We spend a lot of time in this industry talking about how to capture information and, through good records management practices, dispose of content when appropriate. But we don’t talk about how to use ECRM technologies to protect sensitive information. We should. The Wikileaks...
If you have the possibility to remove your own content, you might also be able to remove someone else’s content, for example using identify theft. But these cases should stay marginal, and it would be possible to prevent most of them with a simple review process
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use