Information Management Blog

The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Artificial Intelligence (AI)  |  Intelligent Information Management (IIM)  |  Privacy

Balancing AI Innovation with Data Privacy: A Strategic Approach

Organizations today face a critical balancing act: leveraging the transformative power of AI while protecting individual privacy and maintaining regulatory compliance. This challenge touches the heart of information governance, and therefore, requires thoughtful consideration.

Read More

Blog Feature

Privacy

Digital Ethics: What's Your Plan?

We've all been there, adding in our personal information online to complete a form, make a purchase, or sign up for an offer, and before we click the submission button, we think, "Is this information safe? How might it be used?" We ask ourselves these questions more and more as we continue to grow and expand our online experiences using our personal information. But, whether we realize it or not, it's more than just a matter of safety. As you'll discover in this post, this exchange of information can also be a matter of ethics.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

AIIM Conference  |  Privacy

Protecting or Posturing: What's Acceptable in New Data Privacy Practices

Technology and apps that are helping to prevent illness, accidents, and crime also happen to collect a vast amount of personal data. Similarly, some of the video conferencing and collaboration platforms that we knowledge workers are all too familiar with are now using artificial intelligence to recognize participants and their behaviors. Are these new features a boost to efficiency and convenience or simply the latest attempt by providers to push the boundaries between convenience and intrusion?

Read More

Blog Feature

GDPR  |  Privacy

Four Steps to Support Compliant Data Transfers Without Privacy Shield

The recent Court of Justice of the European Union (CJEU) Schrems II ruling, which invalidated the longstanding U.S.-EU Privacy Shield framework, has created a wave of uncertainty for the legal industry. Ever since the U.S.-EU Safe Harbor framework was retired in 2015 as a result of Schrems I, lawyers have faced challenges in ensuring the legality of transferring data between the EU and U.S. in multi-national litigation and investigations. For the last five years, Privacy Shield has been central to alleviating that burden. Now, lawyers are left wondering what’s next and whether their current standard contractual clauses (SCCs) for data transfers will remain viable. And if not, what options are left?

Read More

Blog Feature

Collaboration  |  Information Governance  |  Privacy

Work Remotely Without Compromising Your Data

With the new year in full swing, there's a lot of conversation around what comes next and what 2020's impact will mean for 2021. IT teams, specifically, are working to understand how to get a grip on content sprawl in the era of remote work. A recent study commissioned by Egnyte surveyed 400 IT leaders to understand how COVID-19 has impacted businesses’ ability to maintain data security and governance with a distributed workforce.

Read More

Blog Feature

Privacy  |  eDiscovery

An Update on International and Cross-Border Discovery

There have been some interesting developments in the world of E-Discovery tied to many of the same privacy protection laws and regulations changing the game in records and information management. To get a better understanding of how these regulations are affecting cross-border Discovery, we connected with our friends at the Association of Certified E-Discovery Specialists (ACEDS). Please enjoy this guest post by Mike Quartararo, President of ACEDS. Parties in the US are allowed broad and liberal discovery of electronically stored information (ESI) relevant and proportional to the claims and defenses in a legal action. When a US-based litigant seeks ESI stored in other countries, however, it raises thorny legal and practical issues. ACEDS recently conducted a webinar on this topic entitled “Now What? Cross-Border and International Discovery Post-Schrems II” with Bryant Isbell from Baker & McKenzie and Eric Mandel from Driven.

Read More