Intelligent Information Management (IIM) is the evolution of Enterprise Content Management (ECM) which, traditionally, revolved around the document object with little to no attention to data.
ECM solutions also tended to use hierarchical folder like structures to store documents; the method was based on storing the document in the right place to easily find it later.
Utilizing advanced technologies, IIM made it possible to address data in the same fashion documents were addressed. A document object is no longer the centre of operations.
Furthermore, content and data are stored based on what they are, not where they should be stored. The new method is to use descriptive tags, just like the tags used to locate music on iPhones or Android devices, to locate desired information.
By using tags, information that traditionally might not have been readily visible using folder like structures, are now visible by tag association. As well, an object, content or data, can have multiple tags and even multiple instances of the same tag type, and thus can appear in different results lists.
IIM takes the power of information to a new level and when powered by Machine Learning and Artificial Intelligence, IIM becomes a decision-making aiding tool for end users as well as organization management.
Intelligent Automated Capture that can extract, verify and process information based on learnt operations.
Pre-built external connectors enable authorized access, search, retrieval and edit of information in external repositories.
Machine Learning engines capable of learning user interactions with the solution and automating some of the tasks learnt.
Artificial Intelligence engines with analysis, extraction, classification, automation and information suggestion.
Organizations today are asked to adhere to compliance regulations designed to safeguard information, processes and quality.
While some industries such as Pharmaceutical, Financial, Construction, are more regulated than others, safekeeping of personal information related to clients, contractors and employees is regulated across the board.
Audit trails, Version control, Process control and most importantly, Access control are key aspects of Compliance and must be tied to data and content that are structured according to the Compliance regulation to be met.
IIM features and modules can be deployed as control mechanisms capable of ensuring adhering to technical requirements and by using Intelligent Automation, can assist in identifying sensitive information as well as identifying missing or needed human input or engagement.
HIPAA
FINRA SEC Rule 17A-4
Sarbanes Oxley
ISO 9001:2015; 1800:2007; 27001
GDPR
FIPS 140-2