Search

1 to 10 of 67
Sort by

Blog Entry
Identifying Personally Identifiable Information

Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this...

Megan Mohrmann's profile image

Blog Entry
Upcoming Changes in International Data Retention Legislation

For companies that operate in international jurisdictions, it is vital to stay up-to-date on legislative actions that affect data retention policies and compliance. This allows companies to make internal adjustments as necessary and to avoid costly sanctions and other harmful penalties for non...

Megan Mohrmann's profile image

Blog Entry
Immediately Stop Using Backup Tapes for Archiving

Nick Inglis has done three great posts on the future of magnetic storage and some breakthroughs in the technology. But let's stir things up a bit. Here are some pointers on how to break the tape habit for enterprise archiving. I'm very interested in what you think. This post...

Richard Medina's profile image

Blog Entry
Solving the Challenges of Records Retention in the Cloud

In a recent blog post, we looked at several important legal considerations when storing records in the cloud . These included the question of whether electronic formats would be legally accepted as records, and also the critical issue of retaining legal control over your records in a cloud...

Ross Nepean's profile image

Blog Entry
Setting the Stage for Automatic Disposition

“Setting the Stage for Automatic Disposition” is the topic for my educational session at the ARMA Conference in San Diego Oct. 26-28. Organizations invest significant human and financial resources in developing and updating record retention schedules. What I don’t see is a...

Susan Cisco's profile image

Blog Entry
GRC Business Considerations for SharePoint

There comes a time in every business where management thinks … I wish we would have thought about that before. Usually this happens just after a Discovery Request shows up on the doorstep. Not to worry. All is not lost. Sure, it would be great if some forethought and planning had...

Jeff Shuey's profile image

Blog Entry
All Needle, No Haystack: Bring Predictive Analysis to Information Governance

Missed AIIM 2014? Or did you just miss out on a session or three you wanted to see? In the coming weeks, we'll be sharing many of the presentations with you. Actionable advice and thought leadership brought to you by some of the smartest people in the information technology industry. Jason R....

Bryant Duhon's profile image

Blog Entry
Enterprise Content Governance 2014: A SharePoint Point of View

My goal in this blog entry is to share some of what I have observed in the last six months about SharePoint and the achievement of enterprise content governance in a multi-repository world. Microsoft Office drives Office 365 which drives SharePoint In the enterprise market, Microsoft Office ...

Mike Alsup's profile image

Blog Entry
#AIIM14 Day 3 Key TakeAways

As the old saying goes, all good things must come to an end. The AIIM team sure did save the best for last. And no, I’m not just saying that because I was a Day 3 presenter! I’d like to share with you key takeaways from the sessions I was able to attend - Day 3. Opening Keynote...

Jim Merrifield's profile image

Blog Entry
Simple but Effective Email Management

The good news if you are planning email management (EMM) for ensured retention and defensible disposition is that you don’t need to be perfect – you don’t have to perfectly satisfy your retention demands. You do need to use the Principle of Reasonableness and act In Good...

Richard Medina's profile image