Document & Records Management

The Auditor General of Western Australia has called on state government entities to upgrade their information security practices, with a new report finding, in some cases, a complete absence of infosec policies.

The Australian Human Rights Commission was drowning in a sea of duplicates, tangled in nested folders and perplexed by lost documents. Funding shortfalls and other challenges saw the Commission unable to implement an EDRMS solution that was viable.

ABBYY has released a FlexiCapture Connector for the M-Files ECM platform that will more tightly integrate its intelligent data extraction and recognition capabilities. ABBYY has also become an M-Files Certified Application Partner (CAP).

Historically, the process of redaction - removing content from documents for national security, intellectual property, privacy or other reasons – has involved physical implements such as razors, grease-paint, magic-markers and photocopiers. Then came PDF.

Cloud content management company Box Inc. is revamping its workflow automation tool Box Relay, making it easier for companies to automate business processes.

DocuWare has released DocuWare 7.1, the latest version of its flagship document management and workflow software. Highlights include improved workflow capabilities, a new Workflow User License, and automatic processing by line item on invoices.

A few years ago, talk of using unstructured data sources in the enterprise was relatively rare, but that is rapidly changing. The reason, a thirst for data.

What is a document really and what is its future? A very useful construct and definition of a document is provided by Joe Shepley of Doculabs in a recent article he wrote for CMSWire called, “The End of the Document? Not So Fast.”

Many MySpace users were dismayed to discover earlier this year that the social media platform lost 50 million files uploaded between 2003 and 2015. The failure of MySpace to care for and preserve its users’ content should serve as a reminder that relying on free third-party services can be risky.

Malicious or criminal attacks accounted for the main source of data breaches during the first year of operation of Australia’s Notifiable Data Breaches Scheme, according to a 12‑month Insights Report released by the Office of the Australian Information Commissioner (OAIC).

Pages