Information Management

Professional journal on records and information management.

Articles from Vol. 51, No. 5, September/October

A Conceptual Framework for UNDERSTANDING INFORMATION
Information science and the information professions are specifically concerned with the information communication chain, including its creation, generation, production, collection, organization, management, interpretation, analysis, storage, retrieval,...
A Snapshot of the IG Implications for BODY-WORN CAMERAS
Though accurately captured and properly managed digital video recordings of law enforcement-public interactions via body-worn cameras (BWCs) have great potential for creating objective data useful for legal system evidence, dispute resolution, historical...
Cisco Report Cites a Resurgence in Traditional Cyber Attacks
Cyber attacks have dramatically evolved and increased in magnitude of late, and they show no signs of slowing, according to Cisco's "Midyear Cybersecurity Report," published on July 20 and covered by ITWorldCanada.com.Traditional attacks such as spam,...
Common Flaws Make 55% of Corporate Networks Vulnerable
Infosecurity-magazine.com recently reported on a survey that suggests corporate information systems became more vulnerable last year, at the same time that user awareness about information security issues significantly decreased.The security audit, sponsored...
Employee Self-Selection of E-Mails Satisfies Discovery Obligations
The National Law Review reports that a federal court in an employment discrimination case has held that an employee's self-selection of e-mail messages for the purposes of discovery was appropriate.In Mirmina v Genpact, LLC, Civil Action No. 3:16-CV-00614...
EU Privacy Approval Would Ensure Data Transfers to Post-Brexit UK
Bloomberg BNA reports that UK lawmakers are seeking approval from the European Union that would allow easier data transfers after Brexit is effected; otherwise, British businesses will be at a "competitive disadvantage."After it leaves the European Union...
HBO Hack Highlights the Need for Encryption and Data Governance
The widely reported August hacking of HBO's systems resulted in 1.5 terabytes of data stolen, including unaired episodes of some of its programs. The CEO of AlertSec has told EsecurityPlanet.com the incident serves as a reminder that hacking isn't limited...
National Law Review Gives Guidance on Using Ephemeral Communications Tools
The issue of using ephemeral communications tools in the workplace is a legally complicated one, particularly when it comes to legal holds and e-discovery. A recent article on the National Law Review's online site spells out the risks and provides guidance...
New Jersey Shopper Privacy Bill Signed into Law
New Jersey Governor Chris Christie signed legislation that limits a retailer's ability to collect and use personal information ascertained from driver's licenses and other ID cards in an effort to crack down on data breaches and the sale of this information...
New Zealand's Privacy Mark Could Provide 'Competitive Advantage'
Recently the Office of the Privacy Commissioner of New Zealand (OPCNZ) launched a survey on using a privacy trust mark system that it would administer. The trust mark would likely help consumers believe their personal information is safeguarded and would,...
Nine Steps for Launching an ERM ECOSYSTEM PLAN
An electronic records management (ERM) solution is not one system, but an ecosystem of policies, standards, processes, people, and tools. Like any ecosystem, it will evolve and grow based on the environmental factors surrounding it. Some of the factors...
Organizations Are Typically Liable for Vendor-Related Breaches
To date, errant steps taken by third-party vendors have caused many notorious data breaches. The Netflix, Target, and Verizon incidents, for example, are just a few that can be cited. Such failures to protect data can lead to bad press, operational headaches,...
Retro-Converting Analog, Archival Finding Guides
Efforts to modernize German public archives over the past decade have led to several externally funded retro-conversion projects to convert analog finding aids into a digital form, which later could be input into Microsoft Excel spreadsheets or Access...
Seeking to Simplify RIM's Responses to a Complex Business Environment
The digital explosion has certainly made things more complicated for those in the records and information management (RIM) profession. And as the digital revolution compels the business environment to keep evolving at breakneck speeds, simple answers...
Senators to Introduce Bill to Secure Internet of Things
Reuters recently reported that a bipartisan group of U.S. senators is drafting legislation that seeks to address vulnerabilities in computing devices that belong to the Internet of things. The bill would require all government vendors that provide Internet-connected...
The Limits of Digital: Living and Working in a Hybrid Environment
The Limits of Digital: Living and Working in a Hybrid Environment The Revenge of Analog: Real Things and Why They Matter Authir: David Sax Publisher: PublicAffairs Publication Date: 2016 Length: 304 pages Price: $13.70 ISBN: 978-1610395-7-17 Source:...
Videographer Strives to Preserve Old Film Rolls
Our July/August edition of "Up Front" included a report on an NPR "All Things Considered" story that featured the XFR Collective, a group of professional archivists and volunteers who are digitizing as many videotapes as possible before the tapes succumb...
Search by... Author
Show... All Results Primary Sources Peer-reviewed

Oops!

An unknown error has occurred. Please click the button below to reload the page. If the problem persists, please try again in a little while.