Information Management Blog

The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Information Governance  |  Information Security  |  Intelligent Information Management (IIM)

Beyond Compliance: The Business Case for Information Management

When we talk about investing in information management (IM), compliance often takes center stage. AIIM’s 2024 State of the Intelligent Information Management Practice report confirms this, with compliance once again emerging as the top reason for IM investment. But while compliance is crucial, it's just the tip of the iceberg. Let's dive into the broader business outcomes that make a compelling case for investing in information management.

Read More

Blog Feature

Compliance  |  Information Governance  |  Information Security  |  Intelligent Information Management (IIM)

When Messages Vanish: The Record Management Challenge of Ephemeral Communications

Recent headlines have brought ephemeral messaging apps into focus for information management practitioners. With two separate incidents where U.S. Department of Defense leadership shared confidential information via disappearing message platforms, the conversation about these tools has never been more urgent. It's timely that AIIM has just published a new white paper "When Messages Self-Destruct: The Hidden Risks of Ephemeral Communication for Information Governance" by AIIM Fellow and Award of Merit recipient John Newton that explains ephemeral communications and their impact on information management and governance.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Information Governance  |  Information Security

Information Governance as an Information Warfare Countermeasure

The one constant that seems to be top of mind these days is the growing mis-information and dis-information efforts across the spectrum. For this week's topic, I wanted to tap into my early experience as a Canadian Army Officer and explore beyond the classic scope of information governance and offer some thoughts on how our community can be seen as a partner in mitigating the impact of information warfare in it's many forms. Let's explore the critical role of Information Governance (IG) in navigating the evolving digital landscape, where information warfare has become a significant threat. We will delve into the tactics employed in information warfare, the consequences of unchecked information flows, and the vital role of IG in safeguarding organizations and societies.

Read More

Blog Feature

Artificial Intelligence (AI)  |  Data Management  |  Information Governance  |  Information Security

AI Readiness Assessment: Preparing Your Organization's Unstructured Data for the Future

I recently had the pleasure of hosting a conversation with Rob Bogue, the core author of AIIM's new resource "Organizational Readiness for Generative AI: Leveraging Unstructured Data for Success." This assessment focuses on how to prepare unstructured data for AI implementation. In this blog post, I'll share key insights from our discussion and highlight the importance of this tool for information management professionals.

Read More

Blog Feature

Artificial Intelligence (AI)  |  Information Security

Data Privacy in the Age of AI

Data privacy and Artificial Intelligence (AI) are two of biggest issues in the information spaces today. However, despite the enormous amount of coverage they receive in the trade and general media, what is not yet well understood is how tightly intertwined they are, and how risky it can be to address them without a proper foundation. Here are a few points to ponder to help you avoid the most common risks.

Read More

Blog Feature

Information Security

Proactively Protecting Your Sensitive Information for Remote Workers

The unprecedented COVID-19 pandemic has, almost overnight, forced many organizations to modify their business practices and transition to a remote workforce. Of course, the first focus during this transition is deploying the connectivity and infrastructure necessary to support your remote workers. Don’t, however, lose sight of the fact that information scattered across a dispersed workforce can significantly raise the risk of a data breach or other security concerns.

Read More