Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

31 - 40 Results out of 100

What We Learned from the AIIM Community in 2016 and What we see in 2017

eBook

This eBook recaps the highlights and findings from our 2016 research, offers some conclusions we have drawn based on the responses collected from the AIIM community, and provides a look at what we see ahead for 2017.

Key Areas Where Information Management is Advancing and Changing – A Look Ahead

Join AIIM’s Chief Evangelist John Mancini for a forward-thinking strategy-building look at seven key areas where Information Management is advancing to Content Services, and a look at some changes 2017/2018 will bring to the market. Some of these points include: how content transparency, usability and mobility are coming together; why cloud and hybrid implementations are on the rise; and how compliance and risk are affecting the complexity of business operations. From this analysis we’ll outline steps on how to prepare for a “future-is-now” state. We’ll offer strategies and recommendations for an action-oriented forward-looking content strategy plan to bring success to your organization.

6 Things You Need to Know About Emerging Markets and Information Management

Tip Sheet

Digital disruption is creating enormous opportunities in emerging markets. User organizations need to understand how their offerings must be localized for these markets, and content management offerings must evolve to make this task easier. Find out how.

4 Tips to Prepare for the European General Data Protection Regulation

Tip Sheet

Until recently, the protection and security of information on identifiable individuals had taken a relatively low profile. Most countries, regions and states have data protection legislation but they vary considerably in the level of protection decreed. Exposure of personal information or data breaches were relatively rare, and state surveillance of such information was generally covert and not acknowledged by governments. All of this has changed quite dramatically in the last few years.

6 Tips on Asset Lifecycle Information Management

Tip Sheet

One of the core issues for manufacturing companies -- or for that matter, any physical asset intensive industry -- is managing the technical information associated with the vast array of physical equipment that is needed to make the business run. It is here that the physical world (which drives the Internet of Things) truly connects with the digital world (information and content assets). Manufacturers refer to this as asset change management and the information management solution set associated with it is called Asset Lifecycle Information Management.

Think Brexit Saves You from EU Data Regulations? Think Again! 6 Steps to Prepare for the Data Protection Revolution

For our UK and European community. Some organisations assume that Brexit means they can ignore the new EU General Data Protection Regulations (GDPR) requirements. The fact is the GDPR will apply to any company that collects or handles the personal data of EU citizens! In this webinar, we'll offer a detailed guide on ways to future-proof your business, including: carrying out an Information Audit; deciding what information to keep, and what to dispose of; updating your Information Governance framework to treat data as an asset; re-appraising information security and encryption; making the business case to start preparing NOW!

Information Security: Staying Vigilant

Articles

In this article we learn how to promote vigilant security behaviour throughout the entire organization and employ proactive methods to safeguard critical information.

SharePoint: Determine Your Next Move

Join AIIM’s chief analyst Bob Larrivee and a panel of speakers, as they bring to life some of the key highlights and trends from our SharePoint research. Learn how organizations like yours are succeeding with SharePoint by: extending its collaboration and content management functionalities; enhancing its broad enterprise information management and governance capabilities; and preparing for their investment for the future.

Information Security: Checking the Locks

Articles

In this article we learn more about the security realities of modern organizations, how to identify the angles most susceptible to security breaches, and ways to address the difficulties in shoring up security vulnerabilities.

Information Professionals: Where we came from and where we're going

White Paper

In this paper you will learn what skills you'll need to stay relevant in this rapidly changing environment.
Back to Top Back to Top