This document discusses the challenges of managing high volumes of electronic records created by enterprise systems. It notes that electronic records are increasing rapidly as systems create hundreds of thousands to millions of records per batch. However, most organizations lack effective ways to classify, retain, and retrieve these transactional electronic records across different systems and business units. It outlines issues like records being out of sight and access, exploding data volumes, siloed storage systems, and outdated standards that make electronic records management difficult with traditional manual processes. The document argues organizations need solutions tailored to the scale and nature of transactional electronic records management.
The document discusses how records managers, IT, and legal experts must work together to address challenges around unstructured data growth. It notes that unstructured data such as documents and emails are growing 62% annually and will account for 93% of data by 2022. Effectively governing this data requires the three groups to collaborate on policies and processes. The document outlines how each group approaches data governance differently based on their roles, and argues they must understand each other better to create solutions that reduce risks and promote compliance.
Print Security? Are Businesses Complacent?Larry Levine
This document discusses the need for businesses to secure printing environments to protect sensitive data. It finds that many businesses are neglecting print security, with only 22% placing a high importance on it. However, 63% of businesses admit to experiencing a print-related data breach. The document advocates for secure printing solutions that require user authentication at multifunction printers to release print jobs. Such solutions can increase security, reduce waste, and provide print auditing capabilities. The document provides examples of businesses that have implemented secure printing successfully.
Deloitte the case for disruptive technology in the legal profession 2017 Ian Beckett
1. The document discusses how disruptive technologies like artificial intelligence, big data, blockchain, and cloud computing are transforming the legal profession. These technologies increase efficiency, reduce costs, and create new areas of practice.
2. However, many legal professionals have been slow to adopt these technologies. For example, only 38% of lawyers currently use cloud computing. Those who do not learn to harness new technologies risk becoming obsolete as the industry changes.
3. The technologies are reshaping the business model of law firms. Jobs like basic document review that can be automated will disappear, reducing the need for junior lawyers. The firms of the future will have leaner workforces and draw talent from new disciplines like technology.
The document discusses the future of online legal services and their potential impact on the legal profession. It notes that while the ABA has encouraged lawyers to utilize the internet to serve clients, the profession has been slow to adopt online legal services. New companies like LegalZoom now offer online legal documents and forms directly to consumers at lower costs than traditional lawyers. If rules do not change to allow innovative online legal services, solo and small law firms may have trouble competing with these new non-lawyer alternatives. The future of law practice lies in embracing technologies like online legal services that make legal help more accessible and affordable.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
How do we select and implement systems which meet both business and compliance requirements? Usable systems where the ease of capturing and describing records makes it possible to subsequently secure, store, preserve, retain or destroy them.
This article examines the factors influencing the design of recordkeeping systems and suggests means of assessing usability in eDRM systems to ensure that they are fit for purpose and appealing to end users.
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
How the world is changing -- Old paradigms are being stretched to the breaking point
How we usually think about governance -- It’s not just about what you keep
How should we respond? -- Building an action plan for the next 2-3 years
The document discusses how records managers, IT, and legal experts must work together to address challenges around unstructured data growth. It notes that unstructured data such as documents and emails are growing 62% annually and will account for 93% of data by 2022. Effectively governing this data requires the three groups to collaborate on policies and processes. The document outlines how each group approaches data governance differently based on their roles, and argues they must understand each other better to create solutions that reduce risks and promote compliance.
Print Security? Are Businesses Complacent?Larry Levine
This document discusses the need for businesses to secure printing environments to protect sensitive data. It finds that many businesses are neglecting print security, with only 22% placing a high importance on it. However, 63% of businesses admit to experiencing a print-related data breach. The document advocates for secure printing solutions that require user authentication at multifunction printers to release print jobs. Such solutions can increase security, reduce waste, and provide print auditing capabilities. The document provides examples of businesses that have implemented secure printing successfully.
Deloitte the case for disruptive technology in the legal profession 2017 Ian Beckett
1. The document discusses how disruptive technologies like artificial intelligence, big data, blockchain, and cloud computing are transforming the legal profession. These technologies increase efficiency, reduce costs, and create new areas of practice.
2. However, many legal professionals have been slow to adopt these technologies. For example, only 38% of lawyers currently use cloud computing. Those who do not learn to harness new technologies risk becoming obsolete as the industry changes.
3. The technologies are reshaping the business model of law firms. Jobs like basic document review that can be automated will disappear, reducing the need for junior lawyers. The firms of the future will have leaner workforces and draw talent from new disciplines like technology.
The document discusses the future of online legal services and their potential impact on the legal profession. It notes that while the ABA has encouraged lawyers to utilize the internet to serve clients, the profession has been slow to adopt online legal services. New companies like LegalZoom now offer online legal documents and forms directly to consumers at lower costs than traditional lawyers. If rules do not change to allow innovative online legal services, solo and small law firms may have trouble competing with these new non-lawyer alternatives. The future of law practice lies in embracing technologies like online legal services that make legal help more accessible and affordable.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
How do we select and implement systems which meet both business and compliance requirements? Usable systems where the ease of capturing and describing records makes it possible to subsequently secure, store, preserve, retain or destroy them.
This article examines the factors influencing the design of recordkeeping systems and suggests means of assessing usability in eDRM systems to ensure that they are fit for purpose and appealing to end users.
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
How the world is changing -- Old paradigms are being stretched to the breaking point
How we usually think about governance -- It’s not just about what you keep
How should we respond? -- Building an action plan for the next 2-3 years
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
This document discusses how contract management software can automate and streamline contract workflows, reducing operational costs by 75% annually. It outlines the typical paper-based contract process and how software can digitize and automate each step, from contract creation through distribution, signing, storage and retrieval. Key benefits include eliminating wasteful paperwork processes, speeding up approvals, and improving profitability and cash flow. The document also notes the environmental benefits of reducing paper usage and waste.
This document provides guidance on developing an IT asset retirement plan. It discusses how organizations accumulate large amounts of end-of-life digital assets that need to be retired securely and in an environmentally responsible manner. It outlines the risks of non-compliance with regulations regarding data privacy, environmental protection, and health and safety. It also provides best practices for choosing an IT asset disposition (ITAD) partner that is certified in secure data erasure, recycling, and proper disposal to ensure compliance and maximize returns from resale of usable assets.
Digitization offers businesses opportunities to improve efficiency and reduce costs by transitioning processes from paper-based to digital. While some businesses have made progress in digitizing, most still rely on paper for some processes. Fully digitizing customer communications and integrating paper and digital information could help businesses improve productivity, enhance customer service, and reduce expenses associated with paper usage and storage. However, going completely paper-free is not necessary or realistic for most established businesses, as paper still provides benefits in some contexts like customer communications. The goal of digitization should be to reduce paper where possible while leveraging its advantages elsewhere.
