Steps-to-efficient-information-governance

Five Key Classification Steps to Achieve Efficient Data Governance

Here we cover how to address the problems posed by a legacy system that has inadequate metadata in terms of both detail as well as coverage. Existing document types don’t have the metadata needed to support efficient governance and use, and new document types need to be created. Unless an organization is familiar with the […]

Read More

Beyond Metadata Buzz: Ensure Discovery, Distribution & Insight

The importance of metadata cannot be over emphasized as evidenced by John Horodyski’s most recent contribution to CMS Wire. Horodyski of Optimity Advisors makes a strong case for metadata as a critical first step with any project that involves managing content. Apparently, workers waste more than 40 percent of their time searching for existing assets. […]

Read More

Information Discovery: Beyond Traditional Classification Approaches

We are often asked about our classification capabilities, which complement our intelligent image and document capture. Since many solution providers in the document capture arena talk about providing “automatic document classification,” it’s worth exploring what this means. In most cases, it means the act of grouping documents or batch processing for the purposes of identifying […]

Read More

Silver Bullet: Broken Promise of Unstructured Search

I’m revealing my age here (or maybe just my nerdiness), but I remember a 70s movie called “Logan’s Run”. Its main premise was that, at the age of 30, you went to “Sanctuary” where you were supposed to move on to a great next life. Everyone’s happy. Spoiler alert: Logan seeks the truth and finds […]

Read More
graphic of a magnifying glass looking at a cloud icon

Information Governance Takes Center Stage

Information governance takes center stage in Jason R. Baron’s most recent article, and it’s worth the read. He examines recent research findings of The Information Governance Initiative, a relatively new, but very active, consortium focused on advancing the understanding and practices associated with information governance. We’ve all heard (and are probably tired) of big data, information […]

Read More

Capturing Dark Data and Handwritten Information as Part of Your Information Governance Process

In today’s vast digital world, organizations are scrambling to better control information to meet legal, regulatory, and business requirements. Adding to the challenge is an increasing number of information sources, including online, email, and print. From each of these comes growing volumes of records, receipts, forms, email, and desktop documents and more, further amplifying the amount of information that is out […]

Read More

The New Information Governance Paradigm

The term and notion of Information Governance is getting a lot of attention these days, and for good reason. Information is the lifeblood of businesses today and properly managing and governing its collection and use is a fundamental corporate imperative. As the volume and variety of enterprise information continues to grow, so does the need […]

Read More

Protect the Privacy and Security of Overlooked Information

In any organization there is overlooked information that is never noticed and no one ever thinks about. It includes, among other things, handwritten data that exists on forms, contracts, and a variety of everyday business documents. But this information can represent a treasure trove of opportunity for computer hackers who are paying attention, and are […]

Read More

Three Types of Dark Data that Get Missed

Organizations today are looking for ways to shed light on “Dark Data” – information that organizations have available to collect, process and store during regular business activities, but that gets overlooked, lost, or is left unused in the process. It includes, among other things, handwritten data that exists on forms, contracts, and a variety of […]

Read More

3 Reasons You Should Capture the Value of Handwritten Data

First developed over 30 years ago, capture systems are a popular way to capture and digitize information that would otherwise be locked on paper. Indeed, it is common to scan a physical page and automatically extract bits of printed information so that the newly created digital version can be more easily stored and found. This […]

Read More

Protecting Sensitive Information on Documents

Government agencies, healthcare departments, and other organizations have a need to identify and protect information located randomly on documents to comply with Federal and State laws. For example, the U.S. Health Insurance Portability and Accountability Act (HIPPA) requires that medical records, even when authorized by patients, protect patient health information. In the same way, the […]

Read More