Welcome to the September/October 2014 issue of Information Management!

The extent to which privacy is a growing concern for governments, businesses, and consumers around the world is evident in this new issue. As illustrated most recently by the massive breach of potentially 60 million Home Depot customers’ payment cards, cyber criminals are working overtime to attack this vulnerable information. This is producing an exponentially growing need for skilled cybersecurity specialists, stretching the small pool of qualified people, according to a recent Bloomberg Businessweek interview.

Many organizations are meeting the demand through internal recruitment and training, the article reveals. This provides a great opportunity for records and information management professionals who want to expand their information governance skills to meet this challenge. This issue of Information Management includes several articles meant to help you to just that.

 

Read more by clicking on the individual article links below or by visiting http://imm.arma.org to browse this issue.

 

Closing the Gap Between Policy and ECM Implementation Using Privacy by Design

Norman Mooradian, Ph.D.

This article provides a framework for converting legal requirements for personal information into functional requirements for procuring or implementing an electronic content management (ECM) solution

 

Six Steps for Creating a ‘Super Data Map’

Mark Diamond

Creating a “super data map” that not only captures metadata about where and in what media information resides, how it is used, and who owns and has access to it, but also integrates legal, compliance, privacy, and IT attributes along with a record retention schedule, can lower risks, reduce costs, and be easier to maintain than separate, single-purpose databases. 

 

Tossing the Tape? Implications of Making the Switch to Disk-Based Backups

Veeral Gosalia, Antonio Rega, and Matt Shive

Backup data on tape has usually been deemed inaccessible for e-discovery, with courts ruling that it would be overly burdensome to retrieve. Now that organizations are increasingly using disks, the question of whether backup data remains inaccessible is worth examination. 
 

 

Generally Accepted Recordkeeping Principles® Series

Principles for Protecting Privacy

Julie Gable, CRM, CDIA, FAI

Anti-hacking and anti-theft measures can exist only as the result of well-defined policies that are made in response to laws governing collection, storage, transfer, retention, and disposition of privacy information and the assignment of privacy protection responsibilities. Two well-known sets of principles offer a starting point for making sense of what is required of organizations and knowing what to do and in what order: The Generally Accepted Recordkeeping Principles® and the Generally Accepted Privacy Principles.

 

RIM Fundamentals Series

10 Things Organizations Should Do to Protect Against Hacking

John J. Isaza, Esq., FAI

The mere specter of being hacked reinforces the importance of information governance and data protection processes, procedures, and technology. This article talks about the importance of appointing an executive officer to be accountable for information security and offers advice about the preparations organizations need to make to ensure information is protected.



Up Front

News, trends, and analysis of interest to you and your organization

 

Thanks to Our Advertisers:

  • Canon
  • Fujitsu
  • Institute of Certified Records Managers
  • Iron Mountain
  • NAID
  • OPEX Corporation
  • PRISM
  • Recall
  • RSD
  • XACT Data Discovery
  • Zasio

Visit http://imm.arma.org to browse the full issue.

Bookmark and Share

Information Management Archives

Looking for stories from days gone by? Have an issue in mind that you'd like to revisit?
Find it in the archives!

ISSN# 2155-3505