SlideShare ist ein Scribd-Unternehmen logo
1 von 16
WORKING THE IT/RIM RELATIONSHIP Helen Streck Records Management Consultant Shook, Hardy & Bacon LLP February 2009
[object Object],[object Object]
Agenda ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introduction  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Where are Organizations Today?
Eliminating Dissatisfaction ,[object Object],[object Object],[object Object],RIM controls not designed into the build out. Solution Bring RIM into the discussion at the design of a system. RIM need to  learn and become  familiar with the  technology options available and how they will impact compliance.
Bringing RIM to the Table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Importance of Both at the Table ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors More and more information is only in electronic format. Information retention requirements outlast technology solutions. Growth in electronic information volume increases complexity of managing, finding, and using information E-information needed for litigation and retention for global companies may not be accessible for long periods of time. Realistic retention requirements and categorization that is  consistently enforced. Information classification and metadata governance models.
Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors Increased likelihood that intellectual capital is lost. Increased litigation around the globe with varying rules for privacy and access. Increased litigation to defend patents and income. Increased need for legal teams across the globe as well as discovery teams to process more and more information increasing costs. Surgical approach to determining relevance. Information security has the appropriate controls and information security classification is clearly defined.  Enterprise search tools applied.
RIM’s Value to IT ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Types of Relationships ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IT/RIM Relationships Needed ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],Constructing the Governance Developing Workflows and Processes Participating on Teams Applying Rules and Requirements to Technology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Areas Where IT/RIM Relationships Co-Exist
In Summary ,[object Object],[object Object],[object Object],[object Object],[object Object]
Questions

Weitere ähnliche Inhalte

Was ist angesagt?

EDRMS Pre implementation project plan
EDRMS Pre implementation project planEDRMS Pre implementation project plan
EDRMS Pre implementation project planDonna_Maree_Findlay
 
Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3pjmartinez
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govAKHIL969626
 
How to implement Electronic Records Management?
How to implement Electronic Records Management?How to implement Electronic Records Management?
How to implement Electronic Records Management?Atle Skjekkeland
 
Running head organizational information system1 organizational
Running head organizational information system1 organizational Running head organizational information system1 organizational
Running head organizational information system1 organizational AKHIL969626
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureAccenture Operations
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Implementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management ProgramImplementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management ProgramKannan Subbiah
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Osman Hasan
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance ProgramSteve Sugulas
 
Challenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance ProgramChallenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance ProgramKevin Nugent
 
Blue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the FutureBlue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the Future3Sixty Insights
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made EasyJerry Bishop
 

Was ist angesagt? (20)

EDRMS Pre implementation project plan
EDRMS Pre implementation project planEDRMS Pre implementation project plan
EDRMS Pre implementation project plan
 
Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3Governance Of Enterprise Information Technology V3
Governance Of Enterprise Information Technology V3
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
Scenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information govScenario you have recently been hired as a chief information gov
Scenario you have recently been hired as a chief information gov
 
How to implement Electronic Records Management?
How to implement Electronic Records Management?How to implement Electronic Records Management?
How to implement Electronic Records Management?
 
Running head organizational information system1 organizational
Running head organizational information system1 organizational Running head organizational information system1 organizational
Running head organizational information system1 organizational
 
The Changing Role of Compliance | Accenture
The Changing Role of Compliance | AccentureThe Changing Role of Compliance | Accenture
The Changing Role of Compliance | Accenture
 
Executive Overview - Dale A Bondanza - vCIO
Executive Overview - Dale A Bondanza - vCIOExecutive Overview - Dale A Bondanza - vCIO
Executive Overview - Dale A Bondanza - vCIO
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
Chap05
Chap05Chap05
Chap05
 
It alignment-who-is-in-charge
It alignment-who-is-in-chargeIt alignment-who-is-in-charge
It alignment-who-is-in-charge
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Implementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management ProgramImplementing an Effective Third-party & Vendor Risk Management Program
Implementing an Effective Third-party & Vendor Risk Management Program
 
Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)Corporate governance of INFORMATION TECHNOLOGY (IT)
Corporate governance of INFORMATION TECHNOLOGY (IT)
 
Comprehensive Data Governance Program
Comprehensive Data Governance ProgramComprehensive Data Governance Program
Comprehensive Data Governance Program
 
Challenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance ProgramChallenges & Benefits In Creating An Information Governance Program
Challenges & Benefits In Creating An Information Governance Program
 
Blue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the FutureBlue Hill Research: Managing Mobile Now and in the Future
Blue Hill Research: Managing Mobile Now and in the Future
 
Social media risks guide
Social media risks guideSocial media risks guide
Social media risks guide
 
IT Governance Made Easy
IT Governance Made EasyIT Governance Made Easy
IT Governance Made Easy
 

