Remove Analytics Remove ECM Remove Records Management Remove Security
article thumbnail

How to Build a Metadata Plan in Five Steps

AIIM

Gather Your Requirements: Metadata requirements gathering can be done during the business and technical assessment phase of an Enterprise Content Management (ECM) deployment. During this step, conduct interviews, surveys, or workshops to gain input from business, IT, and records management stakeholders.

Metadata 163
article thumbnail

More articles about information management than any sane person should write

AIIM

Digital Preservation – Is Your Current Approach to Managing Long-Term Digital Information Failing the Business? Information Privacy and Security: GDPR is Just the Tip of the Iceberg. Three Challenges to Consider When Moving Beyond ECM. From ECM to Intelligent Information Management. And the What?

ECM 90
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What is a SharePoint Architect?

JKevinParker

It's about Enterprise Information Architecture and Enterprise Content and Records Management. looking for just such a person, I can testify that a true SharePoint (or any other ECM system) Architect is a rare animal. Enterprise Metadata Management. Master Data Management. Document Management (DM).

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Some technology trends such as real-time data analytics are ongoing, while others are more recent, such as blockchain. Part 2 discussed the critical factors for a successful DT journey, because organizations need to do a “mind-shift” from traditional records and information management (RIM) practices to content services (CS).

article thumbnail

Everteam’s InfoGov Strategy Validated by an Increasing Number of Market Entrants

Everteam

New interest in this sector is a strong validation of our approach to meeting Information Governance and Enterprise Content Management challenges. A broad set ofactions available from within our Information Governance Suite to turn raw content into secured and managed information assets.

article thumbnail

QC-ing the QC

ARMA International

Detection success depends on the results of applying timely analytics on the gathered metrics. Ingested digital files: Password protection, encryption, integrity issues, format compliance issues, proprietary formats, security restrictions. Bound books: Gutter issues, brittleness, foldups, taped pieces. Used otherwise signals trouble.

article thumbnail

Introducing the Information Governance Maturity Model (IGIM)

ARMA International

As the model’s visualization shows, the information lifecycle is surrounded by elements relating to access and security as both need to be addressed as your information moves through its lifecycle. Are SLA’s (internal and third party) and contracts tracked, managed, and enforced? Is information security monitoring in place?