email

Communication Without Litigation, an AIIM 2013 Preview by , for

Blog Entry

Okay, so your organization has incorporated retention rules against e-mails based on the content that each contains. You now retain them in a secure and well managed archive where you can retrie... read more

The Email Pyramid by , for

Blog Entry

One of the key issues in Records Management is how to manage email. Email is the dominant content type requested by FOIA and eDiscovery because it often contains the “smoking gun,” a... read more

Email Discovery by , for

Discussion

In the news today it is being reported that email and the discovery of email related to the Penn State Perjury Case could make the difference on how this case proceeds. It is reported that a ser... read more

Often Overlooked by , for

Blog Entry

With all the talk about how Microsoft will bundle Yammer with SharePoint and deploy it on 4.6 gazillion Surface ™ tablets and all 42 Windows phones, it seems we are near the end of the &ld... read more

Activity streams ARE the killer feature (but not app) by , for

Blog Entry

Things I love: Activity feeds Soccer Cat photos Things I hate: Being CCed on emails Getting emails Sending emails Clowns What is an... read more

The Audacity of Email by , for

Blog Entry

If you are serious about social business and reducing the technostress on your staff and customers, do yourself a favor and make a commitment to go on an email diet in 2012. Need a great rea... read more

Secure Email Portals by , for

ERM

Discussion

I am looking for any information about sending personal information securely. Examples  What is the responsibility of the sender Case studies that show the repercussion wh... read more

Avoid Being the IT Guy by , for

Blog Entry

Earlier this week, I added a comment to a SharePoint discussion on LinkedIn. The discussion began with the question “How do I send a file from a SharePoint 2010 Library to someone outside... read more

With more and more business-critical data arriving locked away in email attachments, businesses can’t afford not to automate the extraction process. by , for

Blog Entry

  If you’ve been in business more than a few years, you remember the “old days.” Back then, important documents – invoices and applications, for example &nda... read more

The Wake-up Call by , for

Blog Entry

Having spent most of my career working with structured data, I was initially happy to see that the ECM project plan presented at the AIIM ECM Master class, looked a lot like a systems developmen... read more