Organizations looking to benefit from the scalability, agility, and capital cost savings of cloud computing inevitably
encounter the issues of data privacy and security. In the corporate data center, data security and privacy are mostly
about protection from hackers and insiders. In the cloud, however—public, community, hybrid, and sometimes even
private-- they are also affected by where data resides and the impact of local, regional, and national regulations on
the privacy of that data--an issue known as data sovereignty.
BetterCloud Whitepaper: Offboarding Inefficiencies and Security ThreatsBetterCloud
With the increase of SaaS apps in the workplace, it can take hours to just offboard one employee. Its time to tackle this issue, and offboard fast, and securely.
This document provides an overview of information systems and management information systems. It defines key terms like data, information, and the components and functions of information systems. It explains that information systems collect, process, store, and disseminate data to support decision making while management information systems help businesses achieve their goals. The document also distinguishes between information systems and information technology and discusses how globalization and new technologies are changing businesses and enabling the digital firm.
Internal vs. external identity access managementTatiana Grisham
The document discusses the key differences between traditional internal identity access management (IAM) and customer identity access management (CIAM) when it comes to managing customer data and identities at scale. It covers three main areas: scalability and security, data collection and aggregation, and privacy and compliance. CIAM solutions must be able to securely store and manage millions of customer identities, collect and normalize data from various sources, and comply with numerous privacy regulations.
The Need for DLP now - A Clearswift White PaperBen Rothke
This white paper discusses the need for data loss prevention (DLP) solutions and provides guidance on implementing a DLP strategy. It notes that while companies secure physical assets like office supplies, data is often less protected. The paper outlines a multi-step approach to deploying DLP, including data discovery, classification, developing a DLP strategy involving multiple departments, addressing interim needs with secure gateways, and eventually selecting and testing DLP products. It emphasizes that DLP requires a long-term, systematic approach rather than being a quick fix, and should be integrated with other security and awareness practices.
This document discusses electronic discovery (eDiscovery) which refers to the discovery of electronically stored information in legal cases. It notes that eDiscovery costs are skyrocketing, averaging over $1.5 million per corporate lawsuit. The document outlines typical eDiscovery costs including collecting, processing, reviewing data which can cost thousands or millions depending on the size of the case. It emphasizes that proactive information management is key to addressing eDiscovery by developing policies to help employees manage information and only retain necessary records.
Quick Start Guide to IT Security for BusinessesCompTIA
IT security is constantly changing, which means it can be hard for businesses to keep up. This guide from CompTIA educates IT solution providers on the importance of providing clients with up-to-date IT security, identifies the risks of inadequate or poor security, and examines the technology shifts and factors affecting security in in the workplace.
- The document discusses how information has become a core business asset and competitive advantage in today's economy. As intellectual property and services have become more important than physical goods, effective information management is key.
- It argues that conglomerate companies need to actively share information between divisions to justify their existence, and must measure the value created in their "internal information economy".
- For information to be used strategically, organizations need to assign value to information and incentivize its sharing, just as in any economy. Information governance aims to understand the value information provides and reward its appropriate use.
The document discusses security solutions for electronic business (e-business). It outlines several key security concerns for e-businesses, including protecting access and data integrity, using encryption, implementing digital certificates, and employing digital signatures. It then describes various security solutions to address these concerns, such as using antivirus software, firewalls, intrusion detection systems, public/private key encryption, and digital certificates verified by certificate authorities. Overall, the document emphasizes the importance of data security and authentication for e-businesses operating online.
This document discusses several legal issues related to technology. It identifies data security, privacy concerns with big data, and evolving contract and licensing issues with cloud computing as significant concerns. It also notes challenges around compliance with open source licenses, liability for mobile payments, risks of social media use, regulation of virtual currencies, and responsibility for remote automation and control technologies.
The document discusses how IT budgets in mid-sized companies may be too big due to inefficiencies and a lack of defined processes. It cites statistics showing that 60 cents of every IT dollar goes to infrastructure costs, 70% of support calls are due to incorrect procedures, and projects fail 30-40% of the time. Adopting a "least practices" approach from frameworks like ITIL and focusing on the most important processes first could help mid-sized companies better control costs and improve efficiency without overhauling their entire IT operation. Implementing basic service management, quality control, and project management practices tailored to their needs could help mid-sized IT organizations eliminate waste and get the most value from their budgets.
Exploring Latent Semantic Vector Models Enriched With N-gramsLeif Gr
This document is a thesis exploring latent semantic vector models enriched with n-grams. It examines how including multi-word expressions directly in latent semantic vector models affects the performance of the models on synonym tests and document retrieval tasks. The thesis trained models with different parameters and evaluated the models using 560 Swedish synonym test queries and document retrieval experiments on Swedish and English texts. The results showed improved performance on synonym tests when multi-word expressions were included, but mixed or worse performance on document retrieval depending on the language. The thesis also developed two new evaluation resources and metrics that better handle incomplete relevance judgments.
This document summarizes the findings of a survey conducted by AIIM regarding organizations' information governance policies and systems. The key findings include:
- Electronic records are rapidly increasing in most organizations while paper records are stabilizing. No organizations reported decreasing electronic records.
- Most organizations are not confident about what information is safe to delete or that they only store necessary information due to the large volumes of electronic content.
- There is interest in automated classification and metadata assignment to help manage electronic records and information at scale. However, the accuracy of current automated systems is still a concern for many organizations.
Middlesbrough Futsal Club was formed in 2007 and has been a member of the FA National Futsal League since 2008. The club aims to compete regularly at the top of the league using homegrown players and eventually compete in European competitions. They have developed youth academies and partnerships with local universities and councils. The club plans to make the new Middlesbrough Sports Village its home and hopes to grow participation in futsal in the region financially supported by its academy programs and sponsors.
This document discusses outsourcing and freelancing. It defines outsourcing as companies hiring others to work for them. Freelancing is described as work done freely without official constraints. The document outlines various scopes for freelancing including administrative, accounting, marketing, technical and other jobs. It also discusses popular freelancing sites and how to sign up for them. Finally, it provides an overview of Encom Valley Limited, the courses and services they offer, and why students should choose them.
The document provides an overview of records management solutions. It discusses key issues in records management like high volumes of electronic records and regulatory challenges. It then summarizes ASG's records management solution called ASG-Records Manager which automatically classifies, retains, and disposes of records according to corporate guidelines. The solution supports management of records in various platforms and provides benefits like intuitive web-based user interface and pricing aligned with existing ASG technologies. Finally, it briefly compares ASG-Records Manager to solutions from competitors like EMC, IBM and Open Text.
