The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

GDPR  |  Information Security  |  Privacy

Where Are Organizations in Their GDPR Journey and How Much Did They Spend to Get There?

The GDPR’s May 25, 2018 deadline set in motion a mad compliance and security scramble not only for European companies, but also for any company doing business in Europe or with European customers.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

GDPR after the Deadline: The Emerging Challenges Tied to Information Privacy and Security

The GDPR’s May 25, 2018 deadline resulted in a mad compliance and security scramble, not only for European companies but also for any company doing business in Europe or with European customers.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

GDPR  |  Information Security  |  Privacy

GDPR Compliance Obligations: The Relationship between Data Controllers and Third-Party Processors

The EU General Data Protection Regulation is a game-changer, particularly enforcement of obligations to safeguard privacy rights. There are a number of areas where GDPR strengthens compliance obligations and imposes additional legal liabilities. For example, under GDPR data, subjects and/or regulators may now pursue direct remedies against data processors in the event of an infringement of obligations, whereas such remedies did not exist under the prior data privacy regulation.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

The Re-permissioning Dilemma under GDPR

Now that the EU General Data Protection Regulation (GDPR) is in force, organizations are ramping up their efforts to re-fresh data subject consent obtained prior to GDPR and under the EU Data Protection Directive 95/46/EC by virtue of which opt-out or implied consent was permissible.

Read More

Blog Feature

Information Security

Protecting Sensitive Company Data: How to Educate Employees

The threat of a hack is greater than it ever has been before with, technology now reaching all parts of the world and granting access to the internet uniformly. The effects of such hacks have been seen in the news lately as well as major corporations like Sony, Yahoo, and Equifax experience the terrible consequences of cyber breaches.

Read More

Blog Feature

Information Security

Infosecurity: Three Industry Trends to Follow

In light of recent events, we can all agree that information security has been criminally overlooked on some major fronts across most industries. Absolutely mind-boggling attacks on major corporations like Sony, Yahoo, and Equifax have consecrated InfoSec in the most frightening way possible. It is entirely possible that InfoSec had been given the resources it needed in those conditional circumstances but, given the unmitigated damage and lack of response, it is beyond fair to say that InfoSec may not have been a high priority. The benefit, if any, of these attacks is that they cemented the need for InfoSec in all businesses of all sizes.

Read More