Speakers: Christine Ardern, Adrian Cunningham, Charles Dollar, Ph.D., Mariella Guercio, Ph.D., Kenneth Thibodeau, Ph.D.
Is your organization facing "Corporate Alzheimer's"?
Fast forward to 2020:
- Your organization's CDs are obsolete,
- Its social media has been replaced,
- The Cloud has evaporated, and
- The organization has restructured several times and the terminology it used in 2012 has changed.
The organization's information assets, however, are safe in tiered storage. Because the software and hardware has changed from what was used to create them, access to needed records and data now is limited and, in some instances, impossible.
This is Corporate Alzheimer's - the increasing inability over time to access an organization's long-term digital information - when we know it is there, but changes in computer hardware and software have made the needed information inaccessible/unreadable.
Read more: http://www.rimeducation.com/videos/rimondemand.php
Information governance process & technologyGNetadmin
This document discusses implementing information governance programs to reduce risk and increase strategic advantage. It covers why information governance matters due to legal and regulatory requirements. Key steps include developing consistent policies, knowing where records are stored, distinguishing records, and leveraging automation. Technologies should integrate across solutions, support data sharing, and provide reporting and audit capabilities. The presentation then discusses specific Symantec solutions.
C. Lwanga Yonke presented on managing data quality as a process. He discussed that data quality should be viewed as a product of business processes, not an afterthought. Several models for information quality process management were presented, including viewing data as a product manufactured through well-defined production processes. Effective data quality management requires defining accountabilities, assessing data quality at the source, and taking a process-oriented approach.
A presentation on the challenges around BYOD – and more importantly how to make a successful transition to the next-generation workspace that addresses the technology, security, legal and change management aspects.
Data lifecycle management and destruction involves identifying an organization's information, governing its use through policies and standards, and managing the data from creation to disposal. Information exists in both physical and electronic forms and passes through various stages of sensitivity over its lifecycle. Proper data governance requires classification, retention policies, and security controls tailored to the risk and value of the information. Effective data lifecycle management can help organizations comply with regulations and avoid the unauthorized disclosure of proprietary information.
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillJeff Kiesel
Product development organizations are dealing with changing dynamics due to corporate downsizing, outsourcing, and partnerships. Despite these changes, organizations still must empower teams to innovate and produce their design deliverables on time and on budget. This paper will describe how a secure Internet- based Windchill® environment is helping many world-class organizations meet their challenges and effectively get their products to market to meet their goals.
Dspoz-IT is a leading provider of Information Technology Service Management solutions (ITSM). We focus on environmentally responsible ways to dispose of your IT Assets while gaining the greatest return on investments for those IT Assets
Proact’s view on archiving
Here are some guidelines we use in the design:
Reduce Cost & Complexity
As always use common sense, the more complicated a solutions the more likely it is
to have functional problems and high operating cost. We also focus on using industry
standards and standard components where it is possible. Archiving is a complex task and a
solid implementation plan combined by a step by step approach has proven successful.
Making your metadata governance program for unstructured content sustainableAlix Kneifel
This session will present governance problems and strategies, along with a set of tools to help you evaluate your metadata governance program or get it back on track. Presented at DGIQ conference, June 2012.
Information governance process & technologyGNetadmin
This document discusses implementing information governance programs to reduce risk and increase strategic advantage. It covers why information governance matters due to legal and regulatory requirements. Key steps include developing consistent policies, knowing where records are stored, distinguishing records, and leveraging automation. Technologies should integrate across solutions, support data sharing, and provide reporting and audit capabilities. The presentation then discusses specific Symantec solutions.
C. Lwanga Yonke presented on managing data quality as a process. He discussed that data quality should be viewed as a product of business processes, not an afterthought. Several models for information quality process management were presented, including viewing data as a product manufactured through well-defined production processes. Effective data quality management requires defining accountabilities, assessing data quality at the source, and taking a process-oriented approach.
A presentation on the challenges around BYOD – and more importantly how to make a successful transition to the next-generation workspace that addresses the technology, security, legal and change management aspects.
Data lifecycle management and destruction involves identifying an organization's information, governing its use through policies and standards, and managing the data from creation to disposal. Information exists in both physical and electronic forms and passes through various stages of sensitivity over its lifecycle. Proper data governance requires classification, retention policies, and security controls tailored to the risk and value of the information. Effective data lifecycle management can help organizations comply with regulations and avoid the unauthorized disclosure of proprietary information.
NetIDEAS Inc. - Enabling Global Design Teams with hosted WindchillJeff Kiesel
Product development organizations are dealing with changing dynamics due to corporate downsizing, outsourcing, and partnerships. Despite these changes, organizations still must empower teams to innovate and produce their design deliverables on time and on budget. This paper will describe how a secure Internet- based Windchill® environment is helping many world-class organizations meet their challenges and effectively get their products to market to meet their goals.
Dspoz-IT is a leading provider of Information Technology Service Management solutions (ITSM). We focus on environmentally responsible ways to dispose of your IT Assets while gaining the greatest return on investments for those IT Assets
Proact’s view on archiving
Here are some guidelines we use in the design:
Reduce Cost & Complexity
As always use common sense, the more complicated a solutions the more likely it is
to have functional problems and high operating cost. We also focus on using industry
standards and standard components where it is possible. Archiving is a complex task and a
solid implementation plan combined by a step by step approach has proven successful.
Making your metadata governance program for unstructured content sustainableAlix Kneifel
This session will present governance problems and strategies, along with a set of tools to help you evaluate your metadata governance program or get it back on track. Presented at DGIQ conference, June 2012.
Valuendo cyberwar and security (okt 2011) handoutMarc Vael
This document discusses cybersecurity threats to critical infrastructure organizations. It notes that cyberattacks can come from criminals, malware, phishers, spammers, negligent or unethical employees, hackers, and nation states. The document also summarizes that cyberattacks are difficult to execute but governments have the resources to conduct them, and that cyberattacks are a real danger that many organizations are unprepared for. It concludes by outlining various cyberattack mitigation strategies organizations can implement including governance, policies, education, funding, and incident management.