The document discusses the OSI reference model, which defines seven layers of standards that allow networking devices to communicate with each other. The seven layers are the physical, data link, network, transport, session, presentation, and application layers. Each layer has a specific function, such as the physical layer defining physical interfaces and transmission rates, the data link layer handling MAC addressing and frame transmissions, and the application layer providing user interfaces and services. The OSI model was created to provide networking equipment manufacturers with design standards to ensure interoperability between devices.
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
This document discusses how contract management software can automate and streamline contract workflows, reducing operational costs by 75% annually. It outlines the typical paper-based contract process and how software can digitize and automate each step, from contract creation through distribution, signing, storage and retrieval. Key benefits include eliminating wasteful paperwork processes, speeding up approvals, and improving profitability and cash flow. The document also notes the environmental benefits of reducing paper usage and waste.
This document provides guidance on developing an IT asset retirement plan. It discusses how organizations accumulate large amounts of end-of-life digital assets that need to be retired securely and in an environmentally responsible manner. It outlines the risks of non-compliance with regulations regarding data privacy, environmental protection, and health and safety. It also provides best practices for choosing an IT asset disposition (ITAD) partner that is certified in secure data erasure, recycling, and proper disposal to ensure compliance and maximize returns from resale of usable assets.
Digitization offers businesses opportunities to improve efficiency and reduce costs by transitioning processes from paper-based to digital. While some businesses have made progress in digitizing, most still rely on paper for some processes. Fully digitizing customer communications and integrating paper and digital information could help businesses improve productivity, enhance customer service, and reduce expenses associated with paper usage and storage. However, going completely paper-free is not necessary or realistic for most established businesses, as paper still provides benefits in some contexts like customer communications. The goal of digitization should be to reduce paper where possible while leveraging its advantages elsewhere.
Organizations looking to benefit from the scalability, agility, and capital cost savings of cloud computing inevitably
encounter the issues of data privacy and security. In the corporate data center, data security and privacy are mostly
about protection from hackers and insiders. In the cloud, however—public, community, hybrid, and sometimes even
private-- they are also affected by where data resides and the impact of local, regional, and national regulations on
the privacy of that data--an issue known as data sovereignty.
BetterCloud Whitepaper: Offboarding Inefficiencies and Security ThreatsBetterCloud
With the increase of SaaS apps in the workplace, it can take hours to just offboard one employee. Its time to tackle this issue, and offboard fast, and securely.
This document provides an overview of information systems and management information systems. It defines key terms like data, information, and the components and functions of information systems. It explains that information systems collect, process, store, and disseminate data to support decision making while management information systems help businesses achieve their goals. The document also distinguishes between information systems and information technology and discusses how globalization and new technologies are changing businesses and enabling the digital firm.
Internal vs. external identity access managementTatiana Grisham
The document discusses the key differences between traditional internal identity access management (IAM) and customer identity access management (CIAM) when it comes to managing customer data and identities at scale. It covers three main areas: scalability and security, data collection and aggregation, and privacy and compliance. CIAM solutions must be able to securely store and manage millions of customer identities, collect and normalize data from various sources, and comply with numerous privacy regulations.
The Need for DLP now - A Clearswift White PaperBen Rothke
This white paper discusses the need for data loss prevention (DLP) solutions and provides guidance on implementing a DLP strategy. It notes that while companies secure physical assets like office supplies, data is often less protected. The paper outlines a multi-step approach to deploying DLP, including data discovery, classification, developing a DLP strategy involving multiple departments, addressing interim needs with secure gateways, and eventually selecting and testing DLP products. It emphasizes that DLP requires a long-term, systematic approach rather than being a quick fix, and should be integrated with other security and awareness practices.
This document discusses electronic discovery (eDiscovery) which refers to the discovery of electronically stored information in legal cases. It notes that eDiscovery costs are skyrocketing, averaging over $1.5 million per corporate lawsuit. The document outlines typical eDiscovery costs including collecting, processing, reviewing data which can cost thousands or millions depending on the size of the case. It emphasizes that proactive information management is key to addressing eDiscovery by developing policies to help employees manage information and only retain necessary records.
Quick Start Guide to IT Security for BusinessesCompTIA
IT security is constantly changing, which means it can be hard for businesses to keep up. This guide from CompTIA educates IT solution providers on the importance of providing clients with up-to-date IT security, identifies the risks of inadequate or poor security, and examines the technology shifts and factors affecting security in in the workplace.
- The document discusses how information has become a core business asset and competitive advantage in today's economy. As intellectual property and services have become more important than physical goods, effective information management is key.
- It argues that conglomerate companies need to actively share information between divisions to justify their existence, and must measure the value created in their "internal information economy".
- For information to be used strategically, organizations need to assign value to information and incentivize its sharing, just as in any economy. Information governance aims to understand the value information provides and reward its appropriate use.
The document discusses security solutions for electronic business (e-business). It outlines several key security concerns for e-businesses, including protecting access and data integrity, using encryption, implementing digital certificates, and employing digital signatures. It then describes various security solutions to address these concerns, such as using antivirus software, firewalls, intrusion detection systems, public/private key encryption, and digital certificates verified by certificate authorities. Overall, the document emphasizes the importance of data security and authentication for e-businesses operating online.
This document discusses several legal issues related to technology. It identifies data security, privacy concerns with big data, and evolving contract and licensing issues with cloud computing as significant concerns. It also notes challenges around compliance with open source licenses, liability for mobile payments, risks of social media use, regulation of virtual currencies, and responsibility for remote automation and control technologies.
The document discusses how IT budgets in mid-sized companies may be too big due to inefficiencies and a lack of defined processes. It cites statistics showing that 60 cents of every IT dollar goes to infrastructure costs, 70% of support calls are due to incorrect procedures, and projects fail 30-40% of the time. Adopting a "least practices" approach from frameworks like ITIL and focusing on the most important processes first could help mid-sized companies better control costs and improve efficiency without overhauling their entire IT operation. Implementing basic service management, quality control, and project management practices tailored to their needs could help mid-sized IT organizations eliminate waste and get the most value from their budgets.
Exploring Latent Semantic Vector Models Enriched With N-gramsLeif Gr
This document is a thesis exploring latent semantic vector models enriched with n-grams. It examines how including multi-word expressions directly in latent semantic vector models affects the performance of the models on synonym tests and document retrieval tasks. The thesis trained models with different parameters and evaluated the models using 560 Swedish synonym test queries and document retrieval experiments on Swedish and English texts. The results showed improved performance on synonym tests when multi-word expressions were included, but mixed or worse performance on document retrieval depending on the language. The thesis also developed two new evaluation resources and metrics that better handle incomplete relevance judgments.
