7 Things You Need to Know When Starting a Digital Transformation Initiative

Mar 23, 2016 10:34:39 PM by John Mancini

7 Tips for Creating a Transformation Strategy

#1 -- Know where the puck is going.

Danielle Galmore, Steelcase: “Technology moves faster than companies, as a rule. Be cognizant of what is happening and ready to adjust if new technology or new needs arise. Your first project may have to pivot if too much time has elapsed and relevancy is lowered.”

#2 – Think business, not fashion.

Paul Engel, VeBridge:  “Not every aspect of digital disruption impacts you or your business.  Spend your money strategically -- and surgically.  Don’t run after every new bright and shiny object out there just because others are doing so. Be thoughtful. Ask the question, ‘Can I leverage this to my company's advantage, or is this just a new bell or whistle?’”

#3 -- Have a Disruption war chest!

Ian Story, IBM: “If you don't have the financial strength to weather changes in your business, you need to start preparing now, while things are still good -- build that war chest or rainy day fund. What are you going to do when an upstart competitor comes in and steals half of your business overnight?"

#4 -- It's a journey, not a destination. 

Chris McLaughlin, EMC:  "True digital transformation is about instilling a digital mindset in your organization. A truly digital organization embraces change and recognizes that new technologies, new products and services, and new ways of servicing customers are simply opportunities: opportunities to differentiate, to take market share and to outperform competitors. 

#5 – Keep risk in perspective.

Neale Stidolph, Lockheed-Martin: "Chaos cannot be controlled, information wants to be free and people don't do what they are told. These are universal truths!  What we can do is explain to everyone that information has issues of sensitivity, risk, regulation and many other factors. We must all be thoughtful in our treatment of information. We cannot police this whole ecosystem but we can make people cautious and mindful about it.


Get your free Transformation ebook NOW -- Click HERE.  21 Tips.

Digital Transformation in Action


#6 – One size does not fit all.

Alan Pelz-Sharpe, Digital Clarity: “Just because technology X works well for Ford or GE does not mean it will work for you. Often times simple, stripped back technology will be a better fit for your needs that broad, complex and expensive technology 'suites.’” 

Rule #7 -- Per Yoda, "Do or do not, there is no try."

Andrea Chiappe, Systemware:  “Remember that in the end, the evolution of ECM isn’t about how we share information now. It’s about brokering that information in the future.  We have to reach outside our traditional information spheres, and re-evaluate our existing processes and solutions.  Hanging on to an aging, bandaged ECM solution can limit the future success of your business strategies. Sometimes we have to let go of our past experiences and embrace the future if we’re to fulfill our information destinies.”

Read More

Topics: information chaos, digital transformation,, aiim16

Why Should You Care About Digital Transformation?  21 Tips to Guide Your Plan -- Free E-book

Mar 23, 2016 9:14:47 AM by John Mancini

Why Should You Care About Digital Transformation?

Consider the following:

“The speed of current breakthroughs has no historical precedent.”

            --Klaus Schwab, World Economic Forum, 2016

“For the first time in history, the world’s leading experts on accelerating technology are consistently finding themselves too conservative in their predictions…”

            --Steven Kotler

“Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world’s largest accommodation provider, owns no real estate. Something interesting is happening.”

            --Tom Goodwin, Havas Media, in Techcruch

What the heck is going on and what does it have to do with Information Professionals?

Simply speaking, according to the World Economic Forum, we are on the cusp of the next industrial revolution, one that is combining digital and physical systems to create radically new value propositions – and in the process, disrupting many existing businesses. 

How effectively an organization manages and recombines its information assets to create value is at the center of this revolution.  Flexible, agile and responsive information flows are the central nervous system of the modern organization.  In many organizations, these systems are short-circuiting, and drifting into chaos, unable to keep up with the escalating demands created by consumerization, cloud and mobile, and the internet of things.

Central to addressing these challenges are two realizations:

1 -- Information is now your organization’s most important asset, and

2 -- You need the skills to manage it. 

Depending on your role in your organization, your Digital Transformation challenges will fall into one of the following categories:

Business Challenge

Who Should Care

AUTOMATION:  How do I deliver solutions more quickly using mobile-first and lo- and low-code approaches?