Secure MDE offers a mobile onsite data destruction service called the Secure Shark that securely destroys hard drives and other media containing sensitive information. The Secure Shark shreds drives into small pieces to ensure data is unrecoverable. It provides a cost-effective, convenient, and environmentally friendly solution for securely eliminating large amounts of data.
iHT2 Health IT Summit in Phoenix 2013 – Ken Maddock, VP Facility Support Services, Baylor Health Care System Case Study, “Maximizing the Value of your Healthcare Technology Management Program”
IT managers share that they and their organizations could be more mature in their service delivery efforts, affecting their overall IT efficiency. Companies typically tend to be more reactive in nature, allowing less than ten percent of their staff's time to be spent on proactive improvement efforts, like capacity planning and performance management. Proper capacity management has a positive impact across all IT areas, according to survey findings. Virtual machine management is not without its struggles, but proper planning is cited as a solution. Find out what else IT managers had to say about their state of capacity management and how it affects their ability to effectively plan, deliver and manage IT resources.
Enterprise Collaboration For The Legal CommunityAlasdair Kilgour
IntraLinks for Legal Management provides a secure collaboration platform for corporations, law firms, and service providers to efficiently manage legal matters. It offers a centralized dashboard for overseeing all cases, integrated financial reporting, and a document repository for sharing information. The software enables users to organize workflows, control document access permissions, and collaborate across internal and external teams on critical legal information from any location.
The document outlines key information systems practices and indicators that are evaluated. It is divided into sections on planning practices, administrative practices, delivery practices, and strategy and direction, resource management, financial management, and quality management best practices. The best practices sections list indicators such as maintaining an I/S strategy aligned with business needs, ensuring proper budgeting and cost/benefit analysis of projects, and having quality management practices such as portfolio management and a commitment to quality assurance.
TIK mencakup dua aspek yaitu teknologi informasi dan komunikasi, di mana teknologi informasi meliputi proses, penggunaan, manipulasi dan pengelolaan informasi, sedangkan teknologi komunikasi meliputi penggunaan alat untuk memproses dan mentransfer data antar perangkat. TIK terus berkembang sejak abad ke-20 melalui perkembangan teknologi seperti telepon, radio, televisi, komputer dan jaringan digital.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
M12S15 - CASE STUDY: Spoliation - The Actual Case As It Was To Be Argued in ...MER Conference
Speakers: Richard Cowen, Esq. Hon. Ronald J. Hedges Matthew Prewitt, Esq.
A key executive with access to his company's confidential and trade secret information downloads information from his company-owned laptop to flash drives, and then, the evening before resigning, uses a commercially available "wipe" to erase his laptop. He claims he didn't want his employer to see porn, personal messages and comments critical of his boss, and didn't realize he erased virtually everything. After leaving the company, and after suit had been filed, he throws away the flash drives, now claiming he did this so it would be clear he wouldn't have any information in his possession.
M12S11 - The Do's and Don'ts of Managing Social MediaMER Conference
M12S11 - The Do's and Don'ts of Managing Social Media
Speakers: Sara Meaney Jesse Wilkins
Many organizations have moved, from experimenting with social media tools, to incorporating them into business processes. As a result, both commercial services and enterprise social content tools are significantly changing the ways organizations do business and interact with their constituents. As the amount of content generated by these tools increases, so does the need to manage them successfully.
Learn more: http://www.rimeducation.com/videos/rimondemand.php
M12S23 - Right-sizing Your Information Footprint by Chucking Your Dead DataMER Conference
Speakers: Randolph A. Kahn, Esq. & Jonathan Redgrave, Esq.
Today, most organizations have too much digital content that has outlived its usefulness. Every year, the quantity of this unusable content multiplies. So, there's no time like the present to get busy, get cleaner and get meaner.
Having a defensible methodology and using the right tool for the task allows organizations to right-size their "Information Footprint" without worrying about regulatory or legal consequences.
If your organization right-sizes its' "Information Footprint", it would be much better off. Keeping old, unnecessary content will result in higher costs and risks. If the costs and risks are big enough, the case for proactively cleaning up the "Information Footprint" is very compelling.
Read more: http://www.rimeducation.com/videos/rimondemand.php
The document discusses six governance processes for data and business intelligence: data lifecycle, data models, data quality, data security, data warehousing, and metadata. For each process, it provides an overview of why governance is important in that area, and what the governance process will do to manage issues and ensure requirements are met. The governance processes aim to balance various factors, control changes, and provide oversight and accountability for data management.
The document discusses data archiving concepts and techniques. It introduces archiving as an intelligent process for placing inactive or infrequently accessed data on the right storage tier while allowing preservation, search and retrieval during a retention period. It discusses drivers of information growth like compliance requirements and new applications. An effective archiving strategy addresses both business and IT needs like managing risk, improving efficiency and reducing costs. The document outlines components of an archiving solution like application connectors, rules and management layers, and storage services. It also discusses IBM's reference architecture for archiving.
M12S01 - The Information Tsunami: Where We Are and How to Move ForwardMER Conference
The document summarizes a presentation on the current state of electronic records and information management (eRIM) programs. It notes that many eRIM implementations are failing because records managers missed an opportunity to lead, and that senior management buy-in and business operations involvement are key to success. The presentation outlines the various stakeholders involved in eRIM and their sometimes conflicting interests. It recommends clarifying accountability for information management and addressing the effects of social media. Motivating senior leaders requires emphasizing value and risk, while business users must take responsibility for records and embrace necessary changes.
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
Organizations have large amounts of digital content scattered across file shares and other locations. This "dark content" is often not governed and contains valuable, obsolete, and duplicated information. File analysis software can help identify this dark content, determine the appropriate actions for different content types, and execute those actions to remediate file shares. This improves governance, reduces costs and risks, and extracts more value from organizational information assets.
The document discusses strategies for planning and resourcing digital archives and recordkeeping over the long term. It emphasizes understanding information needs, designing systems to support records, using open formats, applying metadata, managing migration, educating staff, and securing funding for projects through building support and linking to popular ideas. Free tools and resources are also mentioned.
de theory and practice of digital preservationFIAT/IFTA
The document discusses the challenges of preserving audiovisual collections in a digital environment, including technological changes, storage media obsolescence, and evolving equipment. It emphasizes the need to establish trust by developing organizational structures, processes, and standards that ensure long-term access, integrity, and authenticity of preserved content. Certification according to standards like ISO 16363 can help audiovisual archives achieve different levels of trustworthiness.
