Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

1 - 10 Results out of 75

Developing a Successful Data Retention Policy

Data retention isn’t easy; legal and compliance concerns, competing schedules, and the complexity of multijurisdictional requirements often drive organizations to indiscriminately assign the longest retention policies to data – meaning, we keep everything…forever! Not the best plan. Since you can’t save everything for forever, where do you start the process? How do you find all the policies and regulations needed to factor into your policy plans? How do you decide and prioritize these (possibly) competing requirements? In this webinar, we’ll discuss data retention and how to develop policies that will work for you, even if you operate globally.

How to Increase Your Profits by Improving Your Data Accuracy

We know you’re always looking to improve the quality of service to your customers – and that means improving your data accuracy. Are your data extraction methods yielding the best results? Are you extracting the right information? Are you encountering too many exceptions? Requiring frequent manual keying to correct? In this webinar, we’ll help you understand how to perform your own accuracy audit to answer these questions and learn: how to increase your data accuracy; practical steps in improve your data extraction methods; ways to properly use and apply recognition technology to yield better results; and more about Parascript’s unique program to help you achieve these goals.

5 Hidden Security Vulnerabilities in Antiquated Capture Systems

AIIM Tip Sheet

So many of you are looking for ways to lock down the control of your information through permissions, access controls, hierarchal access roles, and rules-based access. But most organizations have antiquated document scanning and capture systems that are creating five key vulnerabilities. Find out how to plug these security holes in our new Tip Sheet.

5 Reasons Building Information Modeling is Important

AIIM Tip Sheet

Linkages between physical and virtual worlds is ultimately at the heart of the internet of things. Building Information Modeling (BIM) is an example. Per the UK's National Business Specification (NBS), owned by the Royal Institute of British Architects: "BIM describes the means by which everyone can understand a building through the use of a digital model which draws on a range of data assembled collaboratively, before during and after construction. Creating a digital Building Information Model enables those who interact with the building to optimize their actions, resulting in a greater whole life value for the asset."

What We Learned from the AIIM Community in 2016 and What we see in 2017

eBook

This eBook recaps the highlights and findings from our 2016 research, offers some conclusions we have drawn based on the responses collected from the AIIM community, and provides a look at what we see ahead for 2017.

Key Areas Where Information Management is Advancing and Changing – A Look Ahead

Join AIIM’s Chief Evangelist John Mancini for a forward-thinking strategy-building look at seven key areas where Information Management is advancing to Content Services, and a look at some changes 2017/2018 will bring to the market. Some of these points include: how content transparency, usability and mobility are coming together; why cloud and hybrid implementations are on the rise; and how compliance and risk are affecting the complexity of business operations. From this analysis we’ll outline steps on how to prepare for a “future-is-now” state. We’ll offer strategies and recommendations for an action-oriented forward-looking content strategy plan to bring success to your organization.

6 Things You Need to Know About Emerging Markets and Information Management

AIIM Tip Sheet

Digital disruption is creating enormous opportunities in emerging markets. User organizations need to understand how their offerings must be localized for these markets, and content management offerings must evolve to make this task easier. Find out how.

4 Tips to Prepare for the European General Data Protection Regulation

AIIM Tip Sheet

Until recently, the protection and security of information on identifiable individuals had taken a relatively low profile. Most countries, regions and states have data protection legislation but they vary considerably in the level of protection decreed. Exposure of personal information or data breaches were relatively rare, and state surveillance of such information was generally covert and not acknowledged by governments. All of this has changed quite dramatically in the last few years.

6 Tips on Asset Lifecycle Information Management

AIIM Tip Sheet

One of the core issues for manufacturing companies -- or for that matter, any physical asset intensive industry -- is managing the technical information associated with the vast array of physical equipment that is needed to make the business run. It is here that the physical world (which drives the Internet of Things) truly connects with the digital world (information and content assets). Manufacturers refer to this as asset change management and the information management solution set associated with it is called Asset Lifecycle Information Management.

Think Brexit Saves You from EU Data Regulations? Think Again! 6 Steps to Prepare for the Data Protection Revolution

For our UK and European community. Some organisations assume that Brexit means they can ignore the new EU General Data Protection Regulations (GDPR) requirements. The fact is the GDPR will apply to any company that collects or handles the personal data of EU citizens! In this webinar, we'll offer a detailed guide on ways to future-proof your business, including: carrying out an Information Audit; deciding what information to keep, and what to dispose of; updating your Information Governance framework to treat data as an asset; re-appraising information security and encryption; making the business case to start preparing NOW!
Back to Top Back to Top