SlideShare una empresa de Scribd logo
1 de 52
It Takes Two To Tango The Synergy of RIM & ECM Gordon E.J. Hoke, CRM   http://gejhoke.googlepages.com SM   Mile High Denver ARMA 17 March, 2009
The Presenter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We’re all in this together… ,[object Object],[object Object]
The Challenge: Get the best of both worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Seeking Progress ,[object Object],[object Object]
History of Records & Information Management (RIM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Records and Information Management – RIM Records: “ . . . information created, received, and maintained as evidence by an organization or person, in pursuance of legal obligations or in the transaction of business” –  ISO 15489-1 Information and Documentation – Records Management Individual organizations must determine the definition of what a record is and, often more importantly, what it is not. Records and Records Life Cycle Creation Production Storage/disposal Use/Modification Conversion
Where do Records Exist? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],–  USB drives –  Multi-function devices –  RAID drives –  MP3 Players –  Social networks –  IP telephony –  Text messages –  Desktop files –  Dept. information silos –  Web 2.0/ Tweets The significant growth of unstructured electronic records presents significant demands on storage and production.
ARMA International ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Records and Information Management  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pushing the Barriers of  Content Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AIIM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Association Liberation Movement ,[object Object],Shed no tears.
Lack of RIM is Risky ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News ,[object Object],[object Object],[object Object]
RIM Is Front Page News (cont.) ,[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News (cont.) ,[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News (cont.) ,[object Object],[object Object],[object Object],[object Object]
For failing to preserve internal e-mail communications, five major financial services firms paid $1.65 million each Wall Street & Technology, February 2003
Bank of America Securities paid $10 million on  record-keeping & access requirements violation claims   Chicago Sun-Times, March 2004
Morgan Stanley recently suffered an adverse $1.45 billion court judgment…MS had acted in “bad faith” in failing to turn over relevant e-mails. COMPUTERWORLD , July 2005
Lowering Risk ,[object Object],[object Object]
Lowering Risk ,[object Object]
“ How can I keep my CEO of jail?”
RIM Serves Business Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Paper-based RIM ,[object Object],[object Object]
RIM ascends... ,[object Object],[object Object],[object Object],[object Object]
Myths We Have Known ,[object Object],[object Object],[object Object],[object Object]
Understand the Complementary Differences
The Real Differences ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Scopes are Incomparable ,[object Object],[object Object]
Differences between RIM and ECM ,[object Object],[object Object],[object Object],Content Management makes the tools; Records Management makes the rules.
Differences between RIM and ECM (continued) 2.  Perspective is based on experience
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Language (continued) ,[object Object]
Differences between RIM and ECM (continued) 5.  Media Orientation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued):  6.  Governance ,[object Object],[object Object],[object Object],President and CEO Chief Records Officer General Counsel Vital Records VP of Compliance VP of Operations Chief Information Officer Business Continuity Disaster Recovery Mail Clerk Security Privacy Workflow
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controls ,[object Object],[object Object],[object Object],[object Object]
Importance of RIM and ECM Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Implications of Independent RIM and ECM Initiatives  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How ECM and RIM can work together: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Benefits of ECM-powered RIM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pointers for ECM/RIM Success ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pointers for ECM/RIM Success (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Different but Complementary ,[object Object]
Things that Go Well Together ,[object Object],[object Object],[object Object]
Questions?
Stay in touch: Gordon E.J. Hoke, CRM http://gejhoke.googlepages.com (507) 534-2293 [email_address]

Más contenido relacionado

Similar a "The Synergy and Risks of Records and Content Management"

Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag ConferenceJonathan Yarmis
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaPeter Mojica
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsPrakash Prasad ✔
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007brzaaap
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Managementgetripcord
 
AIIM Chicago's Submission for Best Event
AIIM Chicago's Submission for Best EventAIIM Chicago's Submission for Best Event
AIIM Chicago's Submission for Best EventJessica Lombardo
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09Tammy Clark
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...SafeNet
 
Automated Records Management for the Federal Government
Automated Records Management for the Federal GovernmentAutomated Records Management for the Federal Government
Automated Records Management for the Federal GovernmentAIIM International
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleAndris Soroka
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Imjessicalaverne
 
Irma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionIrma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionConni Christensen
 

Similar a "The Synergy and Risks of Records and Content Management" (20)

Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag Conference
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter Mojica
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report Details
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Management
 
AIIM Chicago's Submission for Best Event
AIIM Chicago's Submission for Best EventAIIM Chicago's Submission for Best Event
AIIM Chicago's Submission for Best Event
 
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09The Impact Of Breaches On Higher Ed Tlc 27 Sep09
The Impact Of Breaches On Higher Ed Tlc 27 Sep09
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...Perpetual Information Security - Driving Data Protection in an Evolving Compl...
Perpetual Information Security - Driving Data Protection in an Evolving Compl...
 
Automated Records Management for the Federal Government
Automated Records Management for the Federal GovernmentAutomated Records Management for the Federal Government
Automated Records Management for the Federal Government
 
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business PeopleDSS @RIGA COMM2013 - The Value of an IT Security for Business People
DSS @RIGA COMM2013 - The Value of an IT Security for Business People
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Im
 
Irma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionIrma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And Selection
 

Último

Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 

Último (20)

Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 

"The Synergy and Risks of Records and Content Management"

  • 1. It Takes Two To Tango The Synergy of RIM & ECM Gordon E.J. Hoke, CRM http://gejhoke.googlepages.com SM Mile High Denver ARMA 17 March, 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Records and Information Management – RIM Records: “ . . . information created, received, and maintained as evidence by an organization or person, in pursuance of legal obligations or in the transaction of business” – ISO 15489-1 Information and Documentation – Records Management Individual organizations must determine the definition of what a record is and, often more importantly, what it is not. Records and Records Life Cycle Creation Production Storage/disposal Use/Modification Conversion
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. For failing to preserve internal e-mail communications, five major financial services firms paid $1.65 million each Wall Street & Technology, February 2003
  • 20. Bank of America Securities paid $10 million on record-keeping & access requirements violation claims Chicago Sun-Times, March 2004
  • 21. Morgan Stanley recently suffered an adverse $1.45 billion court judgment…MS had acted in “bad faith” in failing to turn over relevant e-mails. COMPUTERWORLD , July 2005
  • 22.
  • 23.
  • 24. “ How can I keep my CEO of jail?”
  • 25.
  • 26.
  • 27.
  • 28.
  • 30.
  • 31.
  • 32.
  • 33. Differences between RIM and ECM (continued) 2. Perspective is based on experience
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 52. Stay in touch: Gordon E.J. Hoke, CRM http://gejhoke.googlepages.com (507) 534-2293 [email_address]