AIIM - The Global Community of Information Professionals

The Re-Permissioning Dilemma Under GDPR

Jun 26, 2018 11:00:00 AM by Andrew Pery

Now that the EU General Data Protection Regulation (GDPR) is in force organizations are ramping up their efforts to re-fresh data subject consent obtained prior to GDPR and under the EU Data Protection Directive 95/46/EC by virtue of which opt-out, or implied consent was permissible. 

Read More

Topics: information governance, electronic records management, privacy, information security, gdpr

Protecting Sensitive Company Data: How to Educate Employees

Jun 22, 2018 10:57:00 AM by Jennifer Keithson

The threat of a hack is greater than it ever has been before with technology now reaching all parts of the world and granting access to the internet uniformly. The effects of such hacks has been seen in the news lately as well as major corporations like Sony, Yahoo and Equifax experience the terrible consequences of cyber breaches.

Read More

Topics: security, information security, employee engagement

[Guest Post] Infosecurity: 3 Industry Trends to Follow

Jun 21, 2018 10:30:00 AM by Tanya Brooks

In light of recent events, we can all agree that information security has been criminally overlooked on some major fronts across most industries. Absolutely mind-boggling attacks on major corporations like Sony, Yahoo and Equifax have consecrated InfoSec in the most frightening way possible. It is entirely possible that InfoSec had been given the resources it needed in those conditional circumstances but, given the unmitigated damage and lack of response, it is beyond fair to say that InfoSec may not have been a high priority. The benefit, if any, of these attacks is that they cemented the need for InfoSec in all businesses of all sizes.

Read More

Topics: automation, security, information security, Artificial Intelligence

Lions and Tigers and Facebook – Oh My!

Mar 30, 2018 10:52:23 AM by Bob Larrivee




Yep, that is what I am hearing these days, reminiscent of the scene from the Wizard of Oz when they are entering the forest, knowing that there are animals and possible danger hiding in the shadows. Yet they choose to enter anyway.

Now we have Facebook, and news that information was collected and used by Cambridge Analytica. So how does this happen? Have you ever agreed to play a game, use and app, or participate in any other social media activity where you are asked to allow the app to access your Facebook information and contacts? Hmmm, could that be a way they collect some of your data? Do you share information, videos, and messages with friends who then share them with others who share them with others, and so on? Could that be a way your data is being collected? Is it possible that like the characters from Oz, we are all willing participants in allowing our data to be shared with others, and then surprised when it shows up somewhere outside of Kansas unexpected, or is potentially part of a major data breach that has suddenly been exposed?

Read More

Topics: security, information security, gdpr

Guest Post - Data Privacy and Open Data: Secondary Uses under GDPR

Mar 26, 2018 9:28:26 AM by Andrew Pery

This is the ninth post in a series on privacy by Andrew Pery. You might also be interested in:

Consider this – over ninety percent of world’s data, estimated to be a staggering sixteen zettabytes, was created in the past 5 to 6 years.  And, it is estimated that by 2025 the world’s digital data will grow to one hundred and sixty three zettabytes.  

Read More

Topics: information governance, electronic records management, privacy, information security, gdpr

Information Security and Compliance Through the Prism of Healthcare and Retail

Feb 21, 2018 9:30:00 AM by John F. Mancini

Organizations must focus strategically on how to manage digital content and understand that: 1) end-users are consuming technology differently; 2) consumer devices are being increasingly used as “on-ramps” to digital workflows; and 3) how you secure the scan and capture process becomes increasingly important.

Let’s explore how these concepts relate to two specific industries – healthcare and retail.

Read More

Topics: compliance, healthcare, scanning, information security, information capture, retail

3 Challenges Created by an Ad Hoc Approach to Information Capture

Jan 23, 2018 6:00:22 PM by John F. Mancini

bigstock--187654582

Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

Read More

Topics: information security, information capture, intelligent capture

Guest Post - Three Critical Steps for GDPR Compliance

Jan 17, 2018 11:04:00 AM by Andrew Pery

This is the eighth post in a series on privacy by Andrew Pery. You might also be interested in:

Read More

Topics: information governance, electronic records management, privacy, information security, gdpr

Guest Post -- GDPR Compliance starts with Data Discovery

Nov 16, 2017 9:00:00 AM by Andrew Pery

This is the seventh post in a series on privacy by Andrew Pery. You might also be interested in:

Read More

Topics: privacy, security, information security, gdpr

Guest Post -- New Global Data  and Privacy Regulations in 2018 and the GDPR

Nov 2, 2017 1:14:08 PM by Jude O'Neil

Your Best Defense Should Include Some New Approaches

Believe it or not, 2018 is less than 100 days away and it is bringing with it a slew of new regulatory concerns. Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. We can be sure that issues like the Equifax breach and Yahoo’s recent disclosure of the scope of the 2013 breach will remain topics of discussion and litigation for some time to come.

Read More

Topics: privacy, europe, security, information security, gdpr

About AIIM

AIIM provides market research, expert advice, and skills development to an empowered community of leaders committed to information-driven innovation.

Click to download 14 Steps to a Successful ECM Implementation

Subscribe to Email Updates

Recent Posts