The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

PDF vs. TIFF vs. JPEG vs. PNG vs. MS Office - Which File Format for My Business Application?

There are literally thousands of file formats available – which can lead to lots of confusion when trying to select the best file format for your business applications. Different file formats work better to meet certain business requirements, and selecting the wrong format can cause issues for organizations, their customers, their legal team, etc. To help make this type of decision easier, we’ve outlined some very common file formats used in almost every organization. We’ll look at each of these in a bit more detail to help you compare them and ultimately choose the file format that will best fit your needs.

Read More

Blog Feature

AIIM Tribe

Is AIIM Membership Worth It? Pros and Cons

Even though I’ve been an AIIM staff for more than 9 years, I continue to pay for my professional membership out of my own pocket. So it’s pretty obvious that I see the value of an AIIM membership, but you’re here to figure out if it’s worth it for YOU. My goal with this article is to give you a transparent look at both the pros and cons of an AIIM membership. I outlined the general value of memberships in a previous post. In this post, you’ll learn some of the specific pros & cons associated with AIIM membership. Many of these would apply to other associations as well. As I noted in the previous post, I would definitely encourage you to consider whether your association offers these benefits.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

AIIM on Air  |  Information Security

[Podcast] Tips for Staying Cyber-Safe While Working from Home

Remote working comes with a number of benefits both for the employee and the employer. Employees enjoy a better work-life balance, the comfort of their home office, and can avoid the stress of a commute. Businesses can save money, improve employee retention, and more. But, new challenges also arise with the recent boom in remote working, including cybersecurity threats like ransomware, data hacking, viruses, and more. At the office, typically somebody else takes care of the cybersecurity measures. But, when employees are working remotely on their home wifi systems, it's a bit of a different story. On this episode of the AIIM on Air Podcast, we take a look at what you can do to keep your systems safe and your company and private information protected.

Read More

Blog Feature

Information Governance  |  Intelligent Information Management (IIM)

Intelligent Information Management (IIM) Policies and the Law - Part 3

In this series, we've been exploring the intersection of IIM policy and the law in order to help IIM practitioners and legal specialists work together more effectively by gaining a better understanding of the relationship between the two. So far, we've covered: Part 1 -  IIM Policies and The Principle of Hearsay Part 2 -  IIM Policies and "Ordinary Course of Business" Now, let's compare IIM policies to contracts.

Read More

Blog Feature

Information Governance  |  Intelligent Information Management (IIM)

Intelligent Information Management (IIM) Policies and the Law - Part 2

In this series, we've been exploring the intersection of IIM policy and the law. The idea here is to help IIM practitioners and legal specialists work together more effectively by gaining a better understanding of the relationship between the two. In my first post, where we explored the principle of hearsay, we left off asking about the relationship between IIM policies and the "ordinary course of business." So, let's take a look.

Read More

Blog Feature

Automation  |  Information Governance

Information Governance Pressure Points – 3 Common Areas of Failure

Back in the day, when work was centralized in locations and on devices “within” the enterprise, it was reasonable to assume that control could most effectively be maintained by managing security at the firewall. Information security was largely a function of “keeping the bad guys out.” Fast forward to today’s business environment, and it’s a much different story. We’re all doing some portion of our work remotely, using mobile and cloud technology to do it. Meanwhile, the bad guys have become even more advanced. This new business environment has led to governance failures at three key pressure points: Information “entry points” Information “end points” Policy administration Let’s explore what's causing the pressure at each of the three points.

Read More