Search

1 to 10 of 246
Sort by

Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...

Jennifer Chadband's profile image

Blog Entry
Identifying Personally Identifiable Information

Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this...

Megan Mohrmann's profile image

Blog Entry
Bringing the Cloud Down to Earth

As companies of all sizes begin to store data in the cloud, privacy issues have become big news. Apple co-founder Steve Wozniak commented on the cloud, saying that “the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.” [1] A major problem...

Megan Mohrmann's profile image

Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

Why Prepare? The average total organizational cost of a data breach in the United States in 2015 was $6.8 million. [1] In 2016 alone, over 3,000 publicly disclosed data breaches have occurred so far, representing more than 2.2 billion compromised records. [2] In addition to the upfront...

Megan Mohrmann's profile image

Blog Entry
Taps ‘n’ Apps: Craft Beer Meets the Cloud

Anyone who’s been paying attention lately, or who has met me in person, knows that I’m fairly passionate about Information Management and Craft Beer. Depending on the day, my passion for one is slightly higher than my passion for the other. What does one have to do with the other? I’m glad you...


Blog Entry
Why Vendor Should Support AIIM's CIP Program

AIIM just relaunched the Certified Information Professional (CIP) Program. This program is a good thing for the ECM (Enterprise Content Management) ecosystem, but it needs support from ECM vendors and their partners. Why should vendors and partners care? I’ll give you three reasons and they...

Marko Sillanpaa's profile image

Blog Entry
Two Continents, Two Conferences, One Conclusion

Over the last few weeks I attended the AIIM Conference (the theme was Digital Transformation in Action) in New Orleans, Louisiana, USA and the IRMS Conference (the theme was Information Superheroes) in Brighton, UK. It was my third time at AIIM, at which I did one of the roundtables, and it...



Blog Entry
Plan a Successful Information Management Solution Implementation

How do you plan a successful information management solutionimplementation? Well, there's a LOT to it! And there are many paths tofailure. In AIIM's Electronic Records Management and Enterprise Content Management master courses , we spend four whole days discussing these concepts. I highly...

Kevin Parker's profile image

Blog Entry
CIP Nouveau

Prompted by the twin posts (do some scrolling and read in chronological order) from Jesse “Mr. CIP” Wilkins and the near death of the CIP, I figured I’d lay out a few thoughts … and here’s my post from when I learned of the death of the CIP (a week before its revival). I was really...