Line of business executives, web and mobile app developers, imaging and content specialists, business analysts, finance, HR, and operations executives, customer experience execs

SECURITY/GOVERNANCE:   How do I govern, value, manage, secure, optimize and protect my information assets, wherever they exist (cloud, on-premise, or some hybrid)?

Records managers, information architects, E-Discovery, IT legal professionals, digital archivists

ANALYTICS/INSIGHT: How do I digest massive amounts of new data, apply structure where it doesn’t exist, and use that structure to put data and content into action?

Marketers, line of business executives,  information and data scientists, knowledge managers, information curators, customer experience execs

I've put together some of the Digital Transformation insights from AIIM Board members and AIIM16 speakers into a new e-book -- it's FREE -- 21 Tips for Putting Digital Transformation into Action.

Here are my "tips" -- find out more in the free e-book -- (get it HERE).

Creating a Transformation Strategy

  1. Know where the puck is going.
  2. Think business, not fashion.
  3. Have a Disruption war chest!
  4. It's a journey, not a destination.
  5. Keep risk in perspective.
  6. One size does not fit all.
  7. Per Yoda, "Do or do not, there is no try."

Preparing for Action

  1. Not all customers will immediately love the idea of disruptive change.
  2. Disruption is not just an external customer affair; the way work itself is being done is being revolutionized.
  3. Find out what your people are REALLY doing BEFORE you try to change it.
  4. If you can't measure it - don't do it.
  5. Make digital transformation pay for itself.
  6. Plan that when you fail (and you will), you will fail fast!

 Implementing Your Transformation Plan

  1. Mom was right. Before you do anything, clean your room!
  2. A unified information strategy is not a luxury.
  3. Focus, focus, focus. And then focus some more.
  4. Remember that simple is hard.
  5. Find a trusted partner that will listen and is excited about your journey.
  6. Leverage the technology you already use.
  7. Think BIG, start small, grow steadily.
  8. The last rule – Oh yeah, after all this is AIIM. You didn’t think we would forget, did you? DO SOMETHING ABOUT THE PAPER!

Digital Transformation in Action

Not signed up for AIIM16?  What? Hurry because hotel block closes on Friday.

Read More

Topics: information chaos, Digital business, digital transformation,

What does it mean to disrupt a disrupter? It means things are changing even more quickly than you think

Mar 22, 2016 8:00:00 AM by John Mancini

How do you disrupt a disrupter?

SlantNews and the Huffington Post.  It’s kind of a cool story.

Companies and organizations in every field face disruption from new entrants — competitors without the burden of legacy systems, who can move quickly and with agility, and can use new tools and public infrastructures to get to scale quickly. Technology is moving so quickly that a new generation of disruptors are emerging to rival the original disruptors.  

SlantNews used agile approaches to go from original idea to scale in less than six months, and in the process establish an innovative media value proposition for Millennials — and an alternative to the Huffington Post.

Company founder Amanda Gutterman will be one the speakers at AIIM16; you might want to check our her session.

Here are 8 articles I’ve written for SlantNews.  Take a look; they’re a bit more personal than my usual content management pontifications.

4 Reasons Someone Named Mancini Celebrates St. Patrick's Day

Why Harper Lee’s Legacy Is All About Context

5 Major Developments Affecting Your Personal Privacy

How I Learned To Stop Worrying And Love Snowmaggedon

These Three Easy Tips Will Help You Live A Paper-Free Life In 2016

Americans Must Choose Compassion Over Cynicism

Don't Fall For The Lies About Islam After Terror Attacks

How Artificial Intelligence Can Help You Sort Your Holiday Photos

BTW, I've got a new e-book - free - check it out - Digital Transformation in Action.

Digital Transformation in Action

What? You haven't made your plans for AIIM16?  Do it today!

Register Today

Read More

Topics: information chaos, infochaos, disruption, aiim16

26 Things You Need to Know About Information Management

Mar 21, 2016 8:00:00 AM by John Mancini

A short recap of some highlights from 2015:

5 most popular pages on the AIIM web site...

Not including the home page, by number of views...

