The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Information Governance  |  Information Security

Equifax and a Sense That I’ve Seen This Movie Before

As Yogi would say, it’s like déjà vu all over again. 143 Million customers with compromised personal information. Let that number sink in for a moment. And in the irony of ironies, from the very company that many of us are directed to go to when our identities are compromised.

Read More

Blog Feature

Document Management  |  Electronic Records Management (ERM)  |  Enterprise Content Management (ECM)  |  Information Security

Identifying High-Value Documents

Too often, we look at documents as just pieces of paper or digital files that contain information. We often forget to consider the value of that document. Some documents are assigned value based on time to write (like a very large document) or potential fines if done wrong (like a regulatory or compliance document). But every document has some value.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Information Security  |  Privacy

The Privacy and Security Dichotomy

There is a considerable divergence of opinion about the relationship between privacy rights and security concerns. Opinion polls reflect such a divided sentiment. A 2016 survey by Pew Research Center found that while 56% of survey participants want more to be done to keep the country safe, 52% remain seriously concerned about the scope of surveillance programs that may intrude upon their privacy, notably monitoring of internet search habits, email messages, and social media interactions.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Balancing Privacy Rights with Social Utility in the Age of the Internet of Things

Resistance is futile. A recent Gartner report estimates that by 2020 the number of connected devices such as sensors and wearables will reach 21 billion, up from 6.4 billion in 2016. Such an unprecedented level of connectedness is expected to transform virtually every facet of our lives, largely in beneficial ways.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Privacy by Design: The Intersection of Law and Technology

The case for more rigorous cybersecurity and the protection of personally identifiable information is compelling. Consider the following facts: The Identity Theft Resource Center found that data breaches have increased 40% from 2015 to 2016, reaching an all-time high of 1,093 in the US alone; and, The average cost per breach in 2016 is pegged at $4 million, up 29% from the year prior.

Read More

Blog Feature

Information Security  |  Sharepoint and Office 365

Sharing Success – SharePoint and Lessons in Risk Management

For the past many years, I’ve been focused on creating better, easier, and more reliable ways of gathering information. I learned early on that we had to give some incentives to people if we wanted them to cooperate without information gathering efforts. If we could improve a process that was still somewhat manual, for example, we could encourage people to put stuff in SharePoint. If we could move some of that content to SharePoint Online, making access easier and more dependable, we might further encourage people to use the platform. Still, the bulk of our energy was being spent on collecting, identifying, and processing the information on its way into permanent storage.

Read More