1 to 10 of 14
Sort by

Blog Entry
Approaching Security and Privacy in Mobile-Empowered Businesses in Australia

Furthermore, Telsyte research found that 84% of organizations surveyed have set the stage for implementation of mobile policies by providing ICT and processes for mobile workers

Goran Bogunovic's profile image

Blog Entry
Privacy Concerns in the Cloud, an AIIM 2014 Presentation

Else is responsible for developing policy, training, and compliance on FOI, Privacy, and Information Management, which she accomplishes with the help of an incredibly dedicated team and a healthy dose of ridiculous idealism

Bryant Duhon's profile image

Blog Entry
25.5.2018 -- DSGVO-Tag & Towel Day

DSGVO & AIIM Community Platform Die AIIM international hat ihre Privacy Policy an die Anforderungen der europäischen GDPR angepasst...Hier gelten die AGB der AIIM

Blog Entry
Big Data Risk Management

Implement ongoing efforts to make your Big Data defensible, know what you have and enforce policies and regulations: Identify Personal Identifiable Information (PII), Intellectual Property and other personal and corporate assets in Big Data. Audit security & access policies. Prevent data leakage

Johannes Scholtes's profile image

Blog Entry
BYOD - Run What Ya Brung

In the interests of full disclosure; I use a corporately issued laptop, a self-provisioned smartphone (employer pays service), a self-provisioned tablet, and a personal laptop. My tablet, while being hugely convenient and making my life easier, is not necessary for me to live or work. This post...

Chris Walker's profile image