The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Capture and Imaging  |  Information Security

3 Challenges Created by an Ad Hoc Approach to Information Capture

We need to update the way we handle data and documents. Scanning and information capture lead a curious double life. On one hand, it seems like we’ve been doing scanning and capture forever, at least within larger companies. Scanning and capture are stable, mature technologies with a well-documented ROI. On the other hand, they are still somewhat new when it comes to adoption by many smaller and mid sized organizations.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

New Global Data and Privacy Regulations in 2018 and the GDPR

Believe it or not, 2018 is less than 100 days away, and it is bringing with it a slew of new regulatory concerns. Data privacy breaches have been in the news again and again this year, eliciting increased concern from regulators and legislative bodies. We can be sure that issues like the Equifax breach and Yahoo’s recent disclosure of the scope of the 2013 breach will remain topics of discussion and litigation for some time to come.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Information Security  |  Machine Learning  |  Privacy

Mitigate Data Privacy and Security Risks with Machine Learning

Minimizing data breaches and privacy compliance are now top strategic and operational priorities for organizations given increasingly onerous data privacy regulatory requirements.

Read More

Blog Feature

Information Governance  |  Information Security

Equifax and a Sense That I’ve Seen This Movie Before

As Yogi would say, it’s like déjà vu all over again. 143 Million customers with compromised personal information. Let that number sink in for a moment. And in the irony of ironies, from the very company that many of us are directed to go to when our identities are compromised.

Read More

Blog Feature

Document Management  |  Electronic Records Management (ERM)  |  Enterprise Content Management (ECM)  |  Information Security

Identifying High-Value Documents

Too often, we look at documents as just pieces of paper or digital files that contain information. We often forget to consider the value of that document. Some documents are assigned value based on time to write (like a very large document) or potential fines if done wrong (like a regulatory or compliance document). But every document has some value.

Read More

Blog Feature

Information Security  |  Privacy

The Privacy and Security Dichotomy

There is a considerable divergence of opinion about the relationship between privacy rights and security concerns. Opinion polls reflect such a divided sentiment. A 2016 survey by Pew Research Center found that while 56% of survey participants want more to be done to keep the country safe, 52% remain seriously concerned about the scope of surveillance programs that may intrude upon their privacy, notably monitoring of internet search habits, email messages, and social media interactions.

Read More