Digital transformation at State Records NSW involves migrating existing recordkeeping systems to a new digital archives system. The project manager looked at experiences of other organizations, digital preservation standards, and NSW's existing resources and skills. Key principles for the migration include maintaining recordkeeping system metadata and documentation. The new digital archives system will have modular components like file validation and normalization tools. It will provide services to agencies through an online dashboard for information sharing and submission of required authorizations. Communications and change management plans will support adoption of the new system.
This document discusses best practice standards for electronic record keeping. It notes that organizations typically have high volumes of electronic messages and documents stored in disorganized ways. This can lead to risks like unauthorized access, loss of data, inability to find records, and non-compliance. The document recommends following standards like AS 4390 and ISO 15489 to properly classify, index, track, appraise, and dispose of records in all formats. Implementing electronic record keeping systems requires identifying requirements, assessing current systems, designing controls, training staff, and ongoing review and improvement.
Valuendo cyberwar and security (okt 2011) handoutMarc Vael
This document discusses cybersecurity threats to critical infrastructure organizations. It notes that cyberattacks can come from criminals, malware, phishers, spammers, negligent or unethical employees, hackers, and nation states. The document also summarizes that cyberattacks are difficult to execute but governments have the resources to conduct them, and that cyberattacks are a real danger that many organizations are unprepared for. It concludes by outlining various cyberattack mitigation strategies organizations can implement including governance, policies, education, funding, and incident management.
Secure MDE offers a mobile onsite data destruction service called the Secure Shark that securely destroys hard drives and other media containing sensitive information. The Secure Shark shreds drives into small pieces to ensure data is unrecoverable. It provides a cost-effective, convenient, and environmentally friendly solution for securely eliminating large amounts of data.
iHT2 Health IT Summit in Phoenix 2013 – Ken Maddock, VP Facility Support Services, Baylor Health Care System Case Study, “Maximizing the Value of your Healthcare Technology Management Program”
IT managers share that they and their organizations could be more mature in their service delivery efforts, affecting their overall IT efficiency. Companies typically tend to be more reactive in nature, allowing less than ten percent of their staff's time to be spent on proactive improvement efforts, like capacity planning and performance management. Proper capacity management has a positive impact across all IT areas, according to survey findings. Virtual machine management is not without its struggles, but proper planning is cited as a solution. Find out what else IT managers had to say about their state of capacity management and how it affects their ability to effectively plan, deliver and manage IT resources.
Enterprise Collaboration For The Legal CommunityAlasdair Kilgour
IntraLinks for Legal Management provides a secure collaboration platform for corporations, law firms, and service providers to efficiently manage legal matters. It offers a centralized dashboard for overseeing all cases, integrated financial reporting, and a document repository for sharing information. The software enables users to organize workflows, control document access permissions, and collaborate across internal and external teams on critical legal information from any location.
The document outlines key information systems practices and indicators that are evaluated. It is divided into sections on planning practices, administrative practices, delivery practices, and strategy and direction, resource management, financial management, and quality management best practices. The best practices sections list indicators such as maintaining an I/S strategy aligned with business needs, ensuring proper budgeting and cost/benefit analysis of projects, and having quality management practices such as portfolio management and a commitment to quality assurance.
TIK mencakup dua aspek yaitu teknologi informasi dan komunikasi, di mana teknologi informasi meliputi proses, penggunaan, manipulasi dan pengelolaan informasi, sedangkan teknologi komunikasi meliputi penggunaan alat untuk memproses dan mentransfer data antar perangkat. TIK terus berkembang sejak abad ke-20 melalui perkembangan teknologi seperti telepon, radio, televisi, komputer dan jaringan digital.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
M12S15 - CASE STUDY: Spoliation - The Actual Case As It Was To Be Argued in ...MER Conference
Speakers: Richard Cowen, Esq. Hon. Ronald J. Hedges Matthew Prewitt, Esq.
A key executive with access to his company's confidential and trade secret information downloads information from his company-owned laptop to flash drives, and then, the evening before resigning, uses a commercially available "wipe" to erase his laptop. He claims he didn't want his employer to see porn, personal messages and comments critical of his boss, and didn't realize he erased virtually everything. After leaving the company, and after suit had been filed, he throws away the flash drives, now claiming he did this so it would be clear he wouldn't have any information in his possession.
M12S11 - The Do's and Don'ts of Managing Social MediaMER Conference
M12S11 - The Do's and Don'ts of Managing Social Media
Speakers: Sara Meaney Jesse Wilkins
Many organizations have moved, from experimenting with social media tools, to incorporating them into business processes. As a result, both commercial services and enterprise social content tools are significantly changing the ways organizations do business and interact with their constituents. As the amount of content generated by these tools increases, so does the need to manage them successfully.
Learn more: http://www.rimeducation.com/videos/rimondemand.php
M12S23 - Right-sizing Your Information Footprint by Chucking Your Dead DataMER Conference
Speakers: Randolph A. Kahn, Esq. & Jonathan Redgrave, Esq.
Today, most organizations have too much digital content that has outlived its usefulness. Every year, the quantity of this unusable content multiplies. So, there's no time like the present to get busy, get cleaner and get meaner.
Having a defensible methodology and using the right tool for the task allows organizations to right-size their "Information Footprint" without worrying about regulatory or legal consequences.
If your organization right-sizes its' "Information Footprint", it would be much better off. Keeping old, unnecessary content will result in higher costs and risks. If the costs and risks are big enough, the case for proactively cleaning up the "Information Footprint" is very compelling.
Read more: http://www.rimeducation.com/videos/rimondemand.php
The document discusses six governance processes for data and business intelligence: data lifecycle, data models, data quality, data security, data warehousing, and metadata. For each process, it provides an overview of why governance is important in that area, and what the governance process will do to manage issues and ensure requirements are met. The governance processes aim to balance various factors, control changes, and provide oversight and accountability for data management.
