Remove Blog Remove Document Remove ROT Remove Security
article thumbnail

ESI, ROT, and LBJ – Thoughts on Data Management While Visiting the Lyndon Johnson Presidential Library: eDiscovery Trends

eDiscovery Daily

Editor’s Note: If you love to read blogs about eDiscovery, you’ve undoubtedly read posts and articles by Jim Gill. Without a doubt, the most frequent type of case we’ve covered on the eDiscovery Daily blog has had to do with sanctions for spoliation of ESI. So, we’re excited to have Jim providing some guest posts for eDiscovery Daily!

ROT 34
article thumbnail

How to Perform a Content Migration - Your Checklist for Success

AIIM

In this blog post, we present an approach and checklist for migrating your information from one system to another. Information Management Specialists: A given migration could require advice and support from records managers, knowledge managers, document managers or document controllers, privacy and data protection specialists, and others.

Metadata 104
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tech Tuesday: Getting Started with Classification

Everteam

Imagine trying to find a document among thousands of documents spread across multiple file shares, or file-sharing applications. Maybe you know what the document is called, or maybe you only know what its contents hold. Maybe there are multiple versions of the document or multiple copies stored by other departments.

ROT 40
article thumbnail

4 Steps in Streamlining Open Records Requests

Gimmal

Data maps outline the types of information stored by your organization, where those documents and records are located, and who has access to them. Do your data stores contain consistent confidential information or other exceptions such as social security numbers or identifiable health information, both of which should be excluded.

FOIA 52
article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This “anytime, anywhere” aspect is possible by merging traditional RIM practices of document and records lifecycle management and DT, but with a focus on how to “package” the content to deliver a product or service. Before, travellers booked their trips through agents, who issued paper tickets, confirmations, car-rental documents, and so on.

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

Marketing teams can create and share marketing content such as online blog posts, white papers, e-books, or short videos that can be posted on social media platforms and targeted towards various audiences. Organizations use DRM technologies and solutions to securely manage intellectual property (IP) rights and monetize the content.

article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

“Commissioned by organizers to predict worst-case scenarios for the Munich games, [Georg] Sieber came up with a range of possibilities, from explosions to plane crashes, for which security teams should be prepared. Mobile devices allow users to access content from anywhere, which presents security and privacy risks. 2020, p 1).