The AIIM Blog
Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.
Capture and Imaging | Information Security
We need to update the way we handle data and documents. Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.
Share
GDPR | Information Security | Privacy
Believe it or not, 2018 is less than 100 days away, and it is bringing with it a slew of new regulatory concerns. Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. We can be sure that issues like the Equifax breach and Yahoo’s recent disclosure of the scope of the 2013 breach will remain topics of discussion and litigation for some time to come.
Share
Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.
Information Security | Machine Learning | Privacy
Minimizing data breaches and privacy compliance are now top strategic and operational priorities for organizations given increasingly onerous data privacy regulatory requirements.
Share
Information Governance | Information Security
As Yogi would say, it’s like déjà vu all over again. 143 Million customers with compromised personal information. Let that number sink in for a moment. And in the irony of ironies, from the very company that many of us are directed to go to when our identities are compromised.
Share
Document Management | Electronic Records Management (ERM) | Enterprise Content Management (ECM) | Information Security
Too often, we look at documents as just pieces of paper or digital files that contain information. We often forget to consider the value of that document. Some documents are assigned value based on time to write (like a very large document) or potential fines if done wrong (like a regulatory or compliance document). But every document has some value.
Share
Information Security | Privacy
There is a considerable divergence of opinion about the relationship between privacy rights and security concerns. Opinion polls reflect such a divided sentiment. A 2016 survey by Pew Research Center found that while 56% of survey participants want more to be done to keep the country safe, 52% remain seriously concerned about the scope of surveillance programs that may intrude upon their privacy, notably monitoring of internet search habits, email messages, and social media interactions.
Share