2011, I will be presenting a private webcast to the subscribers for the Ethics & Compliance Alliance, a superb knowledge resource for ethics and compliance executives, on Avoiding Legal Storms in the Cloud—Contracting for Security. This program will introduce a structured approach for addressing security issues effectively and with enforceable contractually-based controls. This webinar also launches a monthly blog I will be doing for ECA’s subscribers examining contracting for security in depth and presenting model clauses for navigating technically complex topics.
I offer coaching and training on these same topics to executives and their teams. So often, Legal, IT, Security, Compliance and Audit struggle to find a shared vocabulary to discuss how to accomplish what … Read More
Word has quickly spread about the gauntlet I threw down in Baltimore on March 8th when I spoke to the ARMA International chapter meeting. This event was the first chance to present my manifesto to records professionals on how to transfer their careers. Now, other ARMA chapters in the region are calling and asking me to preach the manifesto to their members as well. Cool.
My next presentation will be on May 12, in Silver Spring, Maryland at 6:00 pm. Details on the location have not yet been released but I will post them here when they are made available. In the meantime, if you are in the DC area, do plan to join us on May 12. … Read More
Have you ever wondered why lawyers write rules and regulations? So often, they negotiate into the final version of statutes, rules and regulations the use of words such as “reasonably designed”, “appropriate procedures”, “material risks”.
All of these words are offered by the regulators as attempts to formulate standards that can be adapted across the range of companies that may be subject to the rules—large, small, domestic, foreign-owned, partnerships, joint ventures. But in the 21st century, those words fail to actually deliver to the regulated entity the type of direct, useful guidance as to what they can actually build and implement to be in compliance with the rules. Years ago, I was taught that businesses don’t like rules, but when … Read More
On March 23, 2011, beginning at 09:00 AM, EDT, I will be presenting the keynote address for a virtual trade show presented by ARMA International and SearchCompliance.com. This is exciting—the last virtual trade show for searchcompliance attracted nearly 700 in the audience.
My presentation includes an opportunity to download a RitterMap on the steps required to leverage e-discovery needs and achieve velocity in building your records and information management program.
Companies have recognized, particularly large businesses, that building IT systems is complex. Enterprise architects are responsible for applying many of the same skills that building architects are required to display. They must understand structural integrity, operational safety, functional utility, and must assure that the systems satisfy mandatory requirements.
For the building architect, those requirements are normally expressed in both legal structures, such as building codes, and technical engineering resources, such as load tables.
But, wait a minute. Don’t IT architects have similar requirements?
In the 21st century, it is certainly true that any IT network, system or service must navigate through a bundle of legal rules regarding information, access and use, preservation and destruction, transfer, and other requirements. But unlike … Read More