Information Management

Professional journal on records and information management.

Articles from Vol. 37, No. 2, March/April

Americans Call E-Mail Essential to Their Jobs
Americans are not really being inundated with e-mail messages. In fact, if you feel overwhelmed by the volume of e-mail you receive at work, you are among a very small group. A recent study by the Pew Internet and American Life Project found that overwhelming...
Book Review: The ABCs of HIPAA Compliance
TITLE: HIPAA Privacy Essentials and HIPAA Privacy Implementation Guide AUTHOR: Privacy Council ISBN: 1-932214-04-60 (Essentials); 1-9322]A-05-4 (Implementation) PUBLISHER: Privacy Council PUBLICATION DATE: 2002 LENGTH: 373 pages and 452 pages PRICE:...
British Slow to Use E-Government Services
Britain is one of a few nations that has set explicit targets for making all government services available electronically but, much to its chagrin, British citizens are not using them. And worse, usage of e-government services has not grown in the past...
Business Leaders Form Ethics Organization
In light of recent scandals that have plagued corporate America and revelations about morally repugnant business leaders who have laid off employees even while they have charged thousand-dollar shower curtains to the company expense account, perhaps...
Canadians' Privacy at Risk
In his 2001-2002 Annual Report to Parliament, George Radwanski, the privacy commissioner of Canada, issued a "solemn and urgent warning" that the Canadian government is walking down a path that threatens citizens' key privacy rights. In what he calls...
Data-Mining Initiatives
To harness the vast information flow generated each day, computer scientists are developing sophisticated software that can instantly mine streaming data without ever needing to archive it. According to The Christian Science Monitor, specialists worldwide...
Don't Hit That Delete Button!
If your inbox is harboring incriminating e-mails, do not delete them. Five Wall Street investment firms recently agreed to pay $1.65 million each to settle charges that they failed to properly retain e-mail messages requested by regulators. The Securities...
E-Mails Can and Will Be Held against You
It is just commonsense that you should never e-mail something that you wouldn't want your boss to see. But today, you should also remember never to e-mail anything that could be used against you in court. A U.S. federal judge recently ruled that e-mails...
FBI Works to Better Manage Its Records
After recent criticism of the Federal Bureau of Investigation's (FBI) records management skills, the bureau has begun working to clean up its act by creating a records management division. "We need to figure out how to manage our case files effectively,"...
MIT's Super Archive
Each year, Massachusetts Institute of Technology (MIT) researchers create at least 10,000 papers, data files, images, collections of field notes, and audio and video clips. Much of the material is published in professional journals, but the rest is ferreted...
More Information Could Mean Less Privacy
President Bush signed the E-Government Act to enhance public access to information after authorizing Homeland Security legislation that may threaten privacy As 2002 drew to a close, the Bush administration and the U.S. Congress completed work on two...
MoReq: The Standard of the Future?
SettinqStandards Want to understand what electronic records management systems (ERMS) should do? The Model Requirements for the Management of Electronic Records (MoReq) is a good place to start. At the Core This article * defines and explains the MoReq...
Protecting Records - What the Standards Tell Us
ManagementWise Key standards have been developed that aid in determining the best methods, rationale, environment, and housing for protecting valuable records At the Core This article * discusses key standards that comprise a good foundation for records...
Smile: You're on V-Mail
According to Forrester Research, 94 percent of Internet users send an e-mail at least once a week, and 41 percent send pictures via e-mail once a week. It is no surprise, then, that video mail, more commonly called "v-mail," a technology that combines...
So You Want to Implement Automatic Categorization?
TechTrends Automatic categorization can be a powerful tool despite its limitations, but it is still important to test and evaluate before making a commitment to using it The massive amounts of data available through the Internet, extranets, and internal...
Spam Costs Businesses $13 Billion Annually
A British e-mail filtering firm reports that there will be more spam than real e-mail in 2003 and that it will cost businesses billions. MessageLabs Software's annual statistics also revealed that one in every 212 e-mails contains a computer virus. MessageLabs,...
The Legislation That Roared
If you don't know the significance of April 14, 2003, then you should find this issue of The Information Management Journal particularly enlightening. April 14 is the deadline by which most healthcare organizations must be in compliance with the Health...
The Truth about Taxonomies
At the Core This article > defines a taxonomy > explains how an organization can use and develop taxonomies > identifies types of taxonomies Imagine opening up file cabinet drawers, credenzas, or desk drawers and seeing papers and materials...
Tragedies, Controversies, and Opportunities: Redefining RIM's Role in a Turbulent Time
Given recent issues and critical developments, the central importance of information to the operation and progress of organizations and institutions is even more apparent Systematic management of information, an area where records and information management...
Uncle Sam May Not Monitor E-Mails
Uncle Sam may not be monitoring your online purchases and e-mail messages anytime soon. The Bush administration's proposed plans for an Internet-wide network operations and monitoring center to detect and defend against major cyber attacks have been...
Video Review: Combating Computer Viruses
It's easy to take computers for granted. Most people forget how dependent individuals and businesses are on technology and how vulnerable they are because of that dependence that is, until they are attacked by a computer virus and have to watch helplessly...
What Every Business Needs to Know about HIPAA
"The Internet-fueled proliferation of data - and data availability - has created a paradox: Businesses demand the benefits of a technology-enabled world along with the relative anonymity, or privacy, that the pre-technology world provided. The government's...
White-Collar Crimes Will Get Harder Time
Under a new emergency plan approved by the U.S. Sentencing Commission, corporate criminals will receive longer prison sentences. The guidelines, which grew out of the flurry of frauds and corporate scandals at Enron, WorldCom, and other large corporations,...
Author Advanced search

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.