SlideShare ist ein Scribd-Unternehmen logo
1 von 55
It Takes Two To Tango The Synergy of RIM & ECM Gordon E.J. Hoke, CRM Gordon E.J. Hoke, CRM M
The Presenter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We’re all in this together… ,[object Object],[object Object]
The Challenge: Get the best of both worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Seeking Progress ,[object Object],[object Object]
History of Records & Information Management (RIM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Records and Information Management – RIM Records: “ . . . information created, received, and maintained as evidence by an organization or person, in pursuance of legal obligations or in the transaction of business” –  ISO 15489-1 Information and Documentation – Records Management Records and Records Life Cycle Creation Production Storage/disposal Use/Modification Conversion
Individual organizations must determine the definition of what a record is and, often more importantly, what it is not. Legal Inconsistency ,[object Object],[object Object],[object Object],[object Object],[object Object]
Where do Records Exist? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],–  USB drives –  Multi-function devices –  RAID drives –  MP3 Players –  Social networks –  IP telephony –  Text messages –  Desktop files –  Dept. information silos –  Web 2.0/ Tweets The significant growth of unstructured electronic records presents significant demands on storage and production. Are these on your Data Map?
ARMA International ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Records and Information Management  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pushing the Barriers of   Content Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AIIM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Association Liberation Movement ,[object Object],Shed no tears.
Lack of RIM is Risky ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News ,[object Object],[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News  (cont.) ,[object Object],[object Object]
RIM Is Front Page News   (cont.) ,[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News   (cont.) ,[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News   (cont.) ,[object Object],[object Object],[object Object],[object Object]
For failing to preserve internal e-mail communications, five major financial services firms paid $1.65 million each Wall Street & Technology, February 2003
Bank of America Securities paid $10 million on  record-keeping & access requirements violation claims   Chicago Sun-Times, March 2004
Morgan Stanley recently suffered an adverse $1.45 billion court judgment…MS had acted in “bad faith” in failing to turn over relevant e-mails. COMPUTERWORLD , July 2005
Lowering Risk ,[object Object],[object Object]
Lowering Risk ,[object Object]
“ How can I keep my CEO of jail?”
RIM Serves Business Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Paper-based RIM ,[object Object],[object Object]
RIM ascends... ,[object Object],[object Object],[object Object],[object Object]
Myths We Have Known ,[object Object],[object Object],[object Object],[object Object]
Understand the Complementary Differences
The Real Differences ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Scopes are Incomparable ,[object Object],[object Object]
Differences between RIM and ECM ,[object Object],[object Object],[object Object],Content Management makes the tools; Records Management makes the rules.
Differences between RIM and ECM (continued) 2.  Perspective is based on experience
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],...Try a glossary or lexicon
Differences between RIM and ECM (continued) 5.  Media Orientation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued):  6.  Governance ,[object Object],[object Object],[object Object],President and CEO Chief Records Officer General Counsel Vital Records VP of Compliance VP of Operations Chief Information Officer Business Continuity Disaster Recovery Mail Clerk Security Privacy Workflow
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controls ,[object Object],[object Object],[object Object],[object Object]
Importance of RIM and ECM Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Implications of Independent RIM and ECM Initiatives   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GARP – Generally Accepted Recordkeeping Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How ECM and RIM can work together: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Benefits of ECM-powered RIM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pointers for ECM/RIM Success ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pointers for ECM/RIM Success   (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Different but Complementary ,[object Object]
Things that Go Well Together ,[object Object],[object Object],[object Object],[object Object]
Questions?
Stay in touch: Gordon E.J. Hoke, CRM http://PositivelyRIM.blogspot.com (507) 254-6474 [email_address]

Weitere ähnliche Inhalte

Was ist angesagt?

Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ictACLC Antipolo
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"Yokimura Dimaunahan
 
The 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipThe 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipErvin Ramos
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 

Was ist angesagt? (7)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ict
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"
 
The 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipThe 9 Elements of Digital Citizenship
The 9 Elements of Digital Citizenship
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 

Andere mochten auch

Body Systems
Body SystemsBody Systems
Body Systemsjenmstone
 
The Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital PreservationThe Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital PreservationGordon Hoke
 
Body Systems
Body SystemsBody Systems
Body Systemsjenmstone
 
Slik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria LynkursSlik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria LynkursOle Johan Heum
 
Ed3508lesson2
Ed3508lesson2Ed3508lesson2
Ed3508lesson2LoriB3508
 
Body Systems
Body SystemsBody Systems
Body Systemsjenmstone
 

Andere mochten auch (7)

Body Systems
Body SystemsBody Systems
Body Systems
 
The Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital PreservationThe Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital Preservation
 
Intro to wikis in education
Intro to wikis in educationIntro to wikis in education
Intro to wikis in education
 
Body Systems
Body SystemsBody Systems
Body Systems
 
Slik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria LynkursSlik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
 
Ed3508lesson2
Ed3508lesson2Ed3508lesson2
Ed3508lesson2
 
Body Systems
Body SystemsBody Systems
Body Systems
 

Ähnlich wie RIM & ECM Synergy

Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag ConferenceJonathan Yarmis
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaPeter Mojica
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsPrakash Prasad ✔
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Managementgetripcord
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Imjessicalaverne
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007brzaaap
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beachelgolfo
 
Irma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionIrma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionConni Christensen
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IPipspat
 

Ähnlich wie RIM & ECM Synergy (20)

Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag Conference
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter Mojica
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report Details
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Management
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Im
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
Irma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionIrma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And Selection
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 

Kürzlich hochgeladen

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

RIM & ECM Synergy

  • 1. It Takes Two To Tango The Synergy of RIM & ECM Gordon E.J. Hoke, CRM Gordon E.J. Hoke, CRM M
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Records and Information Management – RIM Records: “ . . . information created, received, and maintained as evidence by an organization or person, in pursuance of legal obligations or in the transaction of business” – ISO 15489-1 Information and Documentation – Records Management Records and Records Life Cycle Creation Production Storage/disposal Use/Modification Conversion
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. For failing to preserve internal e-mail communications, five major financial services firms paid $1.65 million each Wall Street & Technology, February 2003
  • 22. Bank of America Securities paid $10 million on record-keeping & access requirements violation claims Chicago Sun-Times, March 2004
  • 23. Morgan Stanley recently suffered an adverse $1.45 billion court judgment…MS had acted in “bad faith” in failing to turn over relevant e-mails. COMPUTERWORLD , July 2005
  • 24.
  • 25.
  • 26. “ How can I keep my CEO of jail?”
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 34.
  • 35. Differences between RIM and ECM (continued) 2. Perspective is based on experience
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 55. Stay in touch: Gordon E.J. Hoke, CRM http://PositivelyRIM.blogspot.com (507) 254-6474 [email_address]