Search

1 to 10 of 250
Sort by

Discussion Post
RE: Webinar AIIM True North Jan 21 - Repositioning Policy Rules as Solutions

Dear Members, This is a reminder to register for the AIIM True North webinar on January 21, 2021 at 1:30 PM ET. The presentation will discuss how well-writen policies can help improve compliance, rather than hinder it. Note that if you are a CIP, then you will earn 1.0 CEU for attending this...



Event
Webinar AIIM True North Jan 21 - Repositioning Policy Rules as Solutions

Happy New Year! Best wishes for a safe and healthy 2021. AIIM True North would like to invite you to a webinar on January 21, 2021 at 1:30 PM ET. The presentation will discuss how well-writen policies can help improve compliance, rather than hinder it. Note that if you are a CIP, then you...

 01-21-2021 | 13:30 - 14:30 ET


Blog Entry
China Further Expands Reach of Data Localization Law to Multinationals

Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016 with the release of the Cybersecurity Law (Law). Scheduled to come into effect June 1,...

Jennifer Chadband's profile image

Blog Entry
Identifying Personally Identifiable Information

Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this...

Megan Mohrmann's profile image

Blog Entry
Bringing the Cloud Down to Earth

As companies of all sizes begin to store data in the cloud, privacy issues have become big news. Apple co-founder Steve Wozniak commented on the cloud, saying that “the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.” [1] A major problem...

Megan Mohrmann's profile image

Blog Entry
Data Breach Living Wills: Information Theft Response and Recovery Plans

Why Prepare? The average total organizational cost of a data breach in the United States in 2015 was $6.8 million. [1] In 2016 alone, over 3,000 publicly disclosed data breaches have occurred so far, representing more than 2.2 billion compromised records. [2] In addition to the upfront...

Megan Mohrmann's profile image

Blog Entry
Taps ‘n’ Apps: Craft Beer Meets the Cloud

Anyone who’s been paying attention lately, or who has met me in person, knows that I’m fairly passionate about Information Management and Craft Beer. Depending on the day, my passion for one is slightly higher than my passion for the other. What does one have to do with the other? I’m glad you...


Blog Entry
Why Vendor Should Support AIIM's CIP Program

AIIM just relaunched the Certified Information Professional (CIP) Program. This program is a good thing for the ECM (Enterprise Content Management) ecosystem, but it needs support from ECM vendors and their partners. Why should vendors and partners care? I’ll give you three reasons and they...

Marko Sillanpaa's profile image