SlideShare a Scribd company logo
1 of 24
Why ERM?
Electronic Records Management
Topics
• ERM in Context
• The Problem
• The Solution
• The Challenges
• The Benefits
ERM in Context
Governance Framework
• Governance
• Decisions and directives (policies)
• Risk Management
• Procedures and guidelines implementing boundary restraints
• Compliance
• Assessments of adherence to policies, procedures, directives
Governance Framework
• GRC - Governance, Risk Management, Compliance
• IG - Information Governance
• RIM - Records and Information Management
• ERM - Electronic Records Management
Why ERM?
• Up to 90% of records today are born digital*
• ERM is key component of robust RIM Program
• RIM is foundational to Information Governance
• IG supports institutional GRC
* http://www.clir.org/pubs/reports/reports/pub149/pub149.pdf
The Problem
How to Get From Here……
……To There
Are You Experiencing…
• Unmanaged records in legacy systems
• Disparate, siloed document repositories
• No system-wide standard index or metadata
• No recognized executive sponsor of program
• Uncertainty regarding email as a record
• Few to no practical means to enforce retention
…Any of These Symptons?
• Difficulty demonstrating adherence to policies
• Lack of training or awareness of policies
• Ineffective legal (litigation) hold implementation
• Lack of sure-fire method of total e-discovery
• Lengthy response time to Open Records requests
• Random, undocumented application of disposition
If Yes, GoTo ERM!
• Definition of ERM
• Application of principles of records management to electronic
records:
Any form of digitally recorded material generated, transmitted, received
and/or stored that is designated a record by data owner or law, based on content
and/or subject matter. This includes but is not limited to electronic digital
interchange, email, digital/text voice messages, instant messages and text
messages.
• Can apply to mangement of electronic records, or to electronically
managing non-digital records
The Solution
ERM Solution
• ERM as Technology
• ERM as Process
• ERM as Perspective
ERM - Technology
Examples of DoD5015.2-certified RMAs
• IBM Enterprise Records 5.1
• Open Text Records Management
• EMC Documentum Records Manager 6.7
• Gimmal Compliance Suite for MS SharePoint 2010
• HP Automony Records Manager 12.6 and HP TRIM
• Feith Systems BrideLogiQ RMA v9
• Oracle WebCenter Content: Records
• Alfresco Records Management 2.0.3
• Laserfiche Records Management Edition 9
• ZL Unified Archive
ERM - Process
• Capture process - direct ingestion or scan paper
• Tagging process - auto, user, or records staff
• Search process - by category, key word, security
• Production process - download, attach, print
• Disposition process - record of deletion, approval
ERM - Philosophy
• Accepting electronic records as official copy
• Accepting change in work habits
• Accepting digital methods of authorization
• Accepting time and volume contraints on digital
workspaces
The Challenges
Windows 255-character limit on file names
Password
protection
Case management Hidden
zipped
files
Naming
conventions
Reality Checks
• No Pain, No Gain
• Business Process Analysis and Change Management
• Funding Justification
• Implementation Cost + Training + Ongoing Operational Costs
• IT Resources and Security
• Server Space + Annual Licenses + Database Hygiene + Profile Management
• Realistic Metrics to Gauge Effectiveness
• Quicker Response, Greater Confidence of Retrieval, Better Audit Trails
GARP® Maturity Model
A - Accountability
T - Transparency
I - Integrity
P - Protection
C - Compliance
A - Availability
R - Retention
D - Disposition
The Benefits
Benefits of ERM
• Standardized Record Classification (Tags)
• One-Stop Shop for E-Discovery of Records
• Auditable Retention and Disposition Processes
• Tighter Control of Legal Holds and Releases
• Permits Time-Based Auto-Delete of Non-Record or
Transitory Information Repositories
Do You Need ERM?
• ERM requires people, process, technology
• ERM is key component of RIM Program
• ERM supports goals of Information Governance
• ERM satisfies GRC drivers:
• Governance - Records management and retention Policies
• Risk Management - Data loss prevention, documented legal holds
• Compliance - Auditable controls for access, retention, disposition
Yes, You Do!
Then go on vacation.