This document summarizes the findings of a survey conducted by AIIM regarding organizations' information governance policies and systems. The key findings include:
- Electronic records are rapidly increasing in most organizations while paper records are stabilizing. No organizations reported decreasing electronic records.
- Most organizations are not confident about what information is safe to delete or that they only store necessary information due to the large volumes of electronic content.
- There is interest in automated classification and metadata assignment to help manage electronic records and information at scale. However, the accuracy of current automated systems is still a concern for many organizations.
Middlesbrough Futsal Club was formed in 2007 and has been a member of the FA National Futsal League since 2008. The club aims to compete regularly at the top of the league using homegrown players and eventually compete in European competitions. They have developed youth academies and partnerships with local universities and councils. The club plans to make the new Middlesbrough Sports Village its home and hopes to grow participation in futsal in the region financially supported by its academy programs and sponsors.
This document discusses outsourcing and freelancing. It defines outsourcing as companies hiring others to work for them. Freelancing is described as work done freely without official constraints. The document outlines various scopes for freelancing including administrative, accounting, marketing, technical and other jobs. It also discusses popular freelancing sites and how to sign up for them. Finally, it provides an overview of Encom Valley Limited, the courses and services they offer, and why students should choose them.
The document provides an overview of records management solutions. It discusses key issues in records management like high volumes of electronic records and regulatory challenges. It then summarizes ASG's records management solution called ASG-Records Manager which automatically classifies, retains, and disposes of records according to corporate guidelines. The solution supports management of records in various platforms and provides benefits like intuitive web-based user interface and pricing aligned with existing ASG technologies. Finally, it briefly compares ASG-Records Manager to solutions from competitors like EMC, IBM and Open Text.
The document discusses the OSI reference model, which defines seven layers of standards that allow networking devices to communicate with each other. The seven layers are the physical, data link, network, transport, session, presentation, and application layers. Each layer has a specific function, such as the physical layer defining physical interfaces and transmission rates, the data link layer handling MAC addressing and frame transmissions, and the application layer providing user interfaces and services. The OSI model was created to provide networking equipment manufacturers with design standards to ensure interoperability between devices.
A process in which a person through the use of signs (natural/universal), symbols (by human convention), verbal or non-verbal, conscious or unconscious but intentionally, conveys meaning to another in order to affect change.
Effective communication
It is the process of giving information to other people using signals such as speech, body language, symbols, radio signals.
You cannot effectively communicate unless the sender and the receiver perceive the message in the same way.
You cannot move up the career ladder if you are not an effective communicator
Cocosa is a luxury flash sale site owned by MYSALE Group PLC that offers up to 80% off brands like Loewe, Missoni, and Alexander McQueen. MYSALE Group PLC operates multiple flash sale sites in 9 countries, has over 20 million members worldwide, and sells one product every 4 seconds on average. Cocosa displays products with professional photography and operates buying offices in major cities to source inventory from brands and retailers.
The MYSALE Group PLC is a leading online flash sales and eRetail company with over 23 million registered members across 9 countries. It operates numerous flash sale and eRetail websites and has large warehouses and buying offices in several countries. The company works with thousands of brands worldwide to help dispose of excess inventory through flash sales on its websites. It has grown rapidly since its founding in 2007 through strategic acquisitions and international expansion.
The document discusses school safety and security. It begins by defining safety as protection from accidents and security as protection from intentional threats. It outlines the differences between safety and security and discusses the roles of various stakeholders - including school administrators, teachers, students, parents and emergency response agencies - in ensuring safety and security in schools. Effective implementation requires assessing risks, establishing tracking systems, communicating strategies, and involving all stakeholders.
The document discusses the definitions of safety and security, the differences between them, and the roles of staff, students, and parents in ensuring school safety and security. It also outlines requirements for effective implementation of safety and security in schools such as establishing emergency plans and drills, designating restricted areas, and controlling school access.
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Jone Smith
Records management has become more complex as the volume of documents and information has grown exponentially. Organizations face challenges in maintaining regulatory compliance due to gaps between requirements and capabilities. A records management solution is needed that can handle both paper and electronic records, integrate easily across systems, and scale to large volumes of information. Systemware provides a records management system that captures, indexes, stores, and manages records throughout their lifecycle to help organizations address these challenges.
This year’s DLM-Forum has the theme of “The Memory of the Information Society”. This “memory” is no longer information which can be recognised and understood straightaway with the naked eye, as was the case in the past, but rather non-transparent data, stored on a computer system. Technical tools are required to find it and make it readable once more. This is not a disadvantage, however, as modern information technology tools enable us to handle efficiently the exponentially growing mountains of data and documents. The use of electronic information systems further promotes the trend of producing an increasing quantity of information by digital means, which afterwards is only available in digital form.
The Trouble With Enterprise SoftwareF A L L 2 0 0 7 .docxssusera34210
The Trouble With
Enterprise Software
F A L L 2 0 0 7 V O L . 4 9 N O . 1
R E P R I N T N U M B E R 4 9 1 0 1
Cynthia Rettig
Please note that gray areas reflect artwork that has been
intentionally removed. The substantive content of the ar-
ticle appears as originally published.
C O N T R A R I A
Te ch n o l o g y h a s a l -
w a y s b e e n a b o u t
hope. Since the begin-
ning of the industrial
revolution, businesses
have embraced new
technologies enthusi-
a s t i c a l l y, a n d t h e i r
optimism has been
re w a rd e d w i t h i m -
p r o v e d p r o c e s s e s ,
lower costs and re-
duced workforces. As the pace of technological
innovation has intensified over the past two de-
cades, businesses have come to expect that the next
new thing will inevitably bring them larger market
opportunities and bigger profits. Software, a tech-
nology so invisible and obscure to most of us that it
appears to work like magic, especially lends itself to
this kind of open-ended hope.
Software promises evolutions, revolutions and
even transformations in how companies do busi-
ness. The triumphant vision many buy into is that
enterprise software in large organizations is fully
integrated and intelligently controls infinitely com-
plex business processes while remaining flexible
enough to adapt to changing business needs. This
vision of software lies at the core of what Thomas
Friedman in “The World Is Flat” calls “the Wal-
Mart Symphony in multiple movements — with
no finale. It just plays over and over 24/7/365.”1
Whole systems march in lock step, providing syn-
chronized, fully coordinated supply chains,
production lines and services, just like a world-
class orchestra. From online web orders through
fulfillment, delivery, billing and customer service
— the entire enterprise, organized end to end —
that has been the promise. The age of smart
machines would seem to be upon us.
