Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Best Practices for Creating and Implementing a Successful Records Retention Policy<br />
Information Overload<br />
Memory Is Cheap<br />Or isit?<br />
Pack Rats<br />Keepit;<br />Just in case!<br />
Infosystem<br />Ecology of Information<br />
Information Hierarchy<br />Knowledge<br />
Information Lifecycle<br />Protect<br />
Paper<br />Creation<br />Use<br />Archival<br />Destruction<br />Reception<br />Classification<br />Organisation<br />
E-Document<br />Creation<br />Use<br />Archival<br />Destruction<br />Reception<br />Classification<br />Organisation<br /...
Solutions<br />
Information Management Framework<br />Employee Guide<br />Information Security Policy<br />Project/Case Management Policy<...
IM Framework<br />Code of Conduct<br />ReasonableUse<br />Records Retention<br />Security<br />E-Communication<br />Web2.0...
Records Retention Policy<br />
Calendar<br />
Compliance<br />
Standards & Best Practices<br />
Questions?<br />Dominic Jaar<br />National Leader, Information Management and eDiscovery<br />djaar@kpmg.ca<br />514.212.9...
Upcoming SlideShare
Loading in …5
×

Best Practices for Creating and Implementing a Successful Records Retention Policy

1,217 views

Published on

Presentation offered at the Canadian Institute's Document Management and Retention

Published in: Business
  • Be the first to comment

Best Practices for Creating and Implementing a Successful Records Retention Policy

  1. 1. Best Practices for Creating and Implementing a Successful Records Retention Policy<br />
  2. 2. Information Overload<br />
  3. 3. Memory Is Cheap<br />Or isit?<br />
  4. 4. Pack Rats<br />Keepit;<br />Just in case!<br />
  5. 5. Infosystem<br />Ecology of Information<br />
  6. 6. Information Hierarchy<br />Knowledge<br />
  7. 7. Information Lifecycle<br />Protect<br />
  8. 8. Paper<br />Creation<br />Use<br />Archival<br />Destruction<br />Reception<br />Classification<br />Organisation<br />
  9. 9. E-Document<br />Creation<br />Use<br />Archival<br />Destruction<br />Reception<br />Classification<br />Organisation<br />Retention<br />
  10. 10. Solutions<br />
  11. 11. Information Management Framework<br />Employee Guide<br />Information Security Policy<br />Project/Case Management Policy<br />Document Management Policy<br />Reasonable Use Policy<br />Project/Case Management Procedure<br />DecommissionningProcedure<br />Hiring/DepartingEmployeeProcedure<br />Information Security MeasuresInventory<br />Information Security Audit Procedure<br />Hard/Software Inventory<br />Network Map<br />ArchivingProcedure<br />Destruction Procedure<br />Taxonomy<br />Mobile TelephonyProcedure<br />Transfer Procedure<br />Document Retention Policy<br />Classification Schema<br />SavingProcedure<br />Information Technology Management Policy<br />
  12. 12. IM Framework<br />Code of Conduct<br />ReasonableUse<br />Records Retention<br />Security<br />E-Communication<br />Web2.0<br />
  13. 13. Records Retention Policy<br />
  14. 14. Calendar<br />
  15. 15. Compliance<br />
  16. 16. Standards & Best Practices<br />
  17. 17. Questions?<br />Dominic Jaar<br />National Leader, Information Management and eDiscovery<br />djaar@kpmg.ca<br />514.212.9348<br />

×