The AIIM Blog
Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.
Capture and Imaging | Information Security
A typical document imaging system is creating four major vulnerabilities that substantially increase the potential for data theft and violations of information management regulations: Not encrypting the data while it's in motion. Unsecured log files. Poor visibility into operator activities. Poor security management. New technology can help mitigate the above risks. I'm not here to sell you a system, I'm here to sell you an approach to a system. I'm telling you that if you're sitting on years old document scanning system, you're probably at risk, and it's time for you to look for a system. Get out your legal pad. Get out your pen and get ready to write down the four things I'm about to tell you to look for in a new document scanning system.
Share
Certified Information Professional (CIP) | Intelligent Information Management (IIM)
In the mainstream, the focus is still on on-premise applications built on and for the PC. The core skills that are valued in the mainstream are focused on building and developing systems. At the edge, the focus shifts to the cloud, mobile technologies become the Lego building blocks of systems, and the skill sets that are valued within our IT staffs shift from building and developing to configuring and connecting.
Share
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
Capture and Imaging | Information Security
Despite all of the investments you're making at the macro level, despite all the efforts that your IT department is doing on your behalf, there's a gap in your information security systems, and it is in the unlikeliest of places - your document scanning and data capture systems. Your information on-ramp is leaving you vulnerable to the bad guys. A typical document imaging system is creating four major vulnerabilities that substantially increase the potential for data theft and violations of information management regulations.
Share
Capture and Imaging | Information Security
Think your scanned images are safe? Think again! As we begin 2016, the biggest threat to your business probably isn't the proverbial competitor down the street. It's someone who wants to take advantage of your corporate information. We know that a growing number of businesses and government entities have already become cyber war victims.
Share
AIIM Community | AIIM Conference
We introduced something new to The AIIM Conference in 2016, an element of social responsibility. As the VP of Events here at AIIM, it was incredibly important to me that we give something to a charity local to our host city of New Orleans that our attendees had created.
Share
Electronic Records Management (ERM) | eDiscovery
My role as the Director of Litigation Support and Records Management at the A&E Television Network is to get the word on records management out into the actual company so that everyone can start using those actual principles. At A&E, we have a tremendous amount of data that we are trying to go through. We are trying to reduce the scope of actual discovery and not expose ourselves to litigation risk.
Share