Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...
Information governance (IG) is all the rules, regulations, legislation, standards, and policies with which organizations need to comply when they create, share, and use information. Governance is mandated internally and externally. ( PHIGs IMC Inc – 2014 ) The above graphic,...
Yesterday (May 30, 2016) I read this article which contends that Box, Dropbox, and others are not content management platforms. I was considering not linking to the article and just putting up screen shots of the main points, but I decided on the link instead. The article is nothing but FUD ...
1 Comment - no search term matches found in comments.
Managing information correctly is crucial for any industry. The Energy & Engineering (E&E) sector is no different. With changing oil prices and increasing regulatory and environmental pressures, information management is a powerful tool to keep operations lean, achieve compliance and...
2 Comments - no search term matches found in comments.
This year the annual AIIM Conference was held in San Diego, California; way better than last year’s location which was really a few hotels sitting on reclaimed swamp land or something. And it was great to reconnect with people and meet some new folks and blah, blah, blah …. Overall I found...
When Gartner came out with their Magic Quadrant for Enterprise File Sync and Share (EFSS) back in July 2014 I laughed a little because I find the idea of an EFSS market, well, laughable. Yes, I know they put in a whole bunch of stuff about what could or should be part of the market, but boiled...
You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting stuff in the cloud is...
By Carla Mulley: I recently wrote a blog regarding the use of social tools and the challenges of adoption versus training. A tantalizing social study I recently ran across was conducted the Pew Research Center in conjunction with Rutgers University in New Jersey. According to this...
Depending on where you stand on information systems, the middle is: (a) where the action happens, or (b) where the flab accumulates. It's a rare manager who can tell them apart and an extraordinary one who understands how one scenario bleeds into the next. In ECM deployments the middle...
Understanding and Overcoming Records Management Challenges So many organizations throughout the globe have not implemented successful records management initiatives because of the inherit difficulty applying retention policies to content. Another main issue IT has faced is the difficulty...
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Fax: (301) 587-2711Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use