article thumbnail

Information Governance and the Records Lifecycle

The Texas Record

For example, a completed W4 form is a record , and it provides information about an employee’s tax withholding preferences. Source: Texas State Library and Archives Commission. For example, you may write a report (creation), or you may receive a complaint via email (receipt). Holds / Discovery.

article thumbnail

Authenticating Communication Screenshots

eDiscovery Daily

Rule 901(b) of the Federal Rules of Evidence offers examples of authenticating all forms of digital evidence. The following are examples that are most applicable to screenshots of text messages: Testimony of a Witness with Knowledge. Blake, “Social Media Evidence at Trial,” The People’s Law Library of Maryland, May 19, 2021, [link]. [6]

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The whole sector needs to work together

CILIP

THE choice was either to teach a procurement expert about libraries or to teach a librarian about procurement. so making that framework more appropriate to the library sector. One aim is to find flexibility and grow common ground between suppliers and university libraries. For example ask ?can can you do this??

article thumbnail

Practical solutions for a single digital presence

CILIP

THE British Library (BL) does not have statutory responsibility for public library policy. for public libraries? Instead it started with the values of public libraries and also the value of having professional librarians. The report, Digital Transformation for UK Public Libraries: five approaches to a ?single

article thumbnail

SAA/NAGARA/COSA 2018 Recap: Session 201

The Schedule

Katherine O’Neil from the Manuscript Division of Library of Congress described the process of identifying email within their collections. Roger Christman from the Library of VA spoke about the Tim Kaine email collection. EPadd has also modeled integration with Archivematica via a partnership with New York Public Library.

article thumbnail

ATMitch: New Evidence Spotted In The Wild

Security Affairs

The recent, unattended discovery of such kind of sample within the Info-Sec community led us to a deep dive into this particular malware tool, spearhead of a sophisticated cyber arsenal. Figure 5: “msxfs.dll”, library required by malware to communicate with ATM device. Technical Analysis.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

For example, once a health record has met the regulatory requirements, the record can be anonymized and kept for years for such purposes as medical research and predictive analytics. See Table 1 listing some common examples of the “art of the possible. Booking online and getting e-tickets and confirmations on a smart phone are normal.