Or is it? While a few companies like Wal-Mart
Stores Inc. have achieved something close to that
ideal, the way most large organizations actually
process information belies that glorious vision and
reveals a looking-glass world, where everything is
in fact the opposite of what one might expect.
Back-office systems — including both software ap-
plications and the data they process — are a
variegated patchwork of systems, containing 50 or
more databases and hundreds of separate software
programs installed over decades and intercon-
nected by idiosyncratic, Byzantine and poorly
documented customized processes. To manage this
growing complexity, IT departments have grown
substantially: As a percentage of total investment,
IT rose from 2.6% to 3.5% between 1970 and 1980.2
By 1990 IT consumed 9%, and by 1999 a whopping
22% of total investment went to IT. Growth in IT
spending has fallen off, but it is nonetheless sur-
prising to hear that today’s IT departments spe ...
The document discusses the growing issue of "digital landfill", which refers to the large amounts of digital files and documents that are stored haphazardly without proper organization or classification. It notes that the volume of digital information is growing exponentially and will be 10 times larger by 2011. However, most organizations do not have adequate policies, procedures, or technologies in place to properly manage the vast quantities of electronic information being created. As a result, large amounts of important digital information ends up abandoned in digital landfills, creating inefficiencies and legal risks for organizations.
Effectiveness implementation of e commerce in the developing countries empiri...Alexander Decker
This document summarizes a study on the effectiveness of e-commerce implementation in developing countries, using Jordan as a case study. The study aims to analyze factors affecting consumer online purchasing trends in Jordan and identify opportunities and risks of e-commerce. A survey was conducted with 177 participants in Jordan. The findings show that quality, price and global access are driving e-commerce's importance. However, the study also sought to identify other key factors for e-commerce success, such as product quality, security of payments, and the sufficiency of consumer protection laws.
The document discusses the problem of "shadow systems" in organizations, which are small databases or spreadsheets developed by employees outside of IT control to manage business-critical information. This creates issues around data security, productivity, and compliance. The document evaluates options for resolving these issues, including adopting strict data access protocols, using file security software, or procuring specialist software designed to provide a secure alternative to shadow systems that meets knowledge workers' needs.
Solving the Encryption Conundrum in Financial ServicesEchoworx
Encryption has gone mainstream!
The encryption debate has captured the world’s attention. And coupled with the inevitability of another notable data breach, awareness of encryption as a tool to mitigate threat is at an all-time high. Still confidential financial statements, mortgage documents, and investment information are regularly sent unencrypted.
This white paper sets out some of the key rules, guidelines, best practices and associated risks for FINRA member firms and suggests ways that organizations can use encryption to protect themselves, their customers and representatives. In addition, it looks at some of the issues enterprises encounter when enabling email encryption technologies and ways to avoid them.
Achieving Digitalization in a Document Intensive Energy MarketCTRM Center
As energy companies seek to become more efficient and agile in a rapidly changing marketplace fraught with risks, digitalization - the process of evolving from manual or analog processes to more efficient and cost effective digital processes by reducing the number of times data is touched and ensuring greater accuracy and more rapid movement of data and information throughout the enterprise – continues to attract attention from CIOs across the energy value chain.
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
The document discusses the challenges and risks of adopting new mobile and cloud technologies without proper governance strategies. It provides examples of companies that experienced negative consequences due to a lack of oversight and planning around BYOD policies and unsupported devices/applications. The author advocates for proactive governance that supports new tools while managing risks through well-defined protocols and transparency between IT and users.
“Recognizing Value from a Shared RM/DM Repository: Canadian Government Perspe...Cheryl McKinnon
2003 ARMA Conference Proceedings paper outlining Canadian government examples in content and information management. A historical piece, with focus on Canadian Federal RDIMS initiative up to 2003 and City of Coquitlam. Background to ARMA session co-delivered by Cheryl McKinnon and Heather Gordon
Managing Electronic Records Within A Federal Government Workplaceguest9269676
Ken Matthews, an ERM Program Manager at USAID, discusses challenges with managing electronic records and provides guidance. Some key challenges include the massive and growing volumes of electronic records, issues with authenticity and integrity over time, and difficulties with search, retrieval and findability. Matthews outlines topics to consider like identifying records across different media, essential factors for management, and functional requirements for an electronic records solution. He also discusses records lifecycles, legal obligations around electronic discovery, and the role of organizations like NARA in providing guidance and long-term preservation of federal records.
Best Hadoop Institutes : kelly tecnologies is the best Hadoop training Institute in Bangalore.Providing hadoop courses by realtime faculty in Bangalore.
- Electronic commerce was identified as the facilitation of commercial transactions electronically, using technology such as Electronic Data Interchange (EDI) and Electronic Funds Transfer (EFT).
- E-commerce can be divided into different types including business-to-business (B2B), business-to-consumer (B2C), business-to-government (B2G), consumer-to-consumer (C2C), and mobile commerce (m-commerce).
- Various e-commerce models were discussed including marketplaces, online retailers, and other business models involving transactions between businesses, consumers, and government.
Unstructured Data into EHR Systems: Challenges and SolutionsDATAMARK
This document discusses the challenges healthcare organizations face in managing unstructured data within electronic health record (EHR) systems. Unstructured data, such as scanned reports, medical images, and handwritten notes, accounts for around 80% of healthcare data but is difficult to incorporate into EHRs which are designed for structured data. Electronic document management systems (EDMS) that use technologies like automated data capture and document management can help healthcare organizations bring unstructured data into EHR systems and create a complete patient record. However, implementing an EDMS is a complex process that requires expertise to develop an enterprise content management strategy and properly integrate the necessary technologies.
E-FILE was established in the Middle East to provide archiving, electronic document management, and capture solutions. It is owned by professionals experienced in solutions architecture, project management, development, and other areas. E-FILE has provided services to numerous government and private organizations in Jordan, UAE, Bahrain, Syria, Yemen, and Sudan. The company's InfiniteECM solution allows organizations to capture, index, retrieve, and publish documents through a user-friendly interface. It provides benefits like reduced expenses, secure storage of corporate assets, and faster decision-making. Customers are attracted to its Arabic/English interface, customizability, and multi-functionality as an enterprise solution.
This document discusses how businesses can better manage the large amounts of data they collect from various sources. It emphasizes the importance of data as the most critical business asset. To make the most of data, companies need to integrate their different systems and applications through strategies like change data capture rather than traditional extract, transform, and load processes. This allows them to more efficiently aggregate changing data from multiple sources and turn it into meaningful business insights. The first step is developing a strong information architecture and understanding how all the data fits together.