5 most popular Digital Landfill blog posts...

5 most popular Content downloads...

These are our most popular market research reports and e-books...

My 5 most popular Tweets...

6 key numbers about AIIM...

Download a PDF version of this infographic.

 Check out our new e-book! -- FREE and HERE.

Digital Transformation in Action

But what next?  You need to be at AIIM16, that's what.  It's where the Tribe gathers.

Register Today

Read More

Topics: information governance, erm, content management, ecm, records management, aiim16

5 Must Know Data Points About Content Analytics

Mar 17, 2016 4:34:49 PM by John Mancini

5 Things You Need to Know About Content Analytics

5 Data Points You Need to Know About Content Analytics

Source: AIIM -- Content Analytics: automating processes and extracting knowledge

  1. 53% of organizations agree that auto-classification using content analytics is the only way to get content chaos under control.
  2. 54% feel that their organization is exposed to considerable risk due to stored content that is not correctly identified.
  3. 73% consider that there is real business insight to be gained if they can get the analytics right.
  4. 63% are being held back by a lack of analytic skills and an absence of allocated responsibilities.
  5. 17% consider content analytics to be “essential” now for their organization, growing to 59% in 5 years’ time. 

A previous post on Content Analytics you may have missed is HERE.  And don't forget our white paper (free):

Download new Content Analytics report! FREE!

And this previous post, too:

5 Obstacles to Content Analytics Adoption


Content analytics is one of the core themes of AIIM16. Be there.  You won't regret it. Hotel block is going fast and closes next Friday, so make sure you get in before they are gone.

Register Today

Read More

Topics: content analytics, content management, ecm, aiim16

Confused about Content Analytics?  5 New Implementation Tips

Mar 17, 2016 3:20:22 PM by John Mancini

Confused about Content Analytics? 5 Tips.

Tip #1 - Address data structure, tagging and permissions as close as possible to the point of creation.

Organizations often take the easy option when it comes to content tagging and permissions, figuring that they will get to it “sometime.” However, it really helps to address these issues as soon as you possibly can.

Thornton May: “CSIS (the Canadian NSA) has categories and rules to label data as it comes in -- every paragraph is labeled separately. Labelling data on the way in makes information management more difficult to initially implement, but ultimately easier to consume and manage.”

Russ Stalters, CEO, Clear Path Solutions Inc.: “You need a defined information and data on-ramp so that you have deliberate and controlled data ingestion process.This is critical to ensuring the quality of the underlying data used for content analytics.”

Theo Priestly believes that organizations need to adopt a “Blockchain” approach to security.  Per Wikipedia, Blockchain is a “permissionless distributed database based on the bitcoin protocol that maintains a continuously growing list of transactional data records hardened against tampering and revision, even by operators of the data store's nodes. The initial and most widely known application of the blockchain technology is the public ledger of transactions for bitcoin which has been the inspiration for similar implementations often known as altchains.”

Priestley believes that a Blockchain approach has these advantages:

  • Storage Cost - An autonomous decentralised storage system would reduce the cost of storage
  • Security - Client-side encryption will always beat server-side
  • Speed - The scale of a true decentralized P2P network would be vastly superior to a centralised server

Tip #2 - Define a clear set of corporate objectives for content analytics initiatives.

Deciding what you want to achieve before embarking on ANY project is basic business, yet it doesn’t always follow that that will happen. Two of our ELC participants had strong advice on defining corporate objectives for your content analytics objectives.

Jane Alexander, CIO, Cleveland Museum of Art:

  • Ensure your backend systems are flexible and interoperable
  • Your key data for artwork must be clean, current, and represent one version of the truth
  • No one-off projects
  • Think of everything in terms of the BIG PICTURE
  • Content reuse - repurpose content created for other purposes

Pamela Click, Divisional CIO - CSEB Technology, TIAA-CREF:

  • Customer Perspective: Identify the “why” vs. the “what”
  • Employee Perspective: Improve productivity; increase job satisfaction
  • Generate and retain customers
  • Generate revenue
  • Brand recognition
  • Not just metrics - - behaviors

Tip #3 - Remember that the hardest part of a content analytics project is not the technology.

