The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

GDPR  |  Information Security  |  Privacy

Mitigating Third Party Risks Under GDPR

One of the most vexing problems for organizations is mitigating GDPR compliance risks when dealing with third parties, particularly the nature and extent of obligations between data controllers and processors. By virtue of the GDPR accountability principle, organizations are required to adhere to the six fundamental principles of safeguarding privacy rights that impact the collection, processing and disposition of personally identifiable information. These obligations extend beyond the walls of an organization to third parties that process personally identifiable information. Also, GDPR provides for a broad definition of processing and imposes stringent requirements on organizations that engage third parties to process personally identifiable information.

Read More

Blog Feature

Information Security

Start 2019 on the Right Foot With These Tips

In today's digital world, the chance of information-related security breaches is high. Is your company's data security plan up to date and bullet proof?

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Information Security  |  Internet of Things (IoT)

Why Cybersecurity Will Save the Internet of Things

IoT, or the Internet of Things, is a grand ambition of the most influential kind. It is a unified goal that seeks to create an internet age of unity and equality that we may not ever see in any other industry. In this article, we will explain why cybersecurity will save IoT and let us progress well into the future with greatly reduced hazard.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Strengthening Privacy Rights with Privacy Enhancing Technologies

More rigorous privacy regulations such as the EU GDPR and a number of US privacy initiatives such as the recently ratified California Consumer Privacy Act impose higher standards on data controllers and processors to safeguard privacy rights – including data subject consent management, accommodating data subject requests, data portability and more onerous data controller and processor accountability standards.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

How Do IIM Technologies Fit into the GDPR Puzzle?

The GDPR’s May 25, 2018 deadline resulted in a mad compliance and security scramble not only for European companies but also for any company doing business in Europe or with European customers.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Where Are Organizations in Their GDPR Journey and How Much Did They Spend to Get There?

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers.

Read More