Andere mochten auch

Distractie pe bani putini
Distractie pe bani putiniDistractie pe bani putini
Distractie pe bani putinidar_her
 
October 2006 Impact of PDF/A on Content Management by Christy Hubbard
October 2006 Impact of PDF/A on Content Management by Christy HubbardOctober 2006 Impact of PDF/A on Content Management by Christy Hubbard
October 2006 Impact of PDF/A on Content Management by Christy HubbardJohn Wang
 
EVA Voice Over
EVA Voice OverEVA Voice Over
EVA Voice Overpmprosltd
 
Web Typography & You
Web Typography & YouWeb Typography & You
Web Typography & YouDerek Bender
 
April 2005 Headlines Newsletter
April 2005 Headlines Newsletter April 2005 Headlines Newsletter
April 2005 Headlines Newsletter John Wang
 
December 2007 Document Recognition Technology Overview Presentation
December 2007 Document Recognition Technology Overview PresentationDecember 2007 Document Recognition Technology Overview Presentation
December 2007 Document Recognition Technology Overview PresentationJohn Wang
 

Andere mochten auch (8)

Distractie pe bani putini
Distractie pe bani putiniDistractie pe bani putini
Distractie pe bani putini
 
Postanit Ec
Postanit EcPostanit Ec
Postanit Ec
 
Look!!!
Look!!!Look!!!
Look!!!
 
October 2006 Impact of PDF/A on Content Management by Christy Hubbard
October 2006 Impact of PDF/A on Content Management by Christy HubbardOctober 2006 Impact of PDF/A on Content Management by Christy Hubbard
October 2006 Impact of PDF/A on Content Management by Christy Hubbard
 
EVA Voice Over
EVA Voice OverEVA Voice Over
EVA Voice Over
 
Web Typography & You
Web Typography & YouWeb Typography & You
Web Typography & You
 
April 2005 Headlines Newsletter
April 2005 Headlines Newsletter April 2005 Headlines Newsletter
April 2005 Headlines Newsletter
 
December 2007 Document Recognition Technology Overview Presentation
December 2007 Document Recognition Technology Overview PresentationDecember 2007 Document Recognition Technology Overview Presentation
December 2007 Document Recognition Technology Overview Presentation
 

Ähnlich wie February 2009 Working the IT/RIM Relationship Presentation by Helen Streck

Chap001
Chap001Chap001
Chap001rpvgb
 
Mwlug Compliance And E Discovery Policies
Mwlug   Compliance And E Discovery PoliciesMwlug   Compliance And E Discovery Policies
Mwlug Compliance And E Discovery PoliciesLotusDR
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technologygrudoy
 
Regulatory Compliance Key Challenges and Effective Solutions.pdf
Regulatory Compliance Key Challenges and Effective Solutions.pdfRegulatory Compliance Key Challenges and Effective Solutions.pdf
Regulatory Compliance Key Challenges and Effective Solutions.pdfMaveric Systems
 
Establishing Wiki & Blog Governance
Establishing Wiki & Blog GovernanceEstablishing Wiki & Blog Governance
Establishing Wiki & Blog GovernanceJason Stearns
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...
CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...
CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...Elle Waters
 
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Joe Orlando
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientEversheds Sutherland
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesCraig Miller
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)Nick Inglis
 
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...ARMA International
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810cmteti
 
Achieving Digital Transformation in Regulatory
Achieving Digital Transformation in RegulatoryAchieving Digital Transformation in Regulatory
Achieving Digital Transformation in RegulatoryCary Smithson
 
Achieving Excellence in End-to-End Supply Management
Achieving Excellence  in End-to-End Supply ManagementAchieving Excellence  in End-to-End Supply Management
Achieving Excellence in End-to-End Supply Managementmubarak2009
 

Ähnlich wie February 2009 Working the IT/RIM Relationship Presentation by Helen Streck (20)

EDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records ManagementEDI 2009 Controlling E-Discovery Costs through Records Management
EDI 2009 Controlling E-Discovery Costs through Records Management
 
Information Governance - presentation to inforum 2013
Information Governance - presentation to inforum 2013Information Governance - presentation to inforum 2013
Information Governance - presentation to inforum 2013
 
Chap001
Chap001Chap001
Chap001
 
Mwlug Compliance And E Discovery Policies
Mwlug   Compliance And E Discovery PoliciesMwlug   Compliance And E Discovery Policies
Mwlug Compliance And E Discovery Policies
 
ILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal TechnologyILTA 2011 Integration Of Legal Technology
ILTA 2011 Integration Of Legal Technology
 
Regulatory Compliance Key Challenges and Effective Solutions.pdf
Regulatory Compliance Key Challenges and Effective Solutions.pdfRegulatory Compliance Key Challenges and Effective Solutions.pdf
Regulatory Compliance Key Challenges and Effective Solutions.pdf
 
Establishing Wiki & Blog Governance
Establishing Wiki & Blog GovernanceEstablishing Wiki & Blog Governance
Establishing Wiki & Blog Governance
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...
CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...
CSUN 2011: How to Eat an Elephant: Tackling Web Accessibility in a Large Corp...
 