Sourcing the right technology to achieve your goals is actually one of the easier elements to content analytics. What you must really never forgot is the people element.

Jane Alexander, CIO, Cleveland Museum of Art: “The hardest part of linking silos was the people aspect. The pace was slow, reluctance was hard to deal with and unrealistic expectations that things should not/could not move that fast.”

Jeremy Phillips, COO, EditorEye: “Content nirvana takes different forms depending on your role in the organization, and content analytics is key to delivering this value. Power users seek to share the flow of content, help colleagues out most efficiently, and control costs. The average end user, though, prefers to view content analytics as magic, mysteriously delivering the right stuff to them when they need it without needing to do anything. 90% of the users in any group fit in this latter category.”

Tip #4 - Done right, content analytics should drive you to rethink the questions you ask about your organization.

The insight that content analytics can generate will not only provide you with the answers to the questions you ask of your organization, but it will also help make the questions even more pertinent, making the next set of answers even more insightful.

Steve Lohr, New York Times: “Defining problems more expansively is part of the design-thinking ethos. At a course in New York recently, a group of IBM managers were given pads and felt-tip pens and told to sketch designs for ‘the thing that holds flowers on a table’ in two minutes. The results, predictably, were vases of different sizes and shapes. Next, they were given two minutes to design ‘a better way for people to enjoy flowers in their home.’ In Round 2, the ideas included wall placements, a rotating flower pot run by solar power and a software app for displaying images of flowers on a home TV screen.”

Tip #5 - Position your content analytics initiatives as a means to both enhance customer value AND address information security -- and get the buy-in of business stakeholders EARLY.

Content analytics is not necessarily a silver bullet for all an organization’s key challenges, but it does have value beyond enhanced customer value. The ELC meeting focused a lot on the value and insight to be derived, but content analytics also has a significant role to play when addressing information security.

Mark Roboff, Executive Evangelist,  IBM Watson: “My view is that it is a mistake to position content analytics as an ECM tool. Analytics needs to be understood in the context of a business problem and with a clear understanding of how and why they want/need analytics. Content analytics should not be part of an ECM sale alone, it requires analytics expertise and should be part of a larger analytics implementation.”

Dennis Devlin, Co-Founder and CISO, SAVANTURE: “I am a recovering information risk management professional. Information risk used to be a lonely profession. But now I have new friends -- in Business Intelligence, Compliance and Audit, Privacy, Boards of Directors, Corporate Communications, Investor Relations, Office of General Counsel, Information Management, Physical Security. Collectively we are losing the security battle. There are more security breaches than ever before, more unknowns than knowns, growing digital landfills that no one seems to be responsible for, and I am still being asked to ‘protect our digital assets.’”



A previous post on Content Analytics you may have missed is HERE.  And don't forget our white paper (free):

Download new Content Analytics report! FREE!


Content analytics is one of the core themes of AIIM16. Be there.  You won't regret it. Hotel block is going fast and closes next Friday, so make sure you get in before they are gone.

Register Today


Read More

Topics: content analytics, content management, ecm, aiim16

5 Obstacles to Content Analytics Adoption

Mar 15, 2016 4:31:44 PM by John Mancini

What are the primary obstacles to Content Analytics Adoption?

  1. Definitions of what content analytics actually is are poorly understood and inconsistent.
  2. There is still too much focus on technology and not enough on business value; who truly are the buyers, influencers and key stakeholders and how are they different from those of yesteryear?
  3. The pace of technology change is accelerating and running ahead of the ability of organizations to consume it.
  4. We lack specific use cases.
  5. There is a splintering of data -- and data responsibility -- in the enterprise.

Read More

Topics: content analytics, content management, ecm, aiim16

Civility in the Marketplace

Mar 5, 2016 2:13:33 PM by John Mancini

Like many of you, I’ve been wondering what on earth has happened to the way we talk to and about each other.

Watching the political fray, especially over the past few weeks, I can’t help but think back to my days at AEA running their policy programs in the late 80s and early 90s. Granted, at the time technology was the golden boy of the lobbying circuit.

