Search Results For ''

111 - 120 Results out of 798

Understanding the key obstacles to your capture and workflow project – and how to overcome them

John Mancini

In a recent AIIM survey, we asked organizations a simple question:

“In the following processes, is the volume of paper increasing or decreasing?”

The answers might surprise you (get the free tip sheet for the details!):

AIIM On Air Podcast: Bob Larrivee on InfoGov, Seth Mirren on Digital Disruption, ECM report on IMM for Banks

Episode 40: Bob Larrivee discusses the new AIIM Industry Watch Report on Information Governance and Compliance. Author Seth Mirren discussed Digital Disruption on Wall Street. Kevin Craine gives an ECM Executive Report on Intelligent Capture for Banks.

Modern Records Management

Peggy Winton

In a digitally transforming business environment, neither Records Management nor Information Governance is at the top of your executives' list of priorities. Instead, business leaders are making time -- and making way -- for tools and techniques that execute processes nimbly and on demand for improved customer experience and competitive edge.

Records Managment Audit

Checklist

Are you preparing for a records audit? Do you want to assess the completeness of your records management program? Use this checklist to assess your records program.

Moving Beyond Good Intentions – How to Make Governance a Reality

Tip Sheet

It's no longer a valid excuse to just say information governance is just too darn difficult. We need to make information governance a reality in your organization. I've put together this FREE tip sheet to help you out. Download it and learn about 4 tips to get you on your way. Remember, Governance is not about perfection; it’s about managing and mitigating risk, and creating defensible processes.

Guest Post - The Privacy and Security Dichotomy

Andrew Pery

There is a considerable divergence of opinion about the relationship between privacy rights and security concerns.   Opinion polls reflect such a divided sentiment.   A 2016 survey by Pew Research Center found that while 56% of survey participants want more to be done to keep the country safe, 52% remain seriously concerned about the scope of surveillance programs that may intrude upon their privacy, notably monitoring of internet search habits, email messages and social media interactions.

Shelly Island and 10 new content management resources

John Mancini

I thought I would highlight some of new content assets that have crossed my desk -- some by me, some by others. They are all free. Pick the ones you want and knock yourself out! 

You can read them on the beach if you like, but I hope not. If you have already been on vacation and want to imagine you are

Getting Strategic – Lessons from 3 Decades of ECM Experience

Far from being “dead,” content management is evolving into something much bigger and more strategic for organizations. Join AIIM Chief Evangelist John Mancini as he hosts an interactive discussion with executives from two premier end user organizations as they explore lessons learned in over three decades of ECM at massive scale. They’ll share their insights about how to leverage this investment and extend it into the era of analytics. Don’t miss this exciting conversation, and take the opportunity to ask your own questions to our panelists.

CIP Spotlight: Hemaben Patel Is a Business Enabler

Jesse Wilkins

As part of our Certified Information Professional Spotlight series, I met with Hemaben Patel, Enterprise Content Management Lead for a large international airline. We talked about how she has positioned herself as a business enabler in her organization and how the CIP has made it easier for her to sell her projects to internal and external customers.

Governance and Compliance in 2017: A Real World View

Industry Watch

This study explores how organizations are addressing their governance and compliance challenges by looking at the business case for a governance and compliance framework for security, privacy, and protection, automating governance and compliance components (Metadata, Security, etc.), identifying the locations of greatest risk for breaches – internally and across the firewall, collection, retention, management, and defensible destruction of information and a look ahead at the next five years to understand where businesses are focusing their efforts and funding.
Back to Top Back to Top