RECMGMT-L Archives

Records Management

RECMGMT-L@LISTSERV.IGGURU.US

Options: Use Forum View

Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Tom Wilson <[log in to unmask]>
Reply To:
Records Management Program <[log in to unmask]>
Date:
Wed, 15 Jun 2011 10:53:43 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (83 lines)
I think some of the challenge in answering is what assumptions the IT
Manager is making.  For all electronic information, I've found its not
uncommon for IT professionals to think of themselves and their domain in the
IT department as governors of structure (in conjunction with their internal
customers), programming, security, etc. so that they don't quite know what
to do with Records Management because it's not in their domain.  The truth
is the domain is shared, but this isn't always assumed.  Records should have
some level of voice in taxonomy decisions and how applications are managed
for governance, but because it's not always so, the assumption of the IT
manager in this case might be to narrow the scope of Records Management to
disposition and some other "legal stuff" which might seem unclear to them.

The better you can understand and comprehend the assumptions of the IT
person you're talking with, the better you can sculpt a response.

-----Original Message-----
From: Records Management Program [mailto:[log in to unmask]] On Behalf
Of Link, Gary M.
Sent: Monday, June 13, 2011 4:26 AM
To: [log in to unmask]
Subject: How Would You Answer?

So, if an IT manager asked you "What does records management have to do with
information security?" how would you answer him/her? 

 

I think I would organize my answer thusly:

 

  "Inventory - records managers are versed in records inventories.
Knowing what information you have and where it resides is the first step
toward securing it.

 

  Retention - establishing a policy wherein information is destroyed after
its useful life has ended will reduce the risk of data breach.

 

  Compliance-the same legal research that is used for developing the
retention schedule also identifies any outside rules regarding data security
that apply to the organization, ex: FACTA.

 

  Destruction Method - records managers are versed in proper policies,
methods, and controls for the destruction of records and information."

 

I would be interested to know how others might answer this question.

 

Gary Link, CRM

Pittsburgh, PA

[log in to unmask]

 


List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance To unsubscribe from
this list, click the below link. If not already present, place UNSUBSCRIBE
RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present,
place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

List archives at http://lists.ufl.edu/archives/recmgmt-l.html
Contact [log in to unmask] for assistance
To unsubscribe from this list, click the below link. If not already present, place UNSUBSCRIBE RECMGMT-L or UNSUB RECMGMT-L in the body of the message.
mailto:[log in to unmask]

ATOM RSS1 RSS2