Similar to ASG_Record_Mgmts_Breaking_Point_White_Pa (20)
1. C O N T E N T
Electronicrecordvolumesareincreasingasenterpriseandbusinesssystemsarmedwithaggregatedcomputing
processingpowercreatehundredsofthousands—evenmillions—ofrecordswithinasinglebatchprocess.This
whitepaperoutlinesissuesthatmakemanagingtransactionalelectronicrecordschallenging,demonstrateswhy
organizationsneedtotamethehigh-volumetransactionalrecordsbeast,andlastly,describeswhattolookforina
transactionalelectronicrecordsmanagementsolution.
MANAGING TRANSACTIONAL ELECTRONIC RECORDS IN HIGH-VOLUME ENVIRONMENTS
RECORD MANAGEMENT’S BREAKING
POINT
2. RECORDS MANAGEMENT’S BREAKING POINT:
MANAGING TRANSACTIONAL ELECTRONIC RECORDS IN
HIGH-VOLUME ENVIRONMENTS
C O N T E N T
ABOUT AIIM
AIIM (WWW.AIIM.
ORG) HAS BEEN
AN ADVOCATE
AND SUPPORTER
OF INFORMATION
PROFESSIONALS FOR
NEARLY 70 YEARS.
THE ASSOCIATION
MISSION IS TO ENSURE
THAT INFORMATION
PROFESSIONALS
UNDERSTAND THE
CURRENT AND
FUTURE CHALLENGES
OF MANAGING
INFORMATION ASSETS
IN AN ERA OF SOCIAL,
MOBILE, CLOUD, AND
BIG DATA. FOUNDED IN
1943, AIIM BUILDS ON
A STRONG HERITAGE
OF RESEARCH AND
MEMBER SERVICE.
TODAY, AIIM IS A
GLOBAL, NON-PROFIT
ORGANIZATION
THAT PROVIDES
INDEPENDENT
RESEARCH, EDUCATION,
AND CERTIFICATION
PROGRAMS TO
INFORMATION
PROFESSIONALS. AIIM
REPRESENTS THE
ENTIRE INFORMATION
MANAGEMENT
COMMUNITY, WITH
PROGRAMS AND
CONTENT FOR
PRACTITIONERS,
TECHNOLOGY
SUPPLIERS,
INTEGRATORS, AND
CONSULTANTS.
EXECUTIVE SUMMARY
What you don’t see can sometimes be more dangerous than what you can.Visit the office of any large organization
and you’ll likely find file cabinets filled with documents and desktop computers runningWord, Excel, email, and other
personal productivity applications. All of this information—from mortgage loan applications and email exchanges
between employees to Excel customer invoices and training videos posted on the company website—is content that
every organization needs to manage.
For most organizations, properly classifying, retaining, and then retrieving these records across multiple offices
and business units is challenging and time-consuming, especially in light of ever-changing regulations and the
omnipresent risk of litigation. However, records created manually and semi-automatically represent just the tip of the
records management iceberg. Consider what’s under the surface: millions of records automatically created by high-
volume, transactional enterprise systems.These electronic records include customer statements, bills, checks, invoices,
and high-volume reports, representing the submerged, potentially dangerous portion of the iceberg. Like theTitanic,
organizations are often able to navigate around the part of the iceberg they can see, but it’s what’s under the surface
that can cause havoc.
Electronic record volumes are increasing as enterprise and business systems armed with aggregated computing
processing power create hundreds of thousands—even millions—of records within a single batch process.
Simultaneous input from hundreds, if not thousands, of users adds to the data volumes.
The good news is that organizations recognize that their electronic records management processes are not up to par,
reporting that electronic records are more than twice as likely as paper records to be“unmanaged.”1
The bad news
is that many lack a cost-effective, consistent, and efficient method of managing these records across the enterprise.
Not only are transactional electronic records out of control, but often organizations can’t find them.The Association
for Information and Image Management (AIIM) discovered that 41 percent of organizations are not confident that
electronic information (excluding emails) is“accurate, accessible, and trustworthy.”2
It’s ironic that although electronic records are the most voluminous records in any organization, they are the most
difficult to manage with current records management solutions—if they are managed at all. In an electronic
records environment, traditional records management solutions that rely on manual processes fall short. A records
management system adequate for retrieving, processing, and archiving several thousand records per day becomes
costly and unwieldy when applied to several million transactional records per day.
Like the volume of content itself, the task of getting these records under control may seem overwhelming. However,
a new method of managing electronic records does exist.This white paper outlines some of the issues that make
electronic records management so challenging, highlights why organizations need to tame the high-volume
transactional records beast, and lastly, describes what to look for in a transactional records management solution.
3. TAMING THE TRANSACTIONAL RECORDS BEAST
Electronic records are easy to create but difficult to manage. In a nightly batch job, a billing or payroll system
can generate thousands of records that need to be captured, classified, retained, and scheduled for disposal.
Organizations also need to integrate the management of these electronic records with other record types
created across the organization, including paper documents, XML, HTML, PCL, AFP, DJDE/Metacode,
PDF, PostScript, rich media formats, Word documents, Excel spreadsheets, emails, and Outlook calendar
entries. Organizations that attempt to apply manual and human-centric records management processes find
that these traditional methods wind up being extremely expensive and impractical for several reasons, as
described below.
OUT OF SIGHT, OUT OF MIND
Unlike paper documents that clutter up a file cabinet or storage room, electronic records reside in mainframe
or distributed systems—or both—out of sight and often out of mind. Like the late, US-based comic Rodney
Dangerfield, electronic records simply “get no respect.” According to AIIM, “Electronic records are still taken
less seriously than paper records.”3
Once applications create these records, organizations then need to store them either in the application itself
or, more typically, in external archiving or storage systems. But even this movement tends to be haphazard:
More than 70 percent of organizations report that they do not have plans or provisioning in place for the long-
term storage of electronic records.4
EXPLODING DATA VOLUMES
There should be little wonder that managing electronic records is so challenging, since data volumes are
exploding and show no signs of slowing down. For example, 18.76 billion payments crossed the Automated
Clearing House (ACH) Network in 2009, an increase of 2.6 percent over 20085
, and electronic single-stock
trading systems now create 37 percent of U.S. equity trading volume.6
Seventy percent of organizations report
that the electronic record volume is “increasing rapidly,” while none report a decrease.7
ACCESS BY ALL
It’s not just unwieldy volumes. The pervasive nature of electronic records is what makes them difficult to
manage. Unlike paper, these records can’t be confined to a locked file cabinet. Employees, customers,
suppliers—even hackers—can view, copy, disseminate, and destroy thousands of records in an instant. Those
organizations without an electronic records management strategy are most at risk, with 60 percent of these
organizations reporting that they are not confident that their electronic records have not been changed,
deleted, or inappropriately accessed.8
SILOED ENVIRONMENT
A technology environment in which siloed mainframe and distributed systems are the norm compounds the
challenge of managing electronic records. Almost a third of organizations have 20 or more siloed content
repositories and more than half have 10 or more.9
Yet the vast majority of records management solutions are
standalone systems that address the records retention needs of a single department or application rather
than integration with an enterprise-wide records retention plan.