The document discusses data archiving concepts and techniques. It introduces archiving as an intelligent process for placing inactive or infrequently accessed data on the right storage tier while allowing preservation, search and retrieval during a retention period. It discusses drivers of information growth like compliance requirements and new applications. An effective archiving strategy addresses both business and IT needs like managing risk, improving efficiency and reducing costs. The document outlines components of an archiving solution like application connectors, rules and management layers, and storage services. It also discusses IBM's reference architecture for archiving.
M12S01 - The Information Tsunami: Where We Are and How to Move ForwardMER Conference
The document summarizes a presentation on the current state of electronic records and information management (eRIM) programs. It notes that many eRIM implementations are failing because records managers missed an opportunity to lead, and that senior management buy-in and business operations involvement are key to success. The presentation outlines the various stakeholders involved in eRIM and their sometimes conflicting interests. It recommends clarifying accountability for information management and addressing the effects of social media. Motivating senior leaders requires emphasizing value and risk, while business users must take responsibility for records and embrace necessary changes.
What Are you Waiting For? Remediate your File Shares and Govern your Informat...Everteam
Organizations have large amounts of digital content scattered across file shares and other locations. This "dark content" is often not governed and contains valuable, obsolete, and duplicated information. File analysis software can help identify this dark content, determine the appropriate actions for different content types, and execute those actions to remediate file shares. This improves governance, reduces costs and risks, and extracts more value from organizational information assets.
The document discusses strategies for planning and resourcing digital archives and recordkeeping over the long term. It emphasizes understanding information needs, designing systems to support records, using open formats, applying metadata, managing migration, educating staff, and securing funding for projects through building support and linking to popular ideas. Free tools and resources are also mentioned.
de theory and practice of digital preservationFIAT/IFTA
The document discusses the challenges of preserving audiovisual collections in a digital environment, including technological changes, storage media obsolescence, and evolving equipment. It emphasizes the need to establish trust by developing organizational structures, processes, and standards that ensure long-term access, integrity, and authenticity of preserved content. Certification according to standards like ISO 16363 can help audiovisual archives achieve different levels of trustworthiness.
Digital transformation at State Records NSW involves migrating existing recordkeeping systems to a new digital archives system. The project manager looked at experiences of other organizations, digital preservation standards, and NSW's existing resources and skills. Key principles for the migration include maintaining recordkeeping system metadata and documentation. The new digital archives system will have modular components like file validation and normalization tools. It will provide services to agencies through an online dashboard for information sharing and submission of required authorizations. Communications and change management plans will support adoption of the new system.
This document discusses best practice standards for electronic record keeping. It notes that organizations typically have high volumes of electronic messages and documents stored in disorganized ways. This can lead to risks like unauthorized access, loss of data, inability to find records, and non-compliance. The document recommends following standards like AS 4390 and ISO 15489 to properly classify, index, track, appraise, and dispose of records in all formats. Implementing electronic record keeping systems requires identifying requirements, assessing current systems, designing controls, training staff, and ongoing review and improvement.
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...AIIM International
When Edmonton transitioned to Google Suite from Microsoft Office and network drives, few employees understood basic Google functionality. The complexity of storing information in a structure compliant with RIM standards went way beyond the basics for users. We found ourselves in a familiar position: trying to conform a “boxed” product to meet our essential requirements with thousands of users generating thousands of records everyday.
This presentation tells the story of how we developed and delivered a product that met RIM requirements and was successfully adopted by the populace.
Salesforce Platform: Governance and the Social EnterpriseJames Hindes
The road to the Social Enterpise is transformative, but IT departments need to ensure a smooth transition. Join us to learn first hand from customers who have made the journey, how they defined and managed the change with a well crafted governance strategy.
This document provides an overview of infrastructure as a service (IaaS) including key concepts such as virtualization, delivery models, deployment models, and the benefits of IaaS. It discusses how to build an IaaS including steps such as creating a service catalog, implementing service level agreements, inventorying infrastructure components, implementing back-end billing, rationalizing infrastructure through virtualization, and automating provisioning. It also covers related topics such as the business and financial aspects of IaaS and ongoing research regarding security and trust issues with cloud computing.
This document discusses management information systems. It defines an information system and explains their purpose from a business perspective in providing economic value and enabling firms to increase revenues or decrease costs. It also discusses the business information value chain and differences between behavioral and technical approaches to information systems. Contemporary approaches emphasize both behavioral and technical aspects through sociotechnical systems to help organizations achieve more efficient and effective performance.
Advanced Logging and Analysis for SOA, Social, Cloud and Big DataPerficient, Inc.
Perficient is a leading IT consulting firm that helps clients implement business-driven technology solutions. It was founded in 1997 and has over 2,000 employees located throughout North America and in global delivery centers. Perficient provides a wide range of services including custom application development, package implementation, architecture planning, and more to support solutions like enterprise portals, SOA, BI, and CRM. The presentation discusses the need for comprehensive application monitoring to prevent costly outages and errors. It covers using logging and complex event processing to monitor systems, transactions, and business events at a high level and in real-time. A demonstration of Perficient's Generic Audit Logger and Generic Exception Handler is also provided to illustrate logging and monitoring solutions
All Together Now: A Recipe for Successful Data GovernanceInside Analysis
The Briefing Room with David Loshin and Phasic Systems
Slides from the Live Webcast on July 10, 2012
Getting disparate groups of professionals to agree on business terminology can take forever, especially when big dollars or major issues are at stake. Many data governance programs languish indefinitely because of simple hang-ups. But a new approach has recently achieved monumental results for the United States Navy. The detailed process has since been codified and combined with a NoSQL technology that enables even the most complex data models and definitions to be distilled into simple, functional data flows.
Check out this episode of The Briefing Room to hear Analyst David Loshin of Knowledge Integrity explain why effective Data Governance requires cooperation. Loshin will be briefed by Geoffrey Malafsky of Phasic Systems who will tout his company's proprietary protocol for extracting, defining and managing critical information assets and processes. He'll explain how their approach allows everyone to be "correct" in their definitions, without causing data quality or performance issues in associated information systems. And he'll explain how their Corporate NoSQL engine enables real-time harmonization of definitions and dimensions.
