<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"><url><loc>https://ostermanresearch.blog/</loc></url><url><loc>https://ostermanresearch.blog/2014/01/</loc></url><url><loc>https://ostermanresearch.blog/2014/02/</loc></url><url><loc>https://ostermanresearch.blog/2014/03/</loc></url><url><loc>https://ostermanresearch.blog/2014/04/</loc></url><url><loc>https://ostermanresearch.blog/2014/05/</loc></url><url><loc>https://ostermanresearch.blog/2014/06/</loc></url><url><loc>https://ostermanresearch.blog/2014/07/</loc></url><url><loc>https://ostermanresearch.blog/2014/08/</loc></url><url><loc>https://ostermanresearch.blog/2014/09/</loc></url><url><loc>https://ostermanresearch.blog/2014/10/</loc></url><url><loc>https://ostermanresearch.blog/2014/11/</loc></url><url><loc>https://ostermanresearch.blog/2014/12/</loc></url><url><loc>https://ostermanresearch.blog/2015/01/</loc></url><url><loc>https://ostermanresearch.blog/2015/02/</loc></url><url><loc>https://ostermanresearch.blog/2015/03/</loc></url><url><loc>https://ostermanresearch.blog/2015/04/</loc></url><url><loc>https://ostermanresearch.blog/2015/05/</loc></url><url><loc>https://ostermanresearch.blog/2015/06/</loc></url><url><loc>https://ostermanresearch.blog/2015/08/</loc></url><url><loc>https://ostermanresearch.blog/2015/09/</loc></url><url><loc>https://ostermanresearch.blog/2015/10/</loc></url><url><loc>https://ostermanresearch.blog/2015/11/</loc></url><url><loc>https://ostermanresearch.blog/2016/01/</loc></url><url><loc>https://ostermanresearch.blog/2016/02/</loc></url><url><loc>https://ostermanresearch.blog/2016/03/</loc></url><url><loc>https://ostermanresearch.blog/2016/04/</loc></url><url><loc>https://ostermanresearch.blog/2016/05/</loc></url><url><loc>https://ostermanresearch.blog/2016/08/</loc></url><url><loc>https://ostermanresearch.blog/2016/09/</loc></url><url><loc>https://ostermanresearch.blog/2016/10/</loc></url><url><loc>https://ostermanresearch.blog/2017/01/</loc></url><url><loc>https://ostermanresearch.blog/2017/01/19/the-impact-of-the-gdpr-on-your-business/</loc></url><url><loc>https://ostermanresearch.blog/2017/02/</loc></url><url><loc>https://ostermanresearch.blog/2017/03/</loc></url><url><loc>https://ostermanresearch.blog/2017/07/</loc></url><url><loc>https://ostermanresearch.blog/2017/07/31/do-you-manage-social-media-well/</loc></url><url><loc>https://ostermanresearch.blog/2017/08/</loc></url><url><loc>https://ostermanresearch.blog/2017/08/02/open-questions-about-the-gdpr/</loc></url><url><loc>https://ostermanresearch.blog/2017/09/</loc></url><url><loc>https://ostermanresearch.blog/2017/09/12/you-need-to-archive-mobile-text-messages/</loc></url><url><loc>https://ostermanresearch.blog/2017/09/18/byod-ok/</loc></url><url><loc>https://ostermanresearch.blog/2017/10/</loc></url><url><loc>https://ostermanresearch.blog/2017/10/04/monitor-your-social-media-exposure/</loc></url><url><loc>https://ostermanresearch.blog/2017/10/18/can-the-gdpr-be-weaponized/</loc></url><url><loc>https://ostermanresearch.blog/2017/10/18/can-the-gdpr-be-weaponized/amp/</loc></url><url><loc>https://ostermanresearch.blog/2017/12/</loc></url><url><loc>https://ostermanresearch.blog/2017/12/15/a-better-solution-than-net-neutrality/</loc></url><url><loc>https://ostermanresearch.blog/2017/12/15/a-better-solution-than-net-neutrality/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/01/</loc></url><url><loc>https://ostermanresearch.blog/2018/01/24/you-should-not-archive-your-email-and-texts/</loc></url><url><loc>https://ostermanresearch.blog/2018/01/24/you-should-not-archive-your-email-and-texts/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/09/how-to-protect-corporate-when-employees-leave/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/09/how-to-protect-corporate-when-employees-leave/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/13/the-impact-of-the-gdpr-on-cloud-providers/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/13/the-impact-of-the-gdpr-on-cloud-providers/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/14/what-about-shadow-iot/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/14/what-about-shadow-iot/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/21/how-long-should-you-retain-records/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/21/how-long-should-you-retain-records/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/28/preparing-for-the-gdpr/</loc></url><url><loc>https://ostermanresearch.blog/2018/02/28/preparing-for-the-gdpr/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/03/</loc></url><url><loc>https://ostermanresearch.blog/2018/03/15/security-defenses-are-not-adequate/</loc></url><url><loc>https://ostermanresearch.blog/2018/03/15/security-defenses-are-not-adequate/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