TRANSACTIONAL
ELECTRONIC RECORDS
ARE EASY TO CREATE
BUT DIFFICULT TO
MANAGE. APPLYING
MANUAL AND HUMAN-
CENTRIC RECORDS
MANAGEMENT
PROCESSES WINDS
UP BEING EXTREMELY
EXPENSIVE AND
IMPRACTICAL.
4. RECORDS MANAGEMENT’S BREAKING POINT:
MANAGING TRANSACTIONAL ELECTRONIC RECORDS IN
HIGH-VOLUME ENVIRONMENTS
C O N T E N T
While organizations create these electronic records in siloed application systems, regulations and laws
require that organizations have the ability to treat these records as if they were created by or reside in a
single application. For example, a financial institution is court-ordered to place a legal hold on all records of
transactions involving an individual customer account. However, those records may include ATM withdrawals,
wire transfers, customer statements, and loan documentation housed in different application systems. If
the financial institution is global, these records could be contained in different applications throughout the
world, all with different retention and storage taxonomies—and under the governance of various disparate
regulations. The inability to place a hold on an account within the legal time limit may expose the organization
to incurring a multimillion dollar fine.
OUTDATED PROCESSES AND STANDARDS
In theory, the traditional principles of records management apply to any type of record. In practice, the high
volume of these electronic records makes paper-based processes for declaration, classification, and retention
tracking of electronic records costly and impractical. For example, while the U.S. Department of Defense
Directive 5015.2 and the Model Requirements for Electronic Records Management (MoReq) in Europe provide
guidelines that organizations can apply to electronic records management, these standards do not fully
address issues specific to high-volume, application-created electronic records. Rather, organizations need to
implement standards that consider the speed at which electronic records are created, stored, and disposed.
Many organizations use a manually-maintained file plan to manage their paper documents. When a
government agency passes a new record retention regulation, the records manager manually enters the
new retention criteria into the records management system for each impacted record type. This process may
work fine for a limited number of records but becomes exponentially expensive and unwieldy when manually
applied to billions of electronic records accumulated over several years. Organizations, especially those that
are international and must comply with a wide variety of country-specific jurisdictions, would require an
army of records managers to keep pace with changing regulations—as well as the overwhelming numbers of
records requiring oversight.
RETENTION COMPLICATIONS
The IT department typically is responsible for enterprise systems and often—by default—becomes
responsible for the classification and retention of the records within those systems. Rather than considering
risk, legal, or regulatory ramifications or whether the corporate “memory” is properly protected, the IT
department tends to view retention as a storage management issue.
Since the IT department is typically not well-versed in records management issues and may be unsure of how
to apply appropriate retention schedules, it may err on the side of archiving all electronic records. With storage
costs decreasing as a result of new technologies and options such as cloud computing, moving all electronic
records to low-cost or alternative storage may seem like an answer. However, without an enterprise-wide
electronic records management solution, organizations still cannot properly classify, retain, retrieve, and then
delete records stored in siloed systems and databases according to central retention policies.
A strategy of “keeping everything” can also result in penalties. In Germany, courts concluded that
telecommunications companies must delete telephone and Internet data, overturning the 2006 EU Directive
on Data Retention requiring companies to keep such data for six months. Telecommunications companies
failing to delete the data now face fines.10
THE U.S.
DEPARTMENT
OF DEFENSE
DIRECTIVE 5015.2,
AND THE MODEL
REQUIREMENTS
FOR ELECTRONIC
RECORDS
MANAGEMENT
(MOREQ) IN EUROPE
PROVIDE GUIDELINES
THAT ORGANIZATIONS
CAN APPLY TO
ELECTRONIC
RECORDS
MANAGEMENT.
THESE STANDARDS
DO NOT FULLY
ADDRESS ISSUES
SPECIFIC TO
HIGH-VOLUME,
APPLICATION
CREATED
ELECTRONIC
RECORDS.
5. ALTHOUGH
APPLICATIONS
CREATE HUNDREDS
OF THOUSANDS OF
RECORDS AS PART
OF A SINGLE REPORT,
THE LAW REQUIRES
ORGANIZATIONS TO
TREAT EACH AS AN
INDIVIDUAL RECORD.
IN SEVERAL HIGH-
PROFILE CASES,
COURTS HAVE HEAVILY
FINED ORGANIZATIONS
UNABLE TO
PROVIDE ACCESS TO
ELECTRONIC RECORDS
IN A TIMELY MANNER.
WHY HIGH-VOLUME TRANSACTIONAL RECORDS MANAGEMENT MATTERS
Is electronic records management—particularly that associated with high-volume, application-created
records—worth the effort? In a word: Yes. Those organizations not able to fully manage transactional
electronic records risk regulatory noncompliance, legal action, and unauthorized data access that can
negatively impact their business.
REGULATORY RISK
The Bernie Madoff $50 billion Ponzi scheme (2008), the Enron debacle (2001), and the accounting fraud
incident at Indian outsourcing provider Satyam Computer Services (2009) are just a few of the highly publicized
criminal events that have regulators considering passing a slew of new policies designed to improve
information transparency. Although not focused on records management per se, regulations including the
Markets in Financial Instruments Directive (MiFID), the Health Insurance Portability and Accountability Act
(HIPAA), the USA PATRIOT Act, the Sarbanes-Oxley (SOX) Act, the U.S. Food and Drug Administration’s 21 CFR
Part 11, the Consumer Product Safety Improvement Act (CPSIA), and the EU Data Protection Directive include
provisions directly attributable to electronic records management.
For example, while the major objective of MiFID is to harmonize Europe’s financial markets, MiFID Article
51(3) addresses records retention, specifying a five-year retention period for transactional data. HIPAA, which
governs electronic transfers of health information, mandates that organizations retain all medical records,
signed consent forms, authorization forms, and other HIPAA-related documentation for six years. It also
requires organizations to keep records for two years after a patient’s death. The Anti-Money Laundering
Directive 2005/60/ EC requires organizations to keep records for at least five years. Lastly, Directive 2003/88/
EC directs organizations to keep records of employee work hours and provide those records on demand.