Visit us at: http://www.insideanalysis.com
Digital Records Management & Preservationvictor Nduna
The document discusses digital records management and preservation. It begins with an introduction to records and archives for good governance and their importance for transparency, accountability and access to information. It then discusses challenges in managing digital information and outlines components needed for effective digital records management including legislation, policies, standards, procedures, staffing and infrastructure. The rest of the document covers international standards for digital records management, requirements for records management systems, digital preservation challenges and strategies.
Data Governance: Description, Design, DeliveryInnoTech
The document discusses data governance and provides an overview of key concepts including:
- Governance establishes standards and policies for processes and data through a governing committee.
- Metadata is important for data management and describes business, operational, technical, and process attributes.
- Data profiling examines data quality and validates adherence to business rules.
- A hybrid architecture with a persistent staging area, enterprise data warehouse, data marts and OLAP cubes supports governance goals.
Introduction To Strait & Associates 2011kmichaelo
Strait & Associates provides records and information management (RIM) consulting services. They help clients define RIM solutions, reduce costs and complexity, and maintain compliance. Their services include RIM assessments, program development, policy creation, and training. Representative projects include developing a global RIM program, performing a RIM assessment, and designing data disposition processes. The document provides contact information for the company.
M12S19 - S19 - CASE STUDY: e-RIM Success with Structured Data SystemsMER Conference
Speakers: Laurie Fischer, Kevin S. Joerling, & Michael S. McKenna
Today, the majority of an organization's business processes and functions are facilitated or supported by the use of electronic systems. In turn, many of these systems create, manage, and/or store electronic data that is "structured".
"Structured data" typically is created and stored according to a pre-defined data model and fits into relational tables, or can be stored in rows and columns.
Information stored in structured data systems often serves as the official evidence of the business process that the system facilitates. As such, this information needs to meet the retention and disposition requirements defined in the organization's retention schedule. The additional requirements for authentic, reliable and unchangeable records are especially challenging since most structured data systems were designed to store and process dynamic and non-redundant data.
Information Technology departments historically have taken the position that since "storage is cheap" the application of an organization's records retention schedule to structured data was not an efficient use of scarce IT resources.
Today, the volume of information and its legal discoverability present a compelling argument for change.
Read more: http://www.rimeducation.com/videos/rimondemand.php
M12S18 - Records and Information Management: What Healthcare Should be Learni...MER Conference
Speakers: Hon. Ronald J. Hedges, Linda Kloss, & Deborah Kohn, MPH RHIA FACHE
Healthcare organizations are making unprecedented investments in information technology to accelerate the transition from paper to electronic health records as a foundation for improving care delivery.
The health care industry is learning that implementing information management and communications technology does not ensure that information is complete, accurate, reliable, secure, or used appropriately.
In fact, research is revealing new data errors and other information-related unintended consequences can impede safe use of technology.
Read More: http://www.rimeducation.com/videos/rimondemand.php
Richard (Dick) Fisher
Organizations are creating data records at a pace few could have imagined just five years ago - terabytes (1 trillion bytes) now and heading toward petabytes (1,000 terabytes) that may need to be archived or disposed of! This session uses the requirement for archiving and disposition of PeopleSoft records and data elements as one example, plus other real world requirements.
Read more: http://www.rimeducation.com/videos/rimondemand.php
M12S13 - RIM for the Next Generation: A Call to ActionMER Conference
Speakers: Charles R. Booz, Julia Brickell, and Mike Salvarezza
The RIM paradigms of the past are fast becoming obsolete and unworkable. New perspectives and new approaches are required.
This session is a "Call to Action" - for a complete transformation of the practice of RIM - from regulations and laws to practices and policies.
The session begins by identifying four major changes are redefining how business is conducted:
The emergence of a new generation of workers,
The proliferation of mobile technology,
The explosion of Social Media, and
The rapid advance of new and innovative technological capabilities.
Collectively, these four changes are rapidly and radically changing the world we live and work in. RIM leaders can and should be leading the charge to:
Change the way things are done,
Adjust legal, regulatory, and business expectations to better address new and different technologies, and
Incorporate cultural changes in the way business is conducted.
One approach is to build a prospective Information Governance model that is highly adaptable to changing circumstances and technologies - in order to avoid being trapped by the next paradigmatic fault underlying our basic RIM assumptions.
M12S09 - ERM Case Law: The Latest News, Trends, and IssuesMER Conference
1) The document discusses recent cases related to electronic records management (ERM) procedures and preservation of electronically stored information (ESI).
2) It provides examples of cases where proper ERM procedures were valuable, as well as some cases where failures to follow procedures resulted in sanctions.
3) The document also summarizes discussions on potential amendments to rules around preservation duties and spoliation sanctions.
M12S08 - Transforming RIM to 'Responsible Information Management'MER Conference
From the MER Conference 2012
Speaker: Karen Strong
For many years "RIM" has been the name of the function within organizations responsible for Records & Information Management. RIM represents the discipline of managing an organization's records and information according to standards, guidelines, laws, and regulations with a focus on compliance.
It is time, however, to re-think some of the traditional assumptions about Records & Information Management. This session details the transformational value in a change to "Responsible Information Management (RIM)".
Responsible Information Management re-sets the vision and direction of RIM and can put your organization on a path to adopt and sustain "best practice" information management behaviors.
Responsible Information Management takes into consideration the roles and responsibilities of every user who creates and receives information in their daily work activities with clear expectations regarding individual and organizational accountability.
In this session, learn:
The necessary changes in behavior at the individual and organizational level to achieve Responsible Information Management, and
The steps you can take to achieve the required business results of Responsible Information Management by leveraging best practices in organizational transformation and change management.
M12S06 - Will Technology-Assisted Predictive Modeling and Auto-Classification...MER Conference
From the MER Conference 2012
Seakers: Jason R. Baron, Esq. Dave Lewis, Ph.D.
2012 is the year we will see great strides by information professionals in using automation (in the form of "predictive" and "technology-assisted" search, filtering, and auto-classification) for the purpose of achieving efficiencies and cutting costs in records management as well as in legal settings.
