Information Management Blog

The AIIM Blog

Keep your finger on the pulse of Intelligent Information Management with industry news, trends, and best practices.

Blog Feature

Artificial Intelligence (AI)  |  Information Security  |  Privacy

Regulation of AI-Based Applications: The Inevitable New Frontier

According to the 2019 IDC study of spending on Artificial Intelligence (AI), it's estimated to reach $35.8 billion in 2019 and is expected to double by 2022 to $ 79.2 billion representing an annual growth rate of 38% for the period 2018-2022. The economic benefits and utility of AI technologies are clear and compelling. No doubt, applications of AI may address some of the most vexing social challenges such as health, the environment, economic empowerment, education, and infrastructure. At the same time, as AI technologies become more pervasive, they may be misused and, in the absence of increased transparency and proactive disclosures, create ethical and legal gaps. Increased regulation may be the only way to address such gaps.

Read More

Blog Feature

GDPR  |  Information Security  |  Privacy

Mitigating Third Party Risks Under GDPR

One of the most vexing problems for organizations is mitigating GDPR compliance risks when dealing with third parties, particularly the nature and extent of obligations between data controllers and processors. By virtue of the GDPR accountability principle, organizations are required to adhere to the six fundamental principles of safeguarding privacy rights that impact the collection, processing and disposition of personally identifiable information. These obligations extend beyond the walls of an organization to third parties that process personally identifiable information. Also, GDPR provides for a broad definition of processing and imposes stringent requirements on organizations that engage third parties to process personally identifiable information.

Read More

14 Steps to a Successful ECM Implementation

Making an ECM implementation successful requires planning and attention to detail. The best way to create the right solution is to identify organizational goals and priorities. Learn how to manage a successful implementation in our free guide.

Blog Feature

GDPR  |  Information Security  |  Privacy

The Tension between GDPR and Blockchain: Are they Polar Opposites or Can they Co-exist

A potentially problematic challenge for industry and legislators is the apparent tension between privacy rights and the rapid adoption of blockchain-based applications which are expected to reach $10.6 billion in revenue by 2023.

Read More

Blog Feature

Information Security  |  Paperless Office  |  Privacy

[Podcast] Up Against 70,000 Boxes of Paper - One Law Firm’s Paper-Free Journey

No, you read that title right – seventy THOUSAND boxes of paper in the highly restrictive environment of legal services. That’s what Susan Gleason, Manager of Records and Information Governance at Shipman & Goodwin and her team were up against.

Read More

Blog Feature

Information Security  |  Privacy

[Podcast] Who is AIIM? Meet the People that Make up the AIIM Community

Who is AIIM? Well, that's a challenging question considering AIIM is an organization... But, when we take a step back, it's easier to see that AIIM does have a persona. It's you, me, and the other 155,000 global information professionals worldwide that make up the AIIM Community. So to be able to answer a question like "Who is AIIM?", we had to go straight to the source!

Read More

Blog Feature

Electronic Records Management (ERM)  |  GDPR  |  Information Governance  |  Information Security  |  Privacy

Strengthening Privacy Rights with Privacy Enhancing Technologies

  More rigorous privacy regulations such as the EU GDPR and a number of US privacy initiatives such as the recently ratified California Consumer Privacy Act impose higher standards on data controllers and processors to safeguard privacy rights – including data subject consent management, accommodating data subject requests, data portability and more onerous data controller and processor accountability standards.

Read More