Protection and Privacy

Learn how to:

Protect information assets regardless of where they are
Guard against fraud and comply with regulations 
Reduce risk and cost by eliminating what you don’t need  
Attack your most obvious content problem -- email

1 - 10 Results out of 107

Clearing the Air – What You Really Need to Know About Content Services in the Cloud

After all the hype about moving content to the Cloud over the past few years, there are still many misconceptions about when and how to deploy content services in the cloud. In this webinar, we'll discuss everything you need to know about content services in the cloud.

How to Become a Certified Information Professional (CIP)

Over the past decade, there has been a “perfect storm” of change driven by consumerization, cloud, mobile, and the Internet of Things. It has changed how we think about enterprise information and IT - and changed how we think about the kinds of skills needed to adapt to these changes. The value-add for information technology in organizations is rapidly shifting from the technology to the stewardship, optimization, and application of the information assets themselves. To meet this need, AIIM built a certification and test based upon this body of knowledge, and created materials to help information professionals prepare for the examination. Learn how you can join the growing ranks of CIPs.

5 Lines of Business that Require Good Governance

eBook

In this eBook, we will highlight how good governance practices around retention management, defensible discovery, and security policies will help drive digital transformation. Specifically, how they make legal, finance, HR, marketing, and sales departments more productive while reducing corporate risk.

Information Security Made Easy – Best Practices to Enhance Your Processes and Practices

No matter where an organization is in the process of developing and implementing security controls in your various system and applications, there are always new techniques and innovations emerging to help you avoid any potential problems along the way. In this webinar, we’ll outline and illustrate some of these latest techniques and innovations. We’ll share best practices to reduce and eliminate holes in your data security by: ensuring controlled access to your data, no matter what the file type, to whomever is supposed to receive, access, or interact with that data at that point in time; and enabling secure collaboration at every appropriate point in the workflow; engaging the right annotations and redactions to continue the work in the process flow to its completion.

Robotic Process Automation – Your GDPR Hero

For our UK and European community.  Now with GDPR compliance in full force and effect, one of the major aspects of this is around finding, accessing, and rectifying data. As you may know, EU citizen can now ask you to review their own data that you have, ask you to “rectify and amend” that data, and even invoke their right to be forgotten. Join us for this FREE webinar and learn how Robotic Process Automation (RPA) can help you: find, access, and rectify the requested information rapidly and handily; ensure that you’re finding every instance of the citizen’s data regardless where that information resides (official repositories, in the cloud, local drives, etc.); make all the necessary amendments in all the places you need; and ensure you’re finding all the data in the first place, especially if your ingestion processes are not consistent.

Information Security and Compliance Through the Prism of Finance and Legal

Tip Sheet

Getting the basics of security and compliance right is critical, in this Tip Sheet we explore two specific functions within every company – finance and legal.

Onboarding – Transform How You Bring Aboard New Customers and Staff Efficiently

You get new customers/citizens reaching out to you every day. You hire new employees. You contract with new supply chain vendors or business partners. Now what? For each person who interacts with your business stream, you should have a process mapped out to make that time the best and most productive it can be, regardless what that interaction entails.  For any of these scenarios, you’ll need to integrate workflow, document management, records management, data privacy, data security, (possibly) case management, and more to expedite this new relationship with ease. In this webinar, AIIM’s chief analyst Bob Larrivee will share top tips and methods to consider and implement to ease and expedite your onboarding process.

From ECM to Intelligent Information Management – Optimizing Your Digital Transformation Journey

For our UK and European community.  What organizations are doing with content has outgrown the traditional definitions. We need a new “technology roadmap” for the information management capabilities that are critical to Digital Transformation and to meeting the challenge of radically redefining experiences with customers, employees, and partners. Join us as we explore our Intelligent Information Management roadmap and the role these capabilities play in your Digital Transformation journey.

Information Security and Compliance Through the Prism of Two Industries

Tip Sheet

In this tip sheet, we explore how information security and compliance relate to two specific industries - healthcare and retail.

How to Plan Your Intelligent Information Management Strategy in 2018

To help you, AIIM’s chief analyst, Bob Larrivee, has compiled the data from five community-wide surveys and identified the game-changing trends you need to know about. Join us as we outline these trends, the stats behind them, and offer strategies to approach these critical changes to the way you manage information in 2018, including: the rise in compliance and risk driving Information Management, the importance of inbound capture processes, the benefit of automated capture processes, and the role of capture with content analytics. As part of the discussion, you will get the chance to hear customer stories on how capture and content analytics helped them and their organizations succeed in enhancing their business operations and how it brought greater value to their organizations.

Back to Top Back to Top