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
Gdpr may require a data protection officer what does a dpo do.pdf (autosaved)
 
Developing a Metadata Plan-06-11-09
Developing a Metadata Plan-06-11-09Developing a Metadata Plan-06-11-09
Developing a Metadata Plan-06-11-09
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
How technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficientHow technology and innovative processes can make your legal team more efficient
How technology and innovative processes can make your legal team more efficient
 
IllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance PrinciplesIllustroTech Introduction to IT Governance Principles
IllustroTech Introduction to IT Governance Principles
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
 
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810
 
Achieving Digital Transformation in Regulatory
Achieving Digital Transformation in RegulatoryAchieving Digital Transformation in Regulatory
Achieving Digital Transformation in Regulatory
 
Achieving Excellence in End-to-End Supply Management
Achieving Excellence  in End-to-End Supply ManagementAchieving Excellence  in End-to-End Supply Management
Achieving Excellence in End-to-End Supply Management
 
Infographic: Data Governance Best Practices
Infographic: Data Governance Best Practices Infographic: Data Governance Best Practices
Infographic: Data Governance Best Practices
 

Mehr von John Wang

How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...
How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...
How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...John Wang
 
The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)John Wang
 
February 2010 8 Things You Cant Afford To Ignore About eDiscovery
February 2010 8 Things You Cant Afford To Ignore About eDiscoveryFebruary 2010 8 Things You Cant Afford To Ignore About eDiscovery
February 2010 8 Things You Cant Afford To Ignore About eDiscoveryJohn Wang
 
August 2008 Content Management ROI Presentation by Brian Dirking
August 2008 Content Management ROI Presentation by Brian DirkingAugust 2008 Content Management ROI Presentation by Brian Dirking
August 2008 Content Management ROI Presentation by Brian DirkingJohn Wang
 
January 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations PresentationJanuary 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations PresentationJohn Wang
 
January 2006 Archival Storage Strategies and Technologies Presentation
January 2006 Archival Storage Strategies and Technologies PresentationJanuary 2006 Archival Storage Strategies and Technologies Presentation
January 2006 Archival Storage Strategies and Technologies PresentationJohn Wang
 

Mehr von John Wang (6)

How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...
How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...
How to Reduce Cost and Risk by Bringing E-Discovery In-House to Get Relevant ...
 
The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)The Role of Content Management in Electronic Health Records (EMR)
The Role of Content Management in Electronic Health Records (EMR)
 
February 2010 8 Things You Cant Afford To Ignore About eDiscovery
February 2010 8 Things You Cant Afford To Ignore About eDiscoveryFebruary 2010 8 Things You Cant Afford To Ignore About eDiscovery
February 2010 8 Things You Cant Afford To Ignore About eDiscovery
 
August 2008 Content Management ROI Presentation by Brian Dirking
August 2008 Content Management ROI Presentation by Brian DirkingAugust 2008 Content Management ROI Presentation by Brian Dirking
August 2008 Content Management ROI Presentation by Brian Dirking
 
January 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations PresentationJanuary 2006 Document Scanning Considerations Presentation
January 2006 Document Scanning Considerations Presentation
 
January 2006 Archival Storage Strategies and Technologies Presentation
January 2006 Archival Storage Strategies and Technologies PresentationJanuary 2006 Archival Storage Strategies and Technologies Presentation
January 2006 Archival Storage Strategies and Technologies Presentation
 

Kürzlich hochgeladen

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 

Kürzlich hochgeladen (20)

Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 

February 2009 Working the IT/RIM Relationship Presentation by Helen Streck

  • 1. WORKING THE IT/RIM RELATIONSHIP Helen Streck Records Management Consultant Shook, Hardy & Bacon LLP February 2009
  • 2.
  • 3.
  • 4.
  • 6.
  • 7.
  • 8.
  • 9. Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors More and more information is only in electronic format. Information retention requirements outlast technology solutions. Growth in electronic information volume increases complexity of managing, finding, and using information E-information needed for litigation and retention for global companies may not be accessible for long periods of time. Realistic retention requirements and categorization that is consistently enforced. Information classification and metadata governance models.
  • 10. Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors Increased likelihood that intellectual capital is lost. Increased litigation around the globe with varying rules for privacy and access. Increased litigation to defend patents and income. Increased need for legal teams across the globe as well as discovery teams to process more and more information increasing costs. Surgical approach to determining relevance. Information security has the appropriate controls and information security classification is clearly defined. Enterprise search tools applied.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.