RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Roach, Bill J." <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Wed, 3 May 2006 16:35:38 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (105 lines)
>>I'd say a more painful punishment would be to send them to Kutztown,
PA (is there really a town named Kutztown?) or somewhere in North
Dakota.<<

Send them up in December or January.  That way we can set them outside
overnight and then use them as curb stops until spring.  Seeing they are
from Texas, it shouldn't take more than a few minutes for them to turn
to popsicles.  Come spring we'll send them back ;^)

Bill R

Bill Roach, CRM
Enterprise EDMS Coordinator
State of North Dakota
ITD/Records Management
701-328-3589




-----Original Message-----
From: Records Management Program [mailto:[log in to unmask]] On
Behalf Of White, Bruce
Sent: Wednesday, May 03, 2006 3:41 PM
To: [log in to unmask]
Subject: Re: [RM] Toughening up Identity Theft legislation

>Keep in mind, I was not criticizing UT for being exploited by some 
>computer whiz. I just read how Auburn University had a "BOT Attack"

>that shut down their system. So as long as we have online computers we

>are always at the mercy of the next smart kid with a new attack idea.


>My post was to encourage ARMA and Records Managers to be more vocal

>about what Congress is doing to the Identity Theft legislation.

 

Although Identity Theft is making the news (I've been a victim; took me
months to clean my record) I think this premise could also apply to
corporate espionage, something most companies are dealing with on a
daily basis.  These same smart kids (as well as adults) are also seeking
ways to get into networks and cause damage.  

 

Both are examples of where records managers can get involved.  I've had
the opportunity to help my IT department develop policies and processes
to prevent unauthorized release of information, whether customer/client
files or corporate restricted data.  

 

If you organization has a committee that establishes policy on the
management of confidential information (whether individual or company)
get a seat at the table.  Create rules for employees to follow and
include these in the organization's Code of Conduct.  Establish
classification categories for records and include these in the retention
schedule so employees know which records should be protected. 

 

>Therefore I predict UT will catch the felon who stole our files.  And

>then Texas justice will occur!  That's right, we will go make them live

>in College Station.  Oh the Humanity!

 

I'd say a more painful punishment would be to send them to Kutztown, PA
(is there really a town named Kutztown?) or somewhere in North Dakota.
At least College Station has SOME form of nightlife.  And the big lights
of Houston (and Austin) are less than an hour away...

 

Bruce L. White, CRM, PMP

San Diego, CA

TEL: 619-696-4671

FAX: 619-696-2534

CELL: 619-952-7145

 

List archives at http://lists.ufl.edu/archives/recmgmt-l.html

Contact [log in to unmask] for assistance

 


List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance

ATOM RSS1 RSS2