The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

GDPR  |  Information Security  |  Privacy

Balancing Privacy Rights with Social Utility in the Age of the Internet of Things

Resistance is futile. A recent Gartner report estimates that by 2020 the number of connected devices such as sensors and wearables will reach 21 billion, up from 6.4 billion in 2016. Such an unprecedented level of connectedness is expected to transform virtually every facet of our lives, largely in beneficial ways.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Privacy by Design: The Intersection of Law and Technology

The case for more rigorous cybersecurity and the protection of personally identifiable information is compelling. Consider the following facts: The Identity Theft Resource Center found that data breaches have increased 40% from 2015 to 2016, reaching an all-time high of 1,093 in the US alone; and, The average cost per breach in 2016 is pegged at $4 million, up 29% from the year prior.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

Information Security  |  Sharepoint and Office 365

Sharing Success – SharePoint and Lessons in Risk Management

For the past many years, I’ve been focused on creating better, easier, and more reliable ways of gathering information. I learned early on that we had to give some incentives to people if we wanted them to cooperate without information gathering efforts. If we could improve a process that was still somewhat manual, for example, we could encourage people to put stuff in SharePoint. If we could move some of that content to SharePoint Online, making access easier and more dependable, we might further encourage people to use the platform. Still, the bulk of our energy was being spent on collecting, identifying, and processing the information on its way into permanent storage.

Read More

Blog Feature

Capture and Imaging  |  Information Security

Watch for These Vulnerabilities in Your Information Capture Solution

Organizations are receiving more information than ever from more sources than ever, and they're being asked to push that information faster than ever to more corners of the organization than ever. It's no surprise that crooks and fraudsters, whether they're inside your organization or outside their organization, are looking for ways to get at that information for nefarious purposes.

Read More

Blog Feature

Compliance  |  Information Security  |  Privacy

Privacy Back in the News Again

The disclosures this week from Yahoo, about government access to private emails, have fueled another round of discussions about the role of privacy and security in an internet/social age. One of the issues that I think is not fully understood about this issue – especially in the U.S. – is the fundamentally different perspectives about privacy that exist in Europe, and how those differences then manifest themselves into policy.

Read More

Blog Feature

Information Security

5 Tips for How to Work Safely beyond the Corporate Firewall

Today’s workforce is increasingly distributed, increasingly mobile, and increasingly expecting telework options. This equates to more people working beyond the corporate walls and beyond the corporate IT firewall. But how can organizations offer such flexibility without losing control of their information?

Read More