The strategic use of these new methods is absolutely necessary given the massive, exponential increases in electronically stored information - in the form of records within corporate networks and repositories.
This session addresses the latest technological developments from the two perspectives:
- A longtime advocate of smart technology in the public recordkeeping sector, and
- A leading information scientist.
The session includes a state of the art overview of the latest developments in technology-assisted review, with an emphasis on how these technologies can and will enhance electronic records management by helping to end the era of excessive reliance on end user RM.
You will learn:
- What technology-assisted review and predictive analytics are all about using advanced search, filtering, and auto-classification as part of a defensible electronic records management program.
- How these technologies also add value to overall corporate information governance.
M12S05 - CASE STUDY: Leveraging Content Analytics to Kick-Start your Informat...MER Conference
This document summarizes a presentation about using content analytics to kickstart an information governance initiative. It discusses challenges organizations face with growing data volumes and regulatory obligations. It then describes how content assessment, using analytics, classification, and collection, can help organizations understand their information landscape, prioritize efforts, and enable defensible disposition of data. The presentation includes an example case study of how one large financial organization used these techniques.
From the MER Conference 2012
Speaker: Bruce Miller
The first Electronic Recordkeeping software emerged in 1991.
The US DoD 5015.2 standard has been in place since 1997, and is now undergoing its third major revision.
Some 60+ product certifications against the standard have been granted to date.
Today approximately 20 different products remain certified. These products continue to be sold around the world.
Yet successful deployment is nowhere near expectations.
Hear Bruce's unique perspective as he reviews the successes and frustrations of the very technology he invented and has evangelized for two decades.
In this session, learn:
- Why we have failed to realize the promise of ERM software,
- What went wrong,
- What have we achieved,
- Where have we failed to meet expectations,
- Why do we still seem unable to make it work, and
- Where we are now.
Bruce will make the case that in order to achieve the adoption rates we expect, change will have to come from all four stakeholder groups:
- RIM practitioners,
- Software vendors,
- IT managers, and
- Business leadership.
Hear Bruce's compelling vision for a way-forward roadmap for a more successful electronic recordkeeping future.
M12S07 - Retention & ESI - Paths to Success - Part TwoMER Conference
From MER Conference 2012
Speakers: Christine Burns and Carol Stainbrook
This session explains "why" your organization's technology selections impact "how" the updated retention schedules described in part one of this two-part session can be applied to electronically stored information (ESI). Learn reasonable and actionable approaches for embedding retention policies into e-mail, file shares and enterprise applications.
This session will address:
- Why "perfection" is often impractical, when it comes to applying retention policy to ESI and some reasonable alternatives to perfection.
- How the technologies for email, file shares, and other ESI affect the implementation of retention policies.
- When it may be necessary to choose different retention strategies for different technologies such e-mail, file shares and enterprise applications.
- Considerations for applying retention policy to data in enterprise applications.
- Criteria to help prioritize where to begin when applying retention policy.
In this session you will learn how to tailor your organization's approach to retention schedules so they are reasonable, actionable and result in the orderly destruction of eligible information, given your organization's technology selections.
How Barcodes Can Be Leveraged Within Odoo 17Celine George
In this presentation, we will explore how barcodes can be leveraged within Odoo 17 to streamline our manufacturing processes. We will cover the configuration steps, how to utilize barcodes in different manufacturing scenarios, and the overall benefits of implementing this technology.
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...TechSoup
Whether you're new to SEO or looking to refine your existing strategies, this webinar will provide you with actionable insights and practical tips to elevate your nonprofit's online presence.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
THE SACRIFICE HOW PRO-PALESTINE PROTESTS STUDENTS ARE SACRIFICING TO CHANGE T...indexPub
The recent surge in pro-Palestine student activism has prompted significant responses from universities, ranging from negotiations and divestment commitments to increased transparency about investments in companies supporting the war on Gaza. This activism has led to the cessation of student encampments but also highlighted the substantial sacrifices made by students, including academic disruptions and personal risks. The primary drivers of these protests are poor university administration, lack of transparency, and inadequate communication between officials and students. This study examines the profound emotional, psychological, and professional impacts on students engaged in pro-Palestine protests, focusing on Generation Z's (Gen-Z) activism dynamics. This paper explores the significant sacrifices made by these students and even the professors supporting the pro-Palestine movement, with a focus on recent global movements. Through an in-depth analysis of printed and electronic media, the study examines the impacts of these sacrifices on the academic and personal lives of those involved. The paper highlights examples from various universities, demonstrating student activism's long-term and short-term effects, including disciplinary actions, social backlash, and career implications. The researchers also explore the broader implications of student sacrifices. The findings reveal that these sacrifices are driven by a profound commitment to justice and human rights, and are influenced by the increasing availability of information, peer interactions, and personal convictions. The study also discusses the broader implications of this activism, comparing it to historical precedents and assessing its potential to influence policy and public opinion. The emotional and psychological toll on student activists is significant, but their sense of purpose and community support mitigates some of these challenges. However, the researchers call for acknowledging the broader Impact of these sacrifices on the future global movement of FreePalestine.
This presentation was provided by Rebecca Benner, Ph.D., of the American Society of Anesthesiologists, for the second session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session Two: 'Expanding Pathways to Publishing Careers,' was held June 13, 2024.
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Temple of Asclepius in Thrace. Excavation resultsKrassimira Luka
The temple and the sanctuary around were dedicated to Asklepios Zmidrenus. This name has been known since 1875 when an inscription dedicated to him was discovered in Rome. The inscription is dated in 227 AD and was left by soldiers originating from the city of Philippopolis (modern Plovdiv).
M12S21 - "Corporate Alzheimer's": The Impending Crisis in Accessing Digital Records and Data
1. Cohasset Associates, Inc.
NOTES
Corporate Alzheimer’s
Avoiding Digital Memory Loss
through
Effective Planning
Panel
Chair: Christine Ardern
Adrian Cunningham
Charles Dollar
Mariella Guercio
Ken Thibodeau Session 21:
Tuesday May 8, 3.15 – 4.30 p.m.
1
Your Records are Where?
