Search

1 to 10 of 253
Sort by

Discussion Post
Reminder - Webinar AIIM True North May 27 - Digital Ethics: A Case Study of Critical Elements to Improve Information Governance

Reminder that AIIM True North is presenting a webinar on May 27, 2021 at 12:00 PM ET. The presentation will be a case study of how digital ethics delivers business value and the key elements to develop a digital ethics framework. You can register here . This webinar is eligible for 1.0 CEU . ...


Event
Webinar AIIM True North May 27 - Digital Ethics: A Case Study of Critical Elements to Improve Inform

AIIM True North would like to invite you to a webinar on May 27, 2021 at 12:00 PM ET. The presentation will be a case study of how digital ethics delivers business value and the key elements to develop a digital ethics framework. This webinar is eligible for 1.0 CEU . Please use the CEU...

 05-27-2021 | 12:00 - 13:00 ET



Discussion Post
RE: Webinar AIIM True North Jan 21 - Repositioning Policy Rules as Solutions

Dear Members, This is a reminder to register for the AIIM True North webinar on January 21, 2021 at 1:30 PM ET. The presentation will discuss how well-writen policies can help improve compliance, rather than hinder it. Note that if you are a CIP, then you will earn 1.0 CEU for attending this...



Event
Webinar AIIM True North Jan 21 - Repositioning Policy Rules as Solutions

Happy New Year! Best wishes for a safe and healthy 2021. AIIM True North would like to invite you to a webinar on January 21, 2021 at 1:30 PM ET. The presentation will discuss how well-written policies can help improve compliance, rather than hinder it. Note that if you are a CIP, then you...

 01-21-2021 | 13:30 - 14:30 ET


Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...

Jennifer Chadband's profile image

Blog Entry
Identifying Personally Identifiable Information

Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this...

Megan Mohrmann's profile image

Blog Entry
Bringing the Cloud Down to Earth

As companies of all sizes begin to store data in the cloud, privacy issues have become big news. Apple co-founder Steve Wozniak commented on the cloud, saying that “the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.” [1] A major problem...

Megan Mohrmann's profile image