Yesterday I passed two parts of the ICRM exam.  The lead up to it caused me to delay links of the day.  Sorry for the delay.  Please read, enjoy, share and do your part to mature the InfoGov community.

Companies Still Struggle With Information Governance, Survey Finds

Despite years of talking about information governance and compliance, less than half of companies surveyed have a compliance culture  — and many companies apparently have no governance strategy at all.

The Need for Information Governance Has Never Been Greater

Corporations need information governance programs in order to minimize compliance risk and reduce costs associated with eDiscovery and litigation response. Corporations must establish consistent and logical frameworks for how employees handle data. They can do this through information governance policies and procedures that help guide organizations and their employees in handling electronically stored information.

Future Technology Be My Valentine

when it comes to information management solutions too often businesses accept a box, err, I mean a list of “appropriate” solutions providers from experts. Unfortunately, some of these lists are born from criteria often outdated and not indicative of what your organization is actually looking to achieve. Blindly following leaves companies to bend to the limitations of poorly selected solutions. I have witnessed amazing human work-arounds that serve solely to overcome such tragic shortcomings, I refer to these human heroes as our “ultimate integrators”. My advice, push to ensure your solutions can interoperate, play nice, and aid in empowering your entire business ecosystem. Your environment is unique and only you know the complete picture, while these lists can inform you, do not blindly accept them. Perform your due diligence and research to understand if a solution will grow with your business objectives and strategic roadmaps.

7 ways MDM threatens employee privacy

  1. SSL MITM exposes private communications
  2. Wide open access to users’ browsing histories
  3. Mobile apps give MDM access to personal info
  4. Location data revealed
  5. Poor User Experience
  6. Risk of personal data loss
  7. Restrict core device functionality

The Conflict between Data Science and Cybersecurity

Cybersecurity is in direct conflict with the basis tenants of data analysis, especially big data analysis, predictive analytics and data mining. Data analysis, especially big data, is about opening access to a lot of the data in an organization to find new some interesting ways to solve business problems. For example, giving a marketing team information that they typically don’t use so they can find new and interesting ways of positioning your products or do some predictive analytics for sales forecasting.

5 ECM Lessons from a Non Verbal Communication Expert

  1. Spoken or written words are only part of the story
  2. Classification starts by objectively defining basic elements
  3. Classification is ongoing
  4. Use multiple viewpoints to guard against bias
  5. Overconfidence in accuracy of results may be misplaced

Big Data: Why Should You Be Aware of It

  1. Customer Engagement
  2. Increase the Accuracy of your projections
  3. More Efficient PRoject Performance
  4. Understanding the impact on clients

Only 39% of hospital CIOs are working on a digital health strategy

The survey of 112 hospital CIOs found that 38% are making electronic health records integration their top spending priority, followed by accountable care (population health technology) and consumer, clinical and operational analytics at 21% and 16%, respectively. Other technology spending priorities for hospital CIOs include virtual/telehealth technology enhancements at 13%, revenue cycle systems and replacement at 7% and enterprise resource planning systems at 6%.