In several high-profile cases, courts have heavily fined organizations unable to provide access to electronic
records in a timely manner. Unfortunately, good intentions and attempting to comply with regulations can
still result in hefty fines. For example, the Financial Services Authority (FSA) stated that Goldman Sachs
International did not “set out to hide anything,” but still fined the firm £17.5 million for failure to ensure it could
comply with UK regulatory reporting rules. Margaret Cole, managing director of enforcement and financial
crime for the FSA, stated, “This penalty should send a message—particularly to the senior management of
large institutions—of the need to have their firm’s UK reporting obligations at the forefront of their minds.”11
LEGAL RISK
Organizations need access to records to not only successfully defend a case, but also for proactive legal
activities. In the U.S., the 2006 amendments to the Federal Rules of Civil Procedure (FRCP) incorporated
specific e-discovery guidelines for Electronically Stored Information (ESI) used as evidence in a civil or criminal
case, including text, images, calendar files, databases, spreadsheets, audio files, animation, websites, and
computer programs. Other countries have passed similar rules governing e-discovery.
Although applications create hundreds of thousands of records as part of a single report, the law requires
organizations to treat each as an individual record. Searching for a single record within a batch file containing
thousands of records—or more—is akin to searching for a needle in a haystack. Organizations unable
to retrieve records in a timely manner face multimillion dollar lawsuits, not to mention damage to their
reputation and brands.
6. RECORDS MANAGEMENT’S BREAKING POINT:
MANAGING TRANSACTIONAL ELECTRONIC RECORDS IN
HIGH-VOLUME ENVIRONMENTS
C O N T E N T
ELECTRONIC
RECORDS ARE
CONSIDERED A
“TECHNOLOGY
ISSUE” AND
THEREFORE BECOME
THE DE FACTO
RESPONSIBILITY OF
THE IT DEPARTMENT.
IT DEPARTMENTS
CAN ADDRESS HOLDS
AND OTHER LEGAL
REQUESTS SINCE
THEY “OWN” THE
RECORDS, BUT THEY
MAY NOT POSSESS
THE EXPERTISE
OF LEGAL STAFF
WELL-VERSED
IN LITIGATION
PROCESSES.
AN ELECTRONIC
RECORDS
MANAGEMENT
SOLUTION SHOULD
LINK MAINFRAME
AND DISTRIBUTED
PROCESSING
TRANSACTIONAL
INFORMATION AND
STORE RECORDS
IN THEIR NATIVE
ENVIRONMENT. IT
SHOULD ALSO BE
HIGHLY SCALABLE.
Even those organizations that successfully fulfill e-discovery requests may ultimately spend millions of dollars
in man-hours and lost productivity to comply with legal imperatives. Further, company executives may also
become personally liable in certain situations and face individual fines or jail time.
Even in an increasingly litigious environment, more than half of organizations lack e-discovery procedures.
A recent AIIM survey revealed that while 71 percent of organizations address the legal hold of paper records
in the event of litigation, only 57 percent have a process in place for electronic records.12
Perhaps part of the
reason for a lack of ESI discovery process is that electronic records are considered a “technology issue” and
therefore become the de facto responsibility of the IT department. The organization may ask the IT department
to address holds and other legal requests since they “own” the records, but the IT department may not
possess the expertise of legal staff well-versed in litigation processes.
SECURITY RISK
Electronic records often contain sensitive information, including employee Social Security numbers and
customer account information, making these transactional records attractive to hackers. High-profile data
breaches, such as the 2007 theft from TJX Companies, Inc. of transactional record data that compromised
the security of 40 million credit and debit cardholders, highlight the need for organizations to integrate
data storage and security with electronic records management processes to help protect such sensitive
information.
CRITICAL COMPONENTS OF AN ELECTRONIC RECORDS
MANAGEMENT SOLUTION
An electronic records management retention strategy must enable organizations to mitigate regulatory, legal,
and security risks while addressing the unique challenges of electronic records. Rather than requiring a rip-
and-replace of legacy systems, the solution should manage records across multiple environments yet provide
a single, consolidated view; automate records management tasks, including classification and retention;
enable individual record management; and provide records managers with easy-to-use administrative tools.
WORK WITHIN A HYBRID ENVIRONMENT
Most large organizations operate in a heterogeneous technology environment of both legacy mainframe
applications and distributed processing systems, and will continue to run this environment for the foreseeable
future. However, many records management solutions ignore the reality of this technology environment and
require organizations to sunset legacy systems in order to implement an electronic records management
practice. For the majority of organizations, a wholesale replacement of legacy systems is cost-prohibitive and
overly disruptive to their operations.
Rather than forcing a migration to a different platform, an electronic records management solution should link
mainframe and distributed transactional information and store records in their native environment. It should
also be highly scalable.
7. MANAGING THE
ENORMOUS
VOLUMES OF
TRANSACTIONAL
ELECTRONIC
RECORDS
REQUIRES A
SOLUTION THAT
AUTOMATES ALL
PROCESSES.
SINGLE VIEW INTO MULTIPLE REPOSITORIES
Even though the ideal solution can administer electronic records in different repositories, it should contain
an interface that provides a single view into records stored in many different locations throughout the
organization, regardless of the type or age of the record.
AUTOMATE TRANSACTIONAL RECORDS MANAGEMENT
Managing the enormous volumes of transactional electronic records requires a solution that automates all
processes. First, the solution should ingest application-generated content from mainframe and distributed
systems, whether from enterprise-wide systems or line-of-business applications.
Next, it should apply predefined business rules that determine who has access to the record, where to keep
it, and how long to keep it. The solution should automatically extract metadata for classification and assign
a disposition rule based on company requirements. Finally, the solution should automate retention. If the
corporate retention policy changes, whether due to regulatory updates or corporate mandates, records
managers need only define the new retention criteria once and the solution subsequently applies those
criteria across all existing and new transactional records.
PROVIDE GRANULARITY
Even though applications produce transactional output containing multiple records, legal and compliance
requirements force organizations to identify these records individually. Therefore, the solution should present
records inside of bulk reports as individual records in taxonomy and enterprise file plans, and enable access
controls at the record level. Organizations should be able to hold an individual record in a large report without
retaining the complete report—and then be able to destroy individual records based on business events
without affecting other records in the same archive.
RECORDS MANAGER INTERFACE
To be most efficient and effective, a records manager needs an automated, easy-to-use front end to
administer the solution. A Web-based user interface based on an open architecture is ideal for providing
records managers with a full-range of administrative functions. Records managers can then define
hierarchical taxonomies for automatic classification, automatically define and subscribe to events from line-
of-business applications, and define a corporate retention schedule with multiple policies and rules, applying
those rules to specific record types.
CONCLUSION
Just as the Titanic was sunk by what was under the surface, your organization can also be “sunk” by what you
don’t see: millions of electronic records. Without an automated, enterprise-wide solution specifically designed
for high-volume electronic records management, your organization risks regulatory action, litigation, and
security breaches.