The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Cloud  |  Compliance  |  Privacy

The Cloud and Pending European Data Protection Regulations

Data Protection laws and regulations across the EU govern the storage and processing of data that would allow an individual to be recognized. They are intended to address the risks around privacy and data loss and to provide a framework for good information governance. The development of public, private, government, and hybrid cloud computing services has created a challenge to on-premise data storage and processing, and thus created uncertainty regarding responsibilities of the respective organizations regarding data protection and data privacy. The European Union is soon to implement the General Data Protection Regulation (GDPR), which will bring all 27 countries under a single regime of rules, and penalties for breach. AIIM regards this as an opportunity for cloud providers to deliver EU-wide services under a single operations model. However, providers and users need to be aware of the current legislative challenges. The purpose of a new AIIM white paper -- Making sense of European Data Protection Regulations as they relate to the storage and management of content in the Cloud – is to inform end-users of the current and potential future legislative landscape in Europe regarding data protection and data privacy. This will enable end-user organizations to make risk-based decisions about cloud versus on-premise content storage. This will also allow them to evaluate providers of cloud services to ensure that they will stay compliant with applicable law.

Read More

Blog Feature

Compliance  |  Information Governance  |  Information Security

8 Things to Help Contain the Cost & Risk of Litigation

Get your (information) house in order. It's no secret that companies of all sizes in all industries are creating and storing more documents, in more formats than ever before, driven partly by regulatory and compliance pressures. Gaining control of your information is sound business practice. And knowing what you have (physical and digital) and where is it can be found is critical when litigation occurs.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Compliance  |  Information Security

8 Steps to Information Risk Compliance

Too many people are thinking of security instead of opportunity. They seem more afraid of life than death. (James F. Byrnes) Risk, just like death and taxes, is part of everyday life. The risk associated with business information and knowledge is sometimes dismissed as acceptable business overhead. However, the need to maintain and raise the value of business information is clear during economically challenging times. To this end, here is a crash course in improving information risk for your organization.

Read More

Blog Feature

Compliance  |  Information Governance

8 Things to Consider When Aligning with Today’s Growing Corporate, Legal and Regulatory Standards

Enterprises today are faced with explosive growth in the volume and complexity of information, as new forms of content and communication become a part of every organization. Adding to the challenge, the legal and regulatory environment for most enterprises has become more rigorous, imposing significant obligations on all types of content and information channels. Entities need to find methods to address these disparate needs if they are to effectively manage risk and derive the true value of information within their environments.

Read More

Blog Feature

Compliance  |  Privacy

8 Reasons Why Privacy Will Be an Increasingly Important Compliance Concern

Read More

Blog Feature

Business Process Management (BPM)  |  Compliance  |  Privacy

8 Benefits of a Digital Mail Process

Read More