Home

Welcome
  • Get Started
  • Regina Martin
  • AIIM_Call_for_Stories_HL_Banner_.png
  • Case_Study_Banner.png

AIIM Communities For You

SIGS__1_.png

Upcoming Community Events

Latest Discussions

  • Posted in: Office 365

    Lorne, Thanks for the reply. The mention of the need for an E5 or E3 with addons license ...

  • Posted in: Office 365

    Joseph, Yes, what MS is optimistically terming "records management" is new. Not the way I ...

  • Posted in: Records Managers

    Thanks for sharing this information Jesse!  I will be sharing it with interested parties here at my organization ...

  • Posted in: Office 365

    John, I've been meaning to ask you, is this something new that's been added? Where is the screenshot ...

  • Posted in: AIIM Open Forum

    Here is another one I love from AIIM18 in San Antonio! ------------------------------ Katherine ...

  • Posted in: AIIM Open Forum

    Hi Joseph, We're hosting a virtual block party next week June 11 4pm - here's the link to register. ...

  • Posted in: AIIM Open Forum

    Wendy, Since the lock down began, the AIIM Community has been an invaluable resource as I have sought ...

  • Posted in: AIIM Open Forum

    What is the AIIM Block party that Peggy Winton referred to in her recent post on the BLM thread? "To ...

Announcements

  • Join Us on June 11 - Summer Block Party

    Join the AIIM Team and your fellow members for a virtual block party on June 11, 4pm-5pm EST.

    We're hosting a fun hour of networking and getting to know your AIIMTribe.

    Head over to this event page for more details. More

The AIIM Blog

  • In this series, we've been exploring the intersection of IIM policy and the law. The idea here is to help IIM practitioners and legal specialists work together more effectively by gaining a better understanding of the relationship between the two. In my first post, where we explored the principle of hearsay
  • Back in the day, when work was centralized in locations and on devices “within” the enterprise, it was reasonable to assume that control could most effectively be maintained by managing security at the firewall. Information security was largely a function of “keeping the bad guys out.” Fast forward to today’s business environment, and it’s a much different story. We’re all doing some portion of our...

Recent Community Blogs