Remove 11
article thumbnail

Documentation Theory for Information Governance

ARMA International

This article aims to consider what a documentary focus can offer to the practices and understandings of information governance. It instead provides a different, indeed overlooked, angle – a documentary focus – in which to situate discussions and practices with information. A Documentary Approach.

article thumbnail

AIIM vs. ARMA: An Honest Comparison of Membership

AIIM

As a paid professional member of both since 2001 – August 2001 for AIIM, September 2001 for ARMA, and having served on both organizations’ Board of Directors (2004-2005 for AIIM, 2007-2010 for ARMA), I have thoughts on both and will compare them in several key areas, including: Focus. Types of Membership. Cost of Membership.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Another Commentary from The Sedona Conference: eDiscovery Best Practices

eDiscovery Daily

Much has changed in the law and technology since The Sedona Conference published the First Edition of this Commentary back in September 2010 (hey, that’s when this blog was founded!). Thursday, TSC’s WG1 group announced its Commentary on Legal Holds, Second Edition: The Trigger & The Process. So, what do you think?

article thumbnail

The Burden of Privacy In Discovery

Data Matters

11 As the Advisory Committee’s Note to the 1983 Amendment explained, the amended Rule sought to “prevent use of discovery to wage a war of attrition or as a device to coerce a party, whether financially weak or affluent.”12 11 See, e.g. , Am. 111, 127 (2010). Bar Ass’n Section of Litig., Knapp, Enforcement of U.S. GlobalL. &

Privacy 97
article thumbnail

Part 3: OMG! Not another digital transformation article! Is it about effecting risk management and change management?

ARMA International

Take the example of the pandemic: only some governments engaged pandemic experts to develop actions plans. As the owner of this information, the organization’s responsibility extends beyond its own walls to include protecting any information that a third party (e.g., Information Governance Body of Knowledge (iGBoK), 1st ed.,