About Ripcord Powerful data has the ability to change your organization. At Ripcord, we use robotics, machine learning, generative AI, and cloud-based software to unleash the power of data trapped in your documents, whether they’re paper or digital, structured or unstructured, backfile or...
Taking the Paper Out of Work Paper-based work is a soul-crushing, profit-sapping drag on individual, team, and company productivity. Paper literally smothers innovation, creating a competitive disadvantage. The Square 9 AI-powered intelligent document processing platform takes the paper out...
iText Software iText is a global leader in innovative award-winning PDF software. It is used by millions of users-both open source and commercial- around the world to create digital documents for a variety of purposes. Contact 530 Harrison Ave Second Floor Boston, Massachusetts...
iTEXT_App.png
Reminder that AIIM True North is presenting a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of a data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...
AIIM True North would like to invite you to a webinar on March 25, 2021 at 12:00 PM ET. The presentation will be a case study of data breach and will explore the prospects and options of approaching a "breach-proof" state. This webinar is eligible for 1.0 CEU towards renewing your CIP...
03-25-2021 | 12:00 - 13:00 ET
Am 28.1.2019 ist wieder Data Protection Day (https://www.coe.int/en/web/data-protection/data-protection-day) ... nunmehr seit einigen Jahren zusammen mit dem Data Privacy Day. Nun gut, Data Protection ist eine wichtige Funktion auch für Data Privacy, obwohl Data Protection noch ganz andere...
25. Mai 2018 und die Welt dreht sich weiter. Heute tritt die DSGVO, die Datenschutz-Grundverordnung, international als GDPR, General Data Protection Rules, bekannt, in Kraft. Dabei gelten die Regeln im Prinzip schon seit zwei Jahren. Verfolgt man Presseberichte und Werbung hatte man zeitweilig...
Simply removing direct and indirect personal identifiers isn’t enough to achieve de-identification of a dataset. Data controllers must also analyze the context in which the data is presented, as well as the risk of re-identification. Not only that, but technical methods for performing de...
Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...