But even with that, there was a certain respect that existed between people of opposing views, and a willingness to work together with people of widely varying viewpoints. The final outcome wasn’t always pretty (it hardly ever was) and it wasn’t ever the chosen one for each and every participant in the process, but was the optimal outcome for the group.   There were certain things you did and didn’t do during the process. And there was a sense that while progress was slow, there was progress being made.

Of course, all of that was in the pre-social media days and before the advent of the 24-hour news cycle and before what seems to be a compulsive need to up the ante with each successive round of outrage. And a growing impatience that unless things change this very minute, and in exactly in the way that I want, it is my right to do anything and say anything to make my grievances known.

I’ve been thinking about all of that over the course of the past few days as our little extended community of information professionals has occassionally struggled with the bounds of normal discourse. Most comments have been heart-felt and constructive.  And some have been fueled by a desire to be a bit more outrageous than the last.  And I will admit relative to the latter to contemplating some really good zingers.

But Friday I went to an awards lunch of association types. The speaker – and awardee – was the President of the National Association of Manufacturers, Jay Timmons. His speech is HERE.  It's worth reading. His personal story would have been impossible as recently as 20 years ago.  

Jay's comments reminded me that I am proud to have spent a career in this weird life as an association executive. I am proud of not only AIIM, but also proud of our fellow associations in this space, whose people I know work just as hard as mine do.  

His story reminded me that there are changes afoot in the world. Things simply do not stay the same, much as we wish they would. Professions. Industries. Companies. And Associations. While that is often uncomfortable, it isn't necessarily bad. In the long view, I believe that history has a forward-leaning trajectory.  

But Jay's comments also reminded me that we each bear a responsibility – a personal responsibility – for the civility of our public conduct. 

So I thought of a heck of a zinger for some of the tension in our little community over the past few weeks. Here it is.



Note:  In case it's not obvious, the above is NOT an AIIM statement.  It is a personal one.

I've published a new e-book on Digital Transformation -- it's FREE and HERE.

Digital Transformation in Action

Read More

Topics: aiim

Content Analytics -- What does it mean to YOUR organization? 5 Key Obstacles

Mar 2, 2016 2:18:34 PM by John Mancini

Deriving meaning and insight from the different forms of content held and managed within most organizations is fast becoming one of the number one challenges and priorities for many in business. AIIM’s June 2015 Industry Watch Content Analytics: automating processes and extracting knowledge, revealed that six in ten enterprises believe that content analytics will be essential within five years’ time:

The capacity of computers to recognize meaning in text, sound or images has progressed slowly and steadily over many years, but with the constant arrival of faster computing resources, and the continual refinement of software algorithms, we are in a position where both the speed and the accuracy of recognition can support a wide range of applications.

In particular, when we add analysis to recognition, we can match up content with rules and policies, detect unusual behavior, spot patterns and trends, and infer emotions and sentiments. Content analytics is a key part of ‘big data’ business intelligence, but it is also driving auto-classification, content remediation and Information Governance, security correction, adaptive case management, and operations monitoring.

That smart content analytics can be of huge value to an organization is clear. But it is equally clear that there are a number of obstacles to content analytics adoption that need to be overcome. At the most recent meeting of AIIM’s think-tank, the Executive Leadership Council (ELC), the following obstacles were identified as particularly pertinent:

  • Definitions of what content analytics actually is are poorly understood and inconsistent.
  • There is still too much focus on technology and not enough on business value; who truly are the buyers, influencers and key stakeholders and how are they different from those of yesteryear?
  • The pace of technology change is accelerating and running ahead of the ability of organizations to consume it.
  • There is an on-going lack of specific use cases to really demonstrate value.
  • There is a splintering of data -- and data responsibility -- in the enterprise.

As with any emerging technology, there has been a wave of content analytics early adopters. The ELC agreed that it was imperative to learn strategic lessons from these early implementers, particularly focusing on:

  • Addressing data structure, tagging and permissions as close as possible to the point of creation.
  • Defining a clear set of corporate objectives for content analytics initiatives.
  • Always remember that the hardest part of a content analytics project is not the technology.
  • Done right, content analytics should drive you to rethink the questions you ask about your organization.
  • Position your content analytics initiatives as a means to both enhance customer value AND address information security.