More Related Content

What's hot

CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentSam Bowne
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and TestingSam Bowne
 
Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)SOLOMON M KAMINDA
 
Sensor-Enabled MRO Decision-Making
Sensor-Enabled MRO Decision-Making Sensor-Enabled MRO Decision-Making
Sensor-Enabled MRO Decision-Making ICSA, LLC
 
Securus records management corporate presentation
Securus records management corporate presentation Securus records management corporate presentation
Securus records management corporate presentation Abhishek Upadhyay
 
Presentation arsip nov 2012 frans smit handout
Presentation arsip nov 2012 frans smit handoutPresentation arsip nov 2012 frans smit handout
Presentation arsip nov 2012 frans smit handoutGemeente Almere
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...ARMA International
 
Remote Infrastructure Management Services
Remote Infrastructure Management ServicesRemote Infrastructure Management Services
Remote Infrastructure Management ServicesKryptos Technologies
 
Best document management software
Best document management softwareBest document management software
Best document management softwaresunsmart-chennai
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigitalMalcolm-John Bell
 
Remote Infrastructure Management
Remote Infrastructure ManagementRemote Infrastructure Management
Remote Infrastructure ManagementPrime Infoserv
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecuritySam Bowne
 
NPMA Physical Inventory - Beyond Scanning and Checking the Box
NPMA Physical Inventory - Beyond Scanning and Checking the BoxNPMA Physical Inventory - Beyond Scanning and Checking the Box
NPMA Physical Inventory - Beyond Scanning and Checking the BoxMarla Williams
 

What's hot (16)

CNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy DevelopmentCNIT 160: Ch 2b: Security Strategy Development
CNIT 160: Ch 2b: Security Strategy Development
 
6. Security Assessment and Testing
6. Security Assessment and Testing6. Security Assessment and Testing
6. Security Assessment and Testing
 
Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)
 
Sensor-Enabled MRO Decision-Making
Sensor-Enabled MRO Decision-Making Sensor-Enabled MRO Decision-Making
Sensor-Enabled MRO Decision-Making
 
Securus records management corporate presentation
Securus records management corporate presentation Securus records management corporate presentation
Securus records management corporate presentation
 
Presentation arsip nov 2012 frans smit handout
Presentation arsip nov 2012 frans smit handoutPresentation arsip nov 2012 frans smit handout
Presentation arsip nov 2012 frans smit handout
 
Afl rim capabilities
Afl rim capabilitiesAfl rim capabilities
Afl rim capabilities
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
 
Remote Infrastructure Management Services
Remote Infrastructure Management ServicesRemote Infrastructure Management Services
Remote Infrastructure Management Services
 
[EN] Trends in Records Management, Archiving and Digital Preservation | Abbot...
[EN] Trends in Records Management, Archiving and Digital Preservation | Abbot...[EN] Trends in Records Management, Archiving and Digital Preservation | Abbot...
[EN] Trends in Records Management, Archiving and Digital Preservation | Abbot...
 
Best document management software
Best document management softwareBest document management software
Best document management software
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital03FT_ManagedServicesBrochure_HRdigital
03FT_ManagedServicesBrochure_HRdigital
 
Remote Infrastructure Management
Remote Infrastructure ManagementRemote Infrastructure Management
Remote Infrastructure Management
 
CNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset SecurityCNIT 125 Ch 3. Asset Security
CNIT 125 Ch 3. Asset Security
 
NPMA Physical Inventory - Beyond Scanning and Checking the Box
NPMA Physical Inventory - Beyond Scanning and Checking the BoxNPMA Physical Inventory - Beyond Scanning and Checking the Box
NPMA Physical Inventory - Beyond Scanning and Checking the Box
 

Similar to Why_ERM

Reduce Cost, Time, and Risk – eDiscovery and Records Management in SharePoint
Reduce Cost, Time, and Risk – eDiscovery and Records Management in SharePointReduce Cost, Time, and Risk – eDiscovery and Records Management in SharePoint
Reduce Cost, Time, and Risk – eDiscovery and Records Management in SharePointConcept Searching, Inc
 