The Digital Challenge
• Regulatory requirements drive compliance to
maintain and dispose of corporate information
• Technology changes so can we convert all data
in systems?
• Software and media obsolescence pose issues
for access and use
• Social media and the Cloud are removing
centralized control
• Users need to understand content over time
2012 Managing Electronic Records Conference 21.1
2. Cohasset Associates, Inc.
NOTES
Avoiding Corporate Alzheimer’s
RIM Policies
and
Practices
Storage
Technology
Media
Management
Conversion
What Do We Need?
• RIM program which includes
o Standards, policies and practices
o Clearly defined roles and responsibilities: Legal; RIM; IT; Users
o Technology solutions
o Business process analysis and review
o Training and communications
o Monitoring and auditing
• Application of retention schedules to
o Dispose of records in the normal course of business
o Support eDiscovery
o Minimize risk
o Reduce volumes of information and data to be “preserved”
Eliminating Corporate Alzheimer’s ‐
Eliminating Corporate Alzheimer’s ‐
Standards and Policies for
Supporting Corporate Memory
Supporting Corporate Memory
Mariella Guercio,
University of Rome Sapienza
2012 Managing Electronic Records Conference 21.2
3. Cohasset Associates, Inc.
NOTES
Why Standards are Relevant for
Digital Records
• To limit the fragmentation induced by the
present and future digital ubiquity
• To make effectively available the needed
information/records
• To support retention and disposal and reduce
costs and risks for storage
• To set controls and measures for conducting
internal audits
• To ensure interoperability
7
Why Standards are Relevant for
Digital Records
• To promote the automation of the processes
and make them sustainable
• To support the creator’s accountability and
efficiency through the records adequate
organization
• To limit the present drift which has transformed
any individual into an information manager
8
… and why their contradictions make them
still not efficient
• Too many but not always those required as in
the case of
• ERMS standards developed by ISO, by ICA, by
DLM Forum at international level or by national
bodies
• Trusted digital repositories (ISO 16363 but also
ISO 17068 and DRAMBORA recommendations
• Too complex but also too generic in defining the
basic requirements
2012 Managing Electronic Records Conference 21.3
4. Cohasset Associates, Inc.
NOTES
… and why their contradictions make them
still not efficient
• Delayed with reference to the innovation processes but
also too controlled by the market trends
• Too rigid or too flexible but not enough smart and
manageable with respect to the aim of supporting the
routines
• Too often conflicting (even within the same standard body)
• More technology‐oriented than required (i.e. security
standards have been over‐estimated)
Creator’s Policies for Intermediating
Standards
• Procedures/manuals for records creation and
arrangement (classification and filing) at the
creation time
p gp y
• Policies for protecting privacy
• Policies for handling e‐mails records
• Retention policies including rules for transfers
Manuals for documentary procedures could be an
obligation for public administrations and a suggestion for
private sector (responsibilities and activities)
Procedures for transfer and e‐archiving
Basic Requirements to be Respected:
For Records Creation
• Unique identification based on persistent or at least
verifiable date references for any digital records and their
relevant components
g y
• Functional classification interconnected with filing system to
support the record function and their maintenance:
• the records within a file must share the same class code
• the functional relationships have a stable nature and this stability has to
be identified, maintained and proved over time
2012 Managing Electronic Records Conference 21.4
5. Cohasset Associates, Inc.
NOTES
Basic Requirements to be Respected:
For Transfer of Digital Records
•data transfer: how to transfer with specific reference to the “range of
technologies from which the transfers originate” and to the nature of
data,
p p (
•time of transfer: how to ensure the promptness (“as soon as
possible”) of transfer? how to develop sustainable negotiated
procedures within the organization?,
•internal organization of the data at the transfer time: normally not
packed for archiving reason at submission phase
•Transfer integrity: how to document the transfer and the eventual
changes required for intelligibility
How to Create Common Requirements for
Practical Solutions: GARP
The ARMA international initiative GARP – General Accepted
Recordkeeping Principles is based on
• the analysis of selected global bet practice resources:
• legal national requirements (i.e. the U.S. federal court
case law)
• national standards
• International standards: ISO 15489
• public comment process involving the professional RIM
communities
Corporate Alzheimer's: Prognosis
Corporate Al heimer s: Prognosis
Kenneth Thibodeau, Ph.D.
2012 Managing Electronic Records Conference 21.5
6. Cohasset Associates, Inc.
NOTES
Is There A Cure?
• There is no current cure for corporate Alzheimer's,
and
• It’s unlikely there will be a definitive cure any time
soon
• Open ended change in information and
communications technology
• Unpredictable creativity in how individual
organizations, governments, and society at large
use the technologies
Are There Effective
Treatments?
• Effective treatment must include a
combination of
o Policies, procedures and practices
• Technology
• People
Guidance on Policies,
Procedures and Practices
• ARMA, Generally Accepted Recordkeeping Principles
(GARP)
• International Council on Archives, ICA-Req: Principles
and functional requirements for records in electronic
office environments: guidelines and training material
(draft)
• Sedona Conference, THE SEDONA GUIDELINES: Best
Practice Guidelines & Commentary for Managing
Information & Records in the Electronic Age
18
2012 Managing Electronic Records Conference 21.6
7. Cohasset Associates, Inc.
NOTES
Technology:
Standards & Products
• Standards
o DoD 5015.2- STD, Records Management Applications (RMA)
o European Commission, Modular Requirements for Records
Systems(MoReq)
o Object Management Group, Records Management Services
Specification
• Product Classes
o Enterprise Content Management Applications
o Electronic Document/Records Management Systems
• Certified Products
o DoD certified Records Management Applications
o To Be: MoReq compliant products
o To Be: OMG RMS compliant products
19
People:
Technical Expertise v. Technical Judgment
Technical Expertise Technical Judgment
to develop, deploy, apply, to evaluate technological
Ability and adapt technological solutions both when
solutions proposed and in use
on the relationship of
Focus on technology technology to business
needs
in-depth knowledge of
broad familiarity with
Emphasis technologies used in specific
technologies
cases
must be supplemented by
Implementa- technical judgment to relies on technical expertise
tion determine the goodness of to get things done
solutions
20
Technical Judgment:
