Remove category workplace-privacy
Remove Document Remove Government Remove Presentation Remove Security
article thumbnail

Does Your Content Drive Organizational Value?

AIIM

We break these up into five key categories of actions or aspirations: Creating and Capturing Information. Automating Governance and Compliance. The first IIM category is all about your content – creating it, capturing it, and collaborating with it. Growing Privacy and Security Concerns.

article thumbnail

Creating Records at Home, Part I: Microsoft Teams

The Texas Record

For this article, I am just going to focus on the chatting and draft-document-editing capabilities of Teams. But first, allow me to present the Golden Rule of this blog post — this rule works in conjunction with all the tips listed below: Work with IT! Did your government want to facilitate communication?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catches of the month: Phishing scams for January 2020

IT Governance

In our first review of 2020, we look at a new twist on a PayPal scam, and discuss data breaches at an IVF treatment facility and in the Singapore government. Security researchers at ESET are warning people about a new scam targeting PayPal users. Green padlock = good and secure, right? Catches of the month for November 2019.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

Humans have used technology to transform their societies from prehistoric times up to the present. This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Finally, Part 3 will look to the future, will present next steps, and will discuss key takeaways. Introduction.