In conclusion, a lot is happening in the world of content analytics, and it is happening very quickly indeed. But organizations must embrace the changes and the pace at which they are happening, as content analytics takes its place at the heart of many organizations.

Per Vladimir Lenin: “There are decades in which nothing happens and there are weeks in which a decade happens.”  Per ELC Leader Thornton May: “The status quo is perpetually on trial. But that doesn’t mean you can stand by and wait. It wasn’t raining when Noah started building the ark.”

Check it out; free download.

Download new Content Analytics report! FREE!

Read More

Topics: content analytics, big data, elc

Apple and ISIS and the FBI, Oh My

Mar 2, 2016 1:51:00 PM by John Mancini

Well.  Who would have ever thought that people would EVER pay attention to privacy? I’ve been constantly amazed to see revelation after revelation over the past few years greeted with a bit of a collective shoulder shrug, and then on with business as usual.  

I guess now with Apple’s situation, the cat is out of the bag.  Before any of this broke, I did a post on privacy that might be of interest -- 5 Tensions that are creating the Privacy Enigma, and also did short Slideshare -- Does the Privacy of Your Personal Information Worry You?  

I’ve wondered for some time what it would take to get people to pay attention to this, and ultimately the equation turned out to be:

Apple + FBI + ISIS = front page and lead story visibility.

I was wondering what people in our community of information professionals thought about all of this, so I pinged my personal network to ask 42 information professional types what they thought.  Here are the results of my little flash survey:

Question 1:  Should Apple make changes in its operating system to allow the FBI to try to unlock the phone?  

26.2% said YES, 71.4% said NO, and 2.4% (probably the most honest!) said NOT SURE.

Question 2:  How much do you worry about the privacy and security of your personal information?  

42.9% worry A LOT, 33.3% A FAIR AMOUNT, 19.1% A BIT, and 4.8% NOT AT ALL.  So almost 80% of my little micro flash survey participants have significant concerns.

Question 3:  When it comes to concerns about privacy and security, do you worry more about governments or corporations gaining access to private information?  

28.6% DEFINITELY worry more about GOVERNMENT access, 50% ABOUT EQUAL, 16.7% DEFINITELY worry more about CORPORATE access, and 4.8%, Don't worry about EITHER.

Here's a bit broader sample from the always interesting Pew Research Center:

So with that as background, here are a few posts/articles worth reading to catch up on the controversy. Please feel free to post additional good links on both sides of this issue in the comments; the following is from a quick review.

Apple’s letter to customers:

The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, which has implications far beyond the legal case at hand.  This moment calls for public discussion, and we want our customers and people around the country to understand what is at stake.  [excerpt from full article]

Apple's statement to Congress on the FBI warrant fight from TheVerge:

The FBI has asked a Court to order us to give them something we don’t have. To create an operating system that does not exist — because it would be too dangerous. They are asking for a backdoor into the iPhone — specifically to build a software tool that can break the encryption system which protects personal information on every iPhone.

As we have told them — and as we have told the American public — building that software tool would not affect just one iPhone. It would weaken the security for all of them. In fact, just last week Director Comey agreed that the FBI would likely use this precedent in other cases involving other phones. District Attorney Vance has also said he would absolutely plan to use this on over 175 phones. We can all agree this is not about access to just one iPhone.  
[excerpt from full article]

And also from TheVerge -- Microsoft 'wholeheartedly' supports Apple in FBI encryption case:

Speaking at a congressional hearing today, Microsoft president and chief legal officer Brad Smith said that his company "wholeheartedly" supports Apple in the ongoing case that's pitted the iPhone maker against the FBI. "We at Microsoft support Apple and will be filing an amicus brief next week," Smith said. An amicus brief is a "friend of the court" filing that allows parties not directly involved in the case to weigh in. Before today, Microsoft had offered only tepid support for Apple's, but now it's getting behind the company in a big way. [excerpt from full article]

Apple, The FBI And iPhone Encryption: A Look At What's At Stake from NPR, @alinaselyukh and @camilareads:

Remember the cryptex, the little handheld safe from The Da Vinci Code where entering the correct combination will reveal the secret message and entering the wrong one will destroy it?  Now replace the little safe with an iPhone, and instead of a secret message, it's holding evidence in a terrorism case. The critical combination? It's a passcode — one the FBI doesn't know, and one that Apple is reluctant to help the agency figure out. [excerpt from full article]

Inside the FBI's encryption battle with Apple from The Guardian:

For months, the FBI searched for a compelling case that would force Apple to weaken iPhone security – and then the San Bernardino shooting happened.  Two weeks ago, the FBI called Apple’s headquarters in Cupertino, California, with a jarring message: the agency wanted Apple to help them hack an iPhone. Apple refused.

