article thumbnail

Building the Relationship Between RM and IT

The Texas Record

Whether it’s creating and securing electronic records or establishing a process to capture records from social media sites, records managers often find themselves working closely with their Information Technology (IT) Departments. IT view archives as the location where information is housed. So they approached me first.

IT 60
article thumbnail

AIIM's Information Management Training - Cost, Options, and FAQs

AIIM

Today we offer a number of courses, each focused on different aspects of information management and targeting different roles and perspectives. It is targeted to information professionals who need an introduction to these topics to understand their business impact. It turns out that that’s not the case.

ECM 116
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Are the Best Practices for Email Management?

AIIM

Everyone uses it, often as a filing system rather than as a simple communications mechanism. These integrations can often automate the capture of metadata and email specific information such as subject or sent date, along with any attachments, CC:’s or BCC:’s. Studies show that the average employee sends and receives anywhere from 100?200+

article thumbnail

Build and Sustain Your Records Program with a Records Management Playbook

ARMA International

What would happen to your records program? How long would it take your organization to rebuild the team from scratch? If you had a records management playbook in place, your newly hired team could hit the ground running! What is a Playbook? So how is this different from a standard operating procedures (SOP) manual? What the Playbook is Not.

article thumbnail

Cyber Blackmail: More Than Just Ransomware

The Texas Record

The plethora of attacks has sent security professionals and system administrators scrambling to ensure their systems and backups are safe, and executives taking a second look at their cyber security programs. We continue to invent new technologies at an exponential rate. Retrieved from CNBC: [link]. [7] 7] Larkin, M.