Your SlideShare is downloading. ×
0
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Best Practices for Creating and Implementing a Successful Records Retention Policy
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Best Practices for Creating and Implementing a Successful Records Retention Policy

691

Published on

Presentation offered at the Canadian Institute's Document Management and Retention

Presentation offered at the Canadian Institute's Document Management and Retention

Published in: Business
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
691
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • Volume of information
  • StorageMaintenance (upgrade, patches, backup, etc.)SupportMigrationSearch
  • Information Ecosystemstudy of the distribution, abundance and relations of data and their interactions with the environment
  • CoherentIntegratedImplementedCompliedwithAudited
  • Content: Purpose, Principles,Definitions (document vs record, transitory record, integrity, reliability, retention, etc.), Scope (exception/exclusions), Authority, Responsibility, Saving, archiving, security, destruction, Record vs transitory document vs OriginalOwnership + responsibilityCalendar – NextslideArchiving – Costs, maintenance, integrity, risks (not email only…)Destruction vs deletion – cf e-discoveryCompliance = Auditing + Sanction
  • LegislationInternationalNationalProvincialLocal
  • Transcript

    • 1. Best Practices for Creating and Implementing a Successful Records Retention Policy<br />
    • 2. Information Overload<br />
    • 3. Memory Is Cheap<br />Or isit?<br />
    • 4. Pack Rats<br />Keepit;<br />Just in case!<br />
    • 5. Infosystem<br />Ecology of Information<br />
    • 6. Information Hierarchy<br />Knowledge<br />
    • 7. Information Lifecycle<br />Protect<br />
    • 8. Paper<br />Creation<br />Use<br />Archival<br />Destruction<br />Reception<br />Classification<br />Organisation<br />
    • 9. E-Document<br />Creation<br />Use<br />Archival<br />Destruction<br />Reception<br />Classification<br />Organisation<br />Retention<br />
    • 10. Solutions<br />
    • 11. Information Management Framework<br />Employee Guide<br />Information Security Policy<br />Project/Case Management Policy<br />Document Management Policy<br />Reasonable Use Policy<br />Project/Case Management Procedure<br />DecommissionningProcedure<br />Hiring/DepartingEmployeeProcedure<br />Information Security MeasuresInventory<br />Information Security Audit Procedure<br />Hard/Software Inventory<br />Network Map<br />ArchivingProcedure<br />Destruction Procedure<br />Taxonomy<br />Mobile TelephonyProcedure<br />Transfer Procedure<br />Document Retention Policy<br />Classification Schema<br />SavingProcedure<br />Information Technology Management Policy<br />
    • 12. IM Framework<br />Code of Conduct<br />ReasonableUse<br />Records Retention<br />Security<br />E-Communication<br />Web2.0<br />
    • 13. Records Retention Policy<br />
    • 14. Calendar<br />
    • 15. Compliance<br />
    • 16. Standards &amp; Best Practices<br />
    • 17. Questions?<br />Dominic Jaar<br />National Leader, Information Management and eDiscovery<br />djaar@kpmg.ca<br />514.212.9348<br />

    ×