/08/</loc></url><url><loc>https://ostermanresearch.blog/2018/08/03/went-from-windows-to-mac-now-thinking-of-moving-back/</loc></url><url><loc>https://ostermanresearch.blog/2018/08/03/went-from-windows-to-mac-now-thinking-of-moving-back/amp/</loc></url><url><loc>https://ostermanresearch.blog/2018/08/22/an-interesting-approach-to-encryption/</loc></url><url><loc>https://ostermanresearch.blog/about/</loc></url><url><loc>https://ostermanresearch.blog/author/ostermanresearch/</loc></url><url><loc>https://ostermanresearch.blog/best-virtual-office-in-las-vegas-for-remote-professionals-and-consultants</loc></url><url><loc>https://ostermanresearch.blog/contact/</loc></url><url><loc>https://ostermanresearch.blog/is-my-data-safe-in-the-cloud-encryption-keys-and-zero-trust</loc></url><url><loc>https://ostermanresearch.blog/knowledge-deduplication-fingerprints-embeddings-and-clusters</loc></url><url><loc>https://ostermanresearch.blog/page/2/</loc></url><url><loc>https://ostermanresearch.blog/pagenotfound.html</loc></url><url><loc>https://ostermanresearch.blog/tag/ajit-pai/</loc></url><url><loc>https://ostermanresearch.blog/tag/alexa/</loc></url><url><loc>https://ostermanresearch.blog/tag/apple-watch/</loc></url><url><loc>https://ostermanresearch.blog/tag/archive/</loc></url><url><loc>https://ostermanresearch.blog/tag/archiving/</loc></url><url><loc>https://ostermanresearch.blog/tag/clinton/</loc></url><url><loc>https://ostermanresearch.blog/tag/cloud/</loc></url><url><loc>https://ostermanresearch.blog/tag/common-carrier/</loc></url><url><loc>https://ostermanresearch.blog/tag/competition/</loc></url><url><loc>https://ostermanresearch.blog/tag/compliance/</loc></url><url><loc>https://ostermanresearch.blog/tag/cybersecurity/</loc></url><url><loc>https://ostermanresearch.blog/tag/data-protection/</loc></url><url><loc>https://ostermanresearch.blog/tag/data-retention/</loc></url><url><loc>https://ostermanresearch.blog/tag/data-subject/</loc></url><url><loc>https://ostermanresearch.blog/tag/data/</loc></url><url><loc>https://ostermanresearch.blog/tag/disposition/</loc></url><url><loc>https://ostermanresearch.blog/tag/email-spoofing/</loc></url><url><loc>https://ostermanresearch.blog/tag/email/</loc></url><url><loc>https://ostermanresearch.blog/tag/employees/</loc></url><url><loc>https://ostermanresearch.blog/tag/encryption/</loc></url><url><loc>https://ostermanresearch.blog/tag/eu/</loc></url><url><loc>https://ostermanresearch.blog/tag/european-union/</loc></url><url><loc>https://ostermanresearch.blog/tag/exfiltrate/</loc></url><url><loc>https://ostermanresearch.blog/tag/fbi/</loc></url><url><loc>https://ostermanresearch.blog/tag/fcc/</loc></url><url><loc>https://ostermanresearch.blog/tag/fitbit/</loc></url><url><loc>https://ostermanresearch.blog/tag/gdpr/</loc></url><url><loc>https://ostermanresearch.blog/tag/google/</loc></url><url><loc>https://ostermanresearch.blog/tag/government/</loc></url><url><loc>https://ostermanresearch.blog/tag/hr/</loc></url><url><loc>https://ostermanresearch.blog/tag/internet-of-things/</loc></url><url><loc>https://ostermanresearch.blog/tag/internet-service-provider/</loc></url><url><loc>https://ostermanresearch.blog/tag/internet/</loc></url><url><loc>https://ostermanresearch.blog/tag/iot/</loc></url><url><loc>https://ostermanresearch.blog/tag/isp/</loc></url><url><loc>https://ostermanresearch.blog/tag/labor/</loc></url><url><loc>https://ostermanresearch.blog/tag/legal-professional-privilege/</loc></url><url><loc>https://ostermanresearch.blog/tag/malware/</loc></url><url><loc>https://ostermanresearch.blog/tag/net-neutrality/</loc></url><url><loc>https://ostermanresearch.blog/tag/privacy/</loc></url><url><loc>https://ostermanresearch.blog/tag/ransomware/</loc></url><url><loc>https://ostermanresearch.blog/tag/record/</loc></url><url><loc>https://ostermanresearch.blog/tag/recordkeeping/</loc></url><url><loc>https://ostermanresearch.blog/tag/records/</loc></url><url><loc>https://ostermanresearch.blog/tag/regulation/</loc></url><url><loc>https://ostermanresearch.blog/tag/retain/</loc></url><url><loc>https://ostermanresearch.blog/tag/retention/</loc></url><url><loc>https://ostermanresearch.blog/tag/right-to-be-forgotten/</loc></url><url><loc>https://ostermanresearch.blog/tag/security/</loc></url><url><loc>https://ostermanresearch.blog/tag/shadow-it/</loc></url><url><loc>https://ostermanresearch.blog/tag/spearphishing/</loc></url><url><loc>https://ostermanresearch.blog/tag/subject-access-request/</loc></url><url><loc>https://ostermanresearch.blog/tag/targeted-email-attack/</loc></url><url><loc>https://ostermanresearch.blog/tag/texts/</loc></url><url><loc>https://ostermanresearch.blog/tag/theft/</loc></url><url><loc>https://ostermanresearch.blog/tag/training/</loc></url></urlset>