[AIIM17] Facilitating Business Process Improvement in Information Management...
[AIIM17]  Facilitating Business Process Improvement in Information Management...[AIIM17]  Facilitating Business Process Improvement in Information Management...
[AIIM17] Facilitating Business Process Improvement in Information Management...AIIM International
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceHernan Huwyler, MBA CPA
 
Getting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help YouGetting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help YouInnoTech
 
SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology Sonny Thai
 
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...AIIM International
 
The records and information management program
The records and information management programThe records and information management program
The records and information management programGizelle Dela Cruz
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsSam Bowne
 
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...Adlib - The PDF Experts
 
OAUG 05-2009-MDM-1683-A Fiteni CPA, CMA
OAUG 05-2009-MDM-1683-A Fiteni CPA, CMAOAUG 05-2009-MDM-1683-A Fiteni CPA, CMA
OAUG 05-2009-MDM-1683-A Fiteni CPA, CMAAlex Fiteni
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterForgeRock
 
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...LN Mishra CBAP
 
The art of information architecture in Office 365
The art of information architecture in Office 365The art of information architecture in Office 365
The art of information architecture in Office 365Simon Rawson
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...Health IT Conference – iHT2
 

Similar to Why_ERM (20)

Digital documents & e-discovery
Digital documents & e-discovery Digital documents & e-discovery
Digital documents & e-discovery
 
Reduce Cost, Time, and Risk – eDiscovery and Records Management in SharePoint
Reduce Cost, Time, and Risk – eDiscovery and Records Management in SharePointReduce Cost, Time, and Risk – eDiscovery and Records Management in SharePoint
Reduce Cost, Time, and Risk – eDiscovery and Records Management in SharePoint
 
[AIIM17] Facilitating Business Process Improvement in Information Management...
[AIIM17]  Facilitating Business Process Improvement in Information Management...[AIIM17]  Facilitating Business Process Improvement in Information Management...
[AIIM17] Facilitating Business Process Improvement in Information Management...
 
E-discovery
E-discoveryE-discovery
E-discovery
 
Accelerating the Path to GDPR Compliance
Accelerating the Path to GDPR ComplianceAccelerating the Path to GDPR Compliance
Accelerating the Path to GDPR Compliance
 
Getting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help YouGetting to Know Enterprise Content Management (ECM) and How It Can Help You
Getting to Know Enterprise Content Management (ECM) and How It Can Help You
 
SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology SharePoint 2013 ECM & Methodology
SharePoint 2013 ECM & Methodology
 
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
[AIIM18] Can Unstructured Anarchy be Governed? How We Conquered Google Land -...
 
GRC– The Way Forward
GRC– The Way ForwardGRC– The Way Forward
GRC– The Way Forward
 
ECM capabilities
ECM capabilitiesECM capabilities
ECM capabilities
 
DAMA June 2017 User Group presentation on ECM
DAMA June 2017 User Group presentation on ECMDAMA June 2017 User Group presentation on ECM
DAMA June 2017 User Group presentation on ECM
 
The records and information management program
The records and information management programThe records and information management program
The records and information management program
 
CNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security ProgramsCNIT 160 Ch 4a: Information Security Programs
CNIT 160 Ch 4a: Information Security Programs
 
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
PRESENTATION: Capture. Compliance. Centralization. How Advanced Rendering Del...
 
OAUG 05-2009-MDM-1683-A Fiteni CPA, CMA
OAUG 05-2009-MDM-1683-A Fiteni CPA, CMAOAUG 05-2009-MDM-1683-A Fiteni CPA, CMA
OAUG 05-2009-MDM-1683-A Fiteni CPA, CMA
 
A Study in Borderless Over Perimeter
A Study in Borderless Over PerimeterA Study in Borderless Over Perimeter
A Study in Borderless Over Perimeter
 
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
GRCPerfect - Enterprise Project Governance, Risk and Compliance Management Sy...
 
The art of information architecture in Office 365
The art of information architecture in Office 365The art of information architecture in Office 365
The art of information architecture in Office 365
 
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
CHIME LEAD New York 2014 "Case Studies from the Field: Putting Cyber Security...
 
