The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Information Security  |  Privacy

Lions and Tigers and Facebook – Oh My!

Yep, that is what I hear these days, reminiscent of the scene from the Wizard of Oz when they are entering the forest, knowing that there are animals and possible danger hiding in the shadows. Yet they choose to enter anyway.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Data Privacy and Open Data: Secondary Uses under GDPR

Consider this – over ninety percent of the world’s data, estimated to be a staggering sixteen zettabytes, was created in the past 5 to 6 years. And, it is estimated that by 2025 the world’s digital data will grow to one hundred and sixty-three zettabytes.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Compliance  |  Healthcare  |  Information Security

Information Security and Compliance through the Prism of Healthcare and Retail

Organizations must focus strategically on how to manage digital content and understand that: 1) end-users are consuming technology differently; 2) consumer devices are being increasingly used as “on-ramps” to digital workflows; and 3) how you secure the scan and capture process becomes increasingly important.

Read More

Blog Feature

Capture and Imaging  |  Information Security

3 Challenges Created by an Ad Hoc Approach to Information Capture

We need to update the way we handle data and documents. Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

New Global Data and Privacy Regulations in 2018 and the GDPR

Believe it or not, 2018 is less than 100 days away, and it is bringing with it a slew of new regulatory concerns. Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. We can be sure that issues like the Equifax breach and Yahoo’s recent disclosure of the scope of the 2013 breach will remain topics of discussion and litigation for some time to come.

Read More

Blog Feature

Information Security  |  Machine Learning  |  Privacy

Mitigate Data Privacy and Security Risks with Machine Learning

Minimizing data breaches and privacy compliance are now top strategic and operational priorities for organizations given increasingly onerous data privacy regulatory requirements.

Read More