What Are the Skills Needed for Records Managers to Transition to Electronic Record-keeping?
The U.S. National Archives and Records Administration (NARA) has set an incredibly ambitious deadline for the federal government’s digitization effort: all records must be submitted in digital format by the end of 2022. And unfortunately, [...]
The Quirks and Complexities of Records Schedules and Records Retention, and How They Affect the Digitization Effort
Records schedules are a key element of any governmental records management system. Essentially formalized instructions for the disposition of records, they guide agencies in how to handle records and how long to keep different kinds [...]
Defensible Destruction 101: What Every Records Manager Needs to Know
Records destruction is an integral part of any records management process. Not every record will be destroyed – many will be archived indefinitely – but others have a natural lifecycle that ends with the destruction [...]
Setting Priorities When Overwhelmed By Electronic Records Management
The 2022 deadline set by the U.S. National Archives and Records Administration for government agencies to submit all records in electronic format continues to inch ever closer. Already challenged by the ambitious deadline, many agencies [...]
The Importance of Trust in Records Management
We’ve previously discussed how good records management fosters transparency. Today, we want to take a deep dive into one of the positive effects of transparency: trust-building. As with transparency, good records management will cultivate trust [...]
The Importance of Transparency in Records Management
In records management, transparency is often overlooked as a success factor, yet it is a critical and necessary ingredient in any effective records management program. The U.S. National Archives and Records Administration (NARA) itself stresses [...]
The Business Case for Vulnerability Scanning
The majority of data breaches and malware attacks occur as a result of vulnerabilities that are patchable - and thus potentially preventable. Vulnerability scanning is the solution. But what is vulnerability scanning? How does it [...]