Welcome to the September/October 2014 issue of Information Management!
The extent to which privacy is a growing concern for
governments, businesses, and consumers around the world is evident in this new
issue. As illustrated most recently by the massive breach of potentially 60
million Home Depot customers’ payment cards, cyber criminals are working
overtime to attack this vulnerable information. This is producing an
exponentially growing need for skilled cybersecurity specialists, stretching
the small pool of qualified people, according to a recent Bloomberg
Many organizations are meeting the demand through
internal recruitment and training, the article reveals. This provides a great
opportunity for records and information management professionals who want to
expand their information governance skills to meet this challenge. This issue
of Information Management includes several articles meant to help you to
Read more by clicking on the individual article links below
or by visiting http://imm.arma.org to browse this issue.
Closing the Gap Between Policy and ECM Implementation Using Privacy by Design
Norman Mooradian, Ph.D.
This article provides a framework for converting legal requirements for personal information into functional requirements for procuring or implementing an electronic content management (ECM) solution
Six Steps for Creating a ‘Super Data Map’
Creating a “super data map” that not only captures metadata about where and in what media information resides, how it is used, and who owns and has access to it, but also integrates legal, compliance, privacy, and IT attributes along with a record retention schedule, can lower risks, reduce costs, and be easier to maintain than separate, single-purpose databases.
Tossing the Tape? Implications of Making the Switch to Disk-Based Backups
Veeral Gosalia, Antonio Rega, and Matt Shive
Backup data on tape has usually been deemed inaccessible for e-discovery, with courts ruling that it would be overly burdensome to retrieve. Now that organizations are increasingly using disks, the question of whether backup data remains inaccessible is worth examination.
Generally Accepted Recordkeeping Principles® Series
Principles for Protecting Privacy
Julie Gable, CRM, CDIA, FAI
and anti-theft measures can exist only as the result of well-defined policies
that are made in response to laws governing collection, storage, transfer,
retention, and disposition of privacy information and the assignment of privacy
protection responsibilities. Two well-known sets of principles offer a starting
point for making sense of what is required of organizations and knowing what to
do and in what order: The Generally Accepted Recordkeeping Principles® and the
Generally Accepted Privacy Principles.
RIM Fundamentals Series
10 Things Organizations Should Do to Protect Against Hacking
John J. Isaza, Esq., FAI
The mere specter of being hacked reinforces the importance of information governance and data protection processes, procedures, and technology. This article talks about the importance of appointing an executive officer to be accountable for information security and offers advice about the preparations organizations need to make to ensure information is protected.
News, trends, and analysis of interest to you and your organization
Thanks to Our Advertisers:
- Institute of Certified Records Managers
- Iron Mountain
- OPEX Corporation
- XACT Data Discovery
Visit http://imm.arma.org to browse the full issue.
Information Management Archives
Looking for stories from days gone by? Have an issue in mind that you'd like to revisit?
Find it in the archives!