Requirements Management
21
2012 Managing Electronic Records Conference 21.7
8. Cohasset Associates, Inc.
NOTES
Technical Judgment:
Requirements & Perceptions
22
Mitigating Corporate Alzheimer’s
g p y
through a Trusted Repository
From Theory to Practice
Charles Dollar
Dollar Consulting
Trusted Digital Repository Basics
• Standards Based
o ISO 14721
o ISO 16363
• Keep Bit Streams Alive
• Reproducible v. Processible
• Migration Accepted Strategy
• Open Standard Technology Neutral Formats
• Where to Begin and How Far to Go
2012 Managing Electronic Records Conference 21.8
10. Cohasset Associates, Inc.
NOTES
DPCMM Components
DPCMM Performance Metrics ‐
DPCMM Performance Metrics ‐
Strategy
0 No formal strategy to address format technology obsolescence exists
1 Accept electronic records in their native format and support transformation
of records in one native format to open standard technology neutral format
2 Accept electronic records in open standard technology neutral
“preservation ready” file formats and supports transformation of three
preservation-ready
native file formats to open standard technology neutral file formats
3 Advise records producers to use preservation-ready file formats and
support transformation of ten native file formats to open technology neutral
file formats
4 All electronic records in native formats are transformed to available
interoperable open standard technology neutral file formats
Digital Preservation Score Card
2012 Managing Electronic Records Conference 21.10
11. Cohasset Associates, Inc.
NOTES
Digital Preservation Improvement
Strategy (1)
Digital Preservation Improvement
Strategy (2)
Follow DPCMM on
www.savingthedigitalworld.org
2012 Managing Electronic Records Conference 21.11
12. Cohasset Associates, Inc.
NOTES
Preventing Corporate
Alzheimer’s with Digital
Continuity
Adrian Cunningham
Director, Digital Archives Program
Managing Electronic Records Conference, Chicago, 8 May 2012
Queensland State Archives
Department of Public Works 34
What is the Problem?
What is the Problem?
• Unsustainably massive quantities of poorly
managed data
• Lots of record-making systems, too few record-
keeping systems
• Disconnect between business processes and
recordkeeping (e.g. reliance on printing-to-paper)
• Organisations often don’t know what information
they have got
• Vital records can be hard to identify
• Risk of loss due to technological obsolescence
QSA Response: Digital Continuity
• the ability to use digital records for as long as required
and through organisational, business & technological
changes.
• is more than simply preserving digital records
• requires a range of good records and information
management policies and practices, including good
metadata
• needs good recordkeeping to be an organic part of
business
• includes infrastructure, tools, policies and processes.
Digital Continuity is about ensuring ongoing access
to essential evidence
2012 Managing Electronic Records Conference 21.12
13. Cohasset Associates, Inc.
NOTES
Digital Recordkeeping U
Digital Recordkeeping Universe
Digital Recordkeeping
in Government
(Government Recordkeeping)
Digital Continuity:
for records that need
to be kept for 5 years+
Digital Archi es
Archives:
for permanent digital records
Digital Preservation
Digital Continuity – Activity so Far
Digital Continuity – Activity so Far
• Team of two staff established April 2010
• Director, Digital Archives Program commenced May 2011
• Team of nine staff as of May 2012
Publications:
• Digital Archiving Discussion Paper – May 2010
• Digital Archiving Survey – August 2010
• Digital Continuity Report – May 2011
• Public Records Brief Keeping Digital Records Useable: Ten steps for
ensuring the continued accessibility of digital records – June 2011
• Guidelines on: Metadata for Digital Continuity and Migrating Digital
Records – April 2012.
Digital Continuity Plan
Objective Future-proof the digital records of government business
Queensland digital public records will be authentic, accessible and useable for
as long as public authorities and the people of Queensland require them.
Principles
p
Digital Continuity approaches will -
• be proactive
• be sustainable
• preserve the authenticity of records
• maximise access options for users
• be standards compliant
2012 Managing Electronic Records Conference 21.13
14. Cohasset Associates, Inc.
NOTES
Digital Continuity: Draft Strategies
[subject to funding bid]
1. Develop digital continuity capabilities across
government.
2. Ensure public authorities have access to digital
continuity services tools policies and guidance
services, tools,
for enabling ongoing access to digital records in
their custody.
3. Establish digital archives infrastructure to ensure
the ongoing authenticity, accessibility and
usability of permanent-value digital public
records.
Delivering Digital Continuity
Digital Continuity in public authorities
a policy regime and funded infrastructure
Digital Continuity:
for records that need
to be kept for 5 years+
with Cabinet endorsement – using QSA
guidelines and standards
requires major whole-of-government
change management
possible solutions:
• whole-of-government shared service
• panel of accredited service providers
• agency in-house solutions audited by QSA
Delivering Digital Continuity
End-to-End Industrial-Scale Digital Archives
integration with current paper archives and
processes
Digital Archives:
for permanent digital records
reinventing QSA - major i t
i ti j internal change
l h
management program
Digital Preservation
• Trusted Digital Repository:
• tools and processes for transfer/ingest
• preservation infrastructure, tools &
processes
• archival control system
• access and use
2012 Managing Electronic Records Conference 21.14
15. Cohasset Associates, Inc.
NOTES
And … an invitation
And … an invitation
• Come to Brisbane, Qld for the International Congress on
Archives, 20-24 August
43
Some Final Thoughts
• Digital preservation is not just for archivists
• Information management strategies must address
preservation issues
• Technology will continue to change and the need to
ensure access and use will still exist
• Storing everything because memory is cheap is NOT a
good strategy given preservation costs
• Organizing and eliminating information will reduce
preservation costs
• Get rid of what you don’t need as part of your regular
business activities….don’t wait
44
Moving Towards 2020
• Take responsibility for looking ahead: You are part of the
solution!!!
• Ask the right people to get the right answers about
information management and information governance
• Collaborate to address technological change: Build a
cross functional team of stakeholders: Senior
management; RIM; IT; Archivists; Legal; Business
• Address the legacy of poorly managed electronic records
through risk-based assessment and disposition
• Link RIM to business through process management
45
2012 Managing Electronic Records Conference 21.15