AIIM - The Global Community of Information Professionals

Lions and Tigers and Facebook – Oh My!

Mar 30, 2018 10:52:23 AM by Bob Larrivee




Yep, that is what I am hearing these days, reminiscent of the scene from the Wizard of Oz when they are entering the forest, knowing that there are animals and possible danger hiding in the shadows. Yet they choose to enter anyway.

Now we have Facebook, and news that information was collected and used by Cambridge Analytica. So how does this happen? Have you ever agreed to play a game, use and app, or participate in any other social media activity where you are asked to allow the app to access your Facebook information and contacts? Hmmm, could that be a way they collect some of your data? Do you share information, videos, and messages with friends who then share them with others who share them with others, and so on? Could that be a way your data is being collected? Is it possible that like the characters from Oz, we are all willing participants in allowing our data to be shared with others, and then surprised when it shows up somewhere outside of Kansas unexpected, or is potentially part of a major data breach that has suddenly been exposed?

Read More

Topics: security, information security, gdpr

Guest Post - Data Privacy and Open Data: Secondary Uses under GDPR

Mar 26, 2018 9:28:26 AM by Andrew Pery

This is the ninth post in a series on privacy by Andrew Pery. You might also be interested in:

Consider this – over ninety percent of world’s data, estimated to be a staggering sixteen zettabytes, was created in the past 5 to 6 years.  And, it is estimated that by 2025 the world’s digital data will grow to one hundred and sixty three zettabytes.  

Read More

Topics: information governance, electronic records management, privacy, information security, gdpr

4 Special Requirements Social Media and Collaboration Create for GDPR Compliance

Jan 26, 2018 9:29:26 AM by John F. Mancini

A new set of European rules and standards related to privacy and data protection (the General Data Protection Regulation, or GDPR) has set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers. The regulation is designed to harmonize privacy across the EU, codify more rigorous privacy rights; strike a balance between privacy and security and create an explicit obligation for both data controllers and processors to demonstrate compliance with GDPR. The clock is ticking – the regulation goes into effect on May 25th, 2018, and the potential penalties for non-compliance are significant (organizations found to be in breach of GDPR may be fined up to 4% of annual revenues or 20 million Euro, whichever is the greater).

Read More

Topics: collaboration, social media, records management, gdpr

Guest Post - Three Critical Steps for GDPR Compliance

Jan 17, 2018 11:04:00 AM by Andrew Pery

This is the eighth post in a series on privacy by Andrew Pery. You might also be interested in:

Read More

Topics: information governance, electronic records management, privacy, information security, gdpr

Guest Post -- GDPR Compliance starts with Data Discovery

Nov 16, 2017 9:00:00 AM by Andrew Pery

This is the seventh post in a series on privacy by Andrew Pery. You might also be interested in:

Read More

Topics: privacy, security, information security, gdpr

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

Nov 2, 2017 1:14:08 PM by Jude O'Neil

Your Best Defense Should Include Some New Approaches

Believe it or not, 2018 is less than 100 days away and it is bringing with it a slew of new regulatory concerns. Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. We can be sure that issues like the Equifax breach and Yahoo’s recent disclosure of the scope of the 2013 breach will remain topics of discussion and litigation for some time to come.

Read More

Topics: privacy, europe, security, information security, gdpr

Guest Post - How important is digital document consistency?

Oct 30, 2017 10:00:00 AM by Wouter Koelewijn

A repository containing documents that were digitized inconsistently or inaccurately presents a new set of problems for an organization, problems that can hinder the productivity gains they had hoped to achieve.

Read More

Topics: privacy, business process, scanning, capture, security, Digital business, information security, information capture, gdpr

New eBook - Are You Ready for new European Data Protection Regulations?

Oct 25, 2017 8:06:00 AM by John Mancini

The New EU Data Protection Regulation is Just Around the Corner

Read More

Topics: privacy, europe, security, information security, gdpr

Guest Post - Mitigate Data Privacy and Security Risks with Machine Learning

Oct 2, 2017 4:40:18 PM by Andrew Pery

This is the sixth post in a series on privacy by Andrew Pery. You might also be interested in:

Read More

Topics: privacy, security, information security, gdpr

Guest Post - The Privacy and Security Dichotomy

Aug 10, 2017 10:25:00 AM by Andrew Pery

This is the fifth post in a series on privacy by Andrew Pery. You might also be interested in:

There is a considerable divergence of opinion about the relationship between privacy rights and security concerns.   Opinion polls reflect such a divided sentiment.   A 2016 survey by Pew Research Center found that while 56% of survey participants want more to be done to keep the country safe, 52% remain seriously concerned about the scope of surveillance programs that may intrude upon their privacy, notably monitoring of internet search habits, email messages and social media interactions.  

Read More

Topics: privacy, security, information security, gdpr

About AIIM

AIIM provides market research, expert advice, and skills development to an empowered community of leaders committed to information-driven innovation.

Click to download 14 Steps to a Successful ECM Implementation

Subscribe to Email Updates

Recent Posts