IF Corporate brochure
IF Corporate brochureIF Corporate brochure
IF Corporate brochure
 

Why_ERM

  • 2. Topics • ERM in Context • The Problem • The Solution • The Challenges • The Benefits
  • 4. Governance Framework • Governance • Decisions and directives (policies) • Risk Management • Procedures and guidelines implementing boundary restraints • Compliance • Assessments of adherence to policies, procedures, directives
  • 5. Governance Framework • GRC - Governance, Risk Management, Compliance • IG - Information Governance • RIM - Records and Information Management • ERM - Electronic Records Management
  • 6. Why ERM? • Up to 90% of records today are born digital* • ERM is key component of robust RIM Program • RIM is foundational to Information Governance • IG supports institutional GRC * http://www.clir.org/pubs/reports/reports/pub149/pub149.pdf
  • 8. How to Get From Here…… ……To There
  • 9. Are You Experiencing… • Unmanaged records in legacy systems • Disparate, siloed document repositories • No system-wide standard index or metadata • No recognized executive sponsor of program • Uncertainty regarding email as a record • Few to no practical means to enforce retention
  • 10. …Any of These Symptons? • Difficulty demonstrating adherence to policies • Lack of training or awareness of policies • Ineffective legal (litigation) hold implementation • Lack of sure-fire method of total e-discovery • Lengthy response time to Open Records requests • Random, undocumented application of disposition
  • 11. If Yes, GoTo ERM! • Definition of ERM • Application of principles of records management to electronic records: Any form of digitally recorded material generated, transmitted, received and/or stored that is designated a record by data owner or law, based on content and/or subject matter. This includes but is not limited to electronic digital interchange, email, digital/text voice messages, instant messages and text messages. • Can apply to mangement of electronic records, or to electronically managing non-digital records
  • 13. ERM Solution • ERM as Technology • ERM as Process • ERM as Perspective
  • 14. ERM - Technology Examples of DoD5015.2-certified RMAs • IBM Enterprise Records 5.1 • Open Text Records Management • EMC Documentum Records Manager 6.7 • Gimmal Compliance Suite for MS SharePoint 2010 • HP Automony Records Manager 12.6 and HP TRIM • Feith Systems BrideLogiQ RMA v9 • Oracle WebCenter Content: Records • Alfresco Records Management 2.0.3 • Laserfiche Records Management Edition 9 • ZL Unified Archive
  • 15. ERM - Process • Capture process - direct ingestion or scan paper • Tagging process - auto, user, or records staff • Search process - by category, key word, security • Production process - download, attach, print • Disposition process - record of deletion, approval
  • 16. ERM - Philosophy • Accepting electronic records as official copy • Accepting change in work habits • Accepting digital methods of authorization • Accepting time and volume contraints on digital workspaces
  • 18. Windows 255-character limit on file names Password protection Case management Hidden zipped files Naming conventions
  • 19. Reality Checks • No Pain, No Gain • Business Process Analysis and Change Management • Funding Justification • Implementation Cost + Training + Ongoing Operational Costs • IT Resources and Security • Server Space + Annual Licenses + Database Hygiene + Profile Management • Realistic Metrics to Gauge Effectiveness • Quicker Response, Greater Confidence of Retrieval, Better Audit Trails
  • 20. GARP® Maturity Model A - Accountability T - Transparency I - Integrity P - Protection C - Compliance A - Availability R - Retention D - Disposition
  • 22. Benefits of ERM • Standardized Record Classification (Tags) • One-Stop Shop for E-Discovery of Records • Auditable Retention and Disposition Processes • Tighter Control of Legal Holds and Releases • Permits Time-Based Auto-Delete of Non-Record or Transitory Information Repositories
  • 23. Do You Need ERM? • ERM requires people, process, technology • ERM is key component of RIM Program • ERM supports goals of Information Governance • ERM satisfies GRC drivers: • Governance - Records management and retention Policies • Risk Management - Data loss prevention, documented legal holds • Compliance - Auditable controls for access, retention, disposition
  • 24. Yes, You Do! Then go on vacation.