The request stepped up a level on 16 February when a federal magistrate ordered Apple to help the FBI unlock a single iPhone – the phone belonging to one of the killers in the December mass shooting in San Bernardino, California. Apple again refused.

But this carefully planned legal battle has been months in the making, US officials and tech executives told the Guardian, as the government and Apple try to settle whether national security can dictate how Silicon Valley writes computer code.

Both sides expect the ensuing legal battle to have far-reaching implications that will touch on encryption, law enforcement, digital privacy and a 227-year-old law from America’s post-colonial days.  [excerpt from full article]

Also from The Guardian -- FBI director admits Apple encryption case could set legal precedent:

The director of the FBI has conceded that future judges will look to his battle with Apple as a precedent for law enforcement access to locked or encrypted mobile devices, the first time the government has conceded that the implications of the case stretch beyond an investigation into the San Bernardino terrorist attacks.

The ultimate outcome of the Apple-FBI showdown is likely to “guide how other courts handle similar requests”, James Comey told a congressional intelligence panel on Thursday, a softening of his flat insistence on Sunday that the FBI was not attempting to “set a precedent”.  [excerpt from full article]

And this -- Congress tells FBI that forcing Apple to unlock iPhones is 'a fool's errand'

The FBI Is Dead Wrong: Apple’s Encryption Is Clearly in the Public Interest from Wired:

Apple’s new encryption has prompted a breathtaking and erroneous scare campaign led by Federal Bureau of Investigation director James Comey. In a speech at the Brookings Institute this week, Comey went so far as to claim that Apple’s new system risks creating an environment in which the United States is "no longer a country governed by the rule of law."

This is absurd. The only actions that have undermined the rule of law are the government’s deceptive and secret mass surveillance programs. In the absence of any changes in the law to better protect Americans’ privacy, technology companies are responding to the demands of their customers and improving many security and privacy policies.  [excerpt from full article]

Apple vs. FBI: A timeline of the iPhone encryption case from VentureBeat:

The Apple vs. FBI controversy going on right now is quite the techno-political drama. At the core of it is a topic that isn’t so simple — encryption — and it’s all unfolding very rapidly and from many corners of the Internet.

Some people have come up with a snarky shorthand for the case: FBiOS, a portmanteau of FBI and iOS that represents a version of the Apple operating system that would meet the needs of the FBI. Unfortunately, this encapsulation hides the complexity of the situation.

The outcome of the case may have staggering implications. It affects Apple, currently the most valuable company in the world, and it could change the way millions of people view their iPhones: trusted smartphone or potential government surveillance tool?  [excerpt from full article]

N.Y. judge backs Apple in encryption fight with government from Reuters:

The U.S. government cannot force Apple Inc (AAPL.O) to unlock an iPhone in a New York drug case, a federal judge in Brooklyn said on Monday, a ruling that bolsters the company's arguments in its landmark legal showdown with the Justice Department over encryption and privacy...His ruling echoed many of the arguments that Apple has made in the San Bernardino case, particularly his finding that a 1789 law called the All Writs Act cannot be used to force Apple to open the phone. Orenstein also found that Apple was largely exempt from complying with such requests by a 1994 law that updated wiretapping laws.  [excerpt from full article] 


Join us to discuss information security and privacy at AIIM16:

Register Today

AIIM CIPs at last year's event.

Read More

Topics: apple, privacy, encryption, information security

About AIIM

AIIM provides market research, expert advice, and skills development to an empowered community of leaders committed to information-driven innovation.

Subscribe to Email Updates

21 Tips to Put Digital Transformation in Action