article thumbnail

Information Governance and the Records Lifecycle

The Texas Record

After a document is captured, employees collaborate by adding data, editing information, approving or denying requests, adding metadata, etc. Mine that data for customer insights or share data to collaborate within your governmental entity, with other agencies, and/or with stakeholders. Extra Phases. Collaboration. Version Control.

article thumbnail

else 2.24: “This is how revolutions begin”

John Battelle's Searchblog

This week we thought about paid peering, fiber, and privacy in a lot of different contexts. Real names or not, the value is in the usage metadata. Mining for efficiency and effectiveness gains, but it all sounds a little creepy, too. So how do we feel about Google controlling the pipes and the content?

Mining 64
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

31 Letters to Santa from ECM Users

AIIM

I want a new football game and football because my little brother always tries to steal mine. Digital Transformation is fairly advanced in the Bank but ECM is trailing behind and not well understood, especially from a metadata perspective.”. “AI Let’s get down to business.”. Dear Santa. How are you and the reindeer doing?

ECM 83
article thumbnail

Do You Have the Right Stuff to Transition to Information Governance?

ARMA International

That’s no coincidence because the tenets of records management are encompassed within IG (along with legal, privacy, risk/compliance, security, technology, etc.). A client of mine in the construction industry recognized that its enterprise resource planning (ERP) system was in dire need of replacement. A Real-World Example.

article thumbnail

2019 eDiscovery Case Law Year in Review, Part 2

eDiscovery Daily

Contesting the case, Six Flags argued it couldn’t be held liable unless the plaintiff demonstrated a tangible injury from the unauthorized collection, often a difficult task in privacy lawsuits. Here is one such case from 2019: Court Denies Defendant’s Motion to Compel Production of Documents and Metadata : In Washington v. Stay tuned!

article thumbnail

Part 1: OMG! Not another digital transformation article! Is it about understanding the business drivers?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. This can also include customer’s expectations such as intuitive navigation, faceted search, search experience, multi-language support, web accessibility, customer privacy, tracking cookies, and marketing opt-out.

article thumbnail

Part 2: OMG! Not another digital transformation article! Is it about the evolution from RIM to Content Services?

ARMA International

This part will also discuss managing CS risks such as ransomware, privacy, change management, and user adoption. Since the content has business value, then IG, compliance, security, and privacy are critical considerations when delivering it to business users and customers as a new product or service. Introduction.