The AIIM Blog
Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.
Information Security | Internet of Things (IoT)
IoT, or the Internet of Things, is a grand ambition of the most influential kind. It is a unified goal that seeks to create an internet age of unity and equality that we may not ever see in any other industry. In this article, we will explain why cybersecurity will save IoT and let us progress well into the future with greatly reduced hazard.
Share
GDPR | Information Security | Privacy
More rigorous privacy regulations such as the EU GDPR and a number of US privacy initiatives such as the recently ratified California Consumer Privacy Act impose higher standards on data controllers and processors to safeguard privacy rights – including data subject consent management, accommodating data subject requests, data portability and more onerous data controller and processor accountability standards.
Share
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
GDPR | Information Security | Privacy
The GDPR’s May 25, 2018 deadline resulted in a mad compliance and security scramble not only for European companies but also for any company doing business in Europe or with European customers.
Share
GDPR | Information Security | Privacy
The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers.
Share
GDPR | Information Security | Privacy
The GDPR’s May 25, 2018 deadline resulted in a mad compliance and security scramble, not only for European companies but also for any company doing business in Europe or with European customers.
Share
GDPR | Information Security | Privacy
The EU General Data Protection Regulation is a game-changer, particularly enforcement of obligations to safeguard privacy rights. There are a number of areas where GDPR strengthens compliance obligations and imposes additional legal liabilities. For example, under GDPR data, subjects and/or regulators may now pursue direct remedies against data processors in the event of an infringement of obligations, whereas such remedies did not exist under the prior data privacy regulation.
Share
Before you leave, grab a copy of our
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.