SlideShare ist ein Scribd-Unternehmen logo
1 von 54
From ISO to Implementation   A framework for ECM Implementation George Broadbent Director Enterprise Solutions,  Entium Technology Partners Education Code: TR1-1315
Learning Objectives ,[object Object],[object Object],[object Object]
Learning Objectives ,[object Object],[object Object],[object Object]
Session Outline ,[object Object],[object Object],[object Object],[object Object]
Enterprise Content Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Content Management Photos and Blueprints Web Content Documents and Records Enterprise Applications eMails Faxes Forms Desktop Applications Graphics, Video, & Audio Reports
Overview of ISO ,[object Object],[object Object],[object Object],[object Object]
Overview of ISO ,[object Object],[object Object],[object Object],The organization adopted “ ISO”  based on the Greek word “ἴσος” ( isos ), which means “ equal .”
ISO Standards Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO Standards Used, Cont’d. ,[object Object],[object Object],[object Object],[object Object]
ISO Standards Used, Cont’d. ,[object Object],[object Object],[object Object],[object Object]
Benefits of Using a Framework ,[object Object],[object Object],[object Object],[object Object],[object Object]
Framework Components
Putting it Together Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Records Management Program Records Management Program Strategic Records Improvement Program
Records Management Program Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules
Records Management Program ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Strategic Records Program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Corporate Policies and Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Classification Plan ,[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Retention Schedule ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Regulatory Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Regulatory Research
ISO 15489 – Regulatory Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Regulatory Research
Bring RM and RR Together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 15489 – Records Management ,[object Object],[object Object],Source: ISO 15489 ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 15489 – Records Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 15836 – Dublin Core ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Program Information Security Program Holistic Framework for Information Security
Information Security Program ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
ISO 17799 – Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 18492:2005 Long-Term Preservation ,[object Object],[object Object]
ISO 18492:2005 Long-Term Preservation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS Holistic Corporate Framework ,[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Software Requirements Software Requirements Software Selection
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Software Requirements ,[object Object],[object Object],[object Object]
Software Selection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
ISO 14721 – Open Archival Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECM Implementation Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation
IEC 82045 – Technical Standard For Document Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 9001 – Quality Management Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 19005-1 – Electronic File Format Long Term Preservation ,[object Object],[object Object],[object Object],[object Object]
Document Type Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Taxonomy and Meta Data ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Technical Architecture Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
ECM Program Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Business Process Management Business Process Management
Business Process Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Recap Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
From ISO to Implementation   A framework for ECM Implementation George Broadbent [email_address] Education Code: TR1-1315 Please Complete Your  Session Evaluation

Weitere ähnliche Inhalte

Andere mochten auch

[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data AccuracyAIIM International
 
ICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_managementICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_managementJohn Macasio
 
A Brief History of Content
A Brief History of ContentA Brief History of Content
A Brief History of ContentSeth Grimes
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case NarrativesJhoy Pedreza
 
How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...AIIM International
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sampleoaes2006
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 
Types of ISO Certification
Types of ISO CertificationTypes of ISO Certification
Types of ISO CertificationMike Walker
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)SOLOMON M KAMINDA
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsERPScan
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveRob Gerbrandt CD, PMP
 

Andere mochten auch (20)

[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
 
ICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_managementICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_management
 
A Brief History of Content
A Brief History of ContentA Brief History of Content
A Brief History of Content
 
[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...
[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...
[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...
 
Diplomado Gestión del Conocimiento - FAC - PUJ
Diplomado Gestión del Conocimiento - FAC - PUJDiplomado Gestión del Conocimiento - FAC - PUJ
Diplomado Gestión del Conocimiento - FAC - PUJ
 
Workshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and ArchivematicaWorkshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and Archivematica
 
[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer
[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer
[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer
 
Acitivity diagram
Acitivity diagramAcitivity diagram
Acitivity diagram
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case Narratives
 
How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sample
 
Taxonomy Fundamentals Workshop
Taxonomy Fundamentals WorkshopTaxonomy Fundamentals Workshop
Taxonomy Fundamentals Workshop
 
Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Types of ISO Certification
Types of ISO CertificationTypes of ISO Certification
Types of ISO Certification
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework Perspective
 

Ähnlich wie ISO ECM Implementation Framework

eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810cmteti
 
Chapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxChapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxmccormicknadine86
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Frameworkbarnetdh
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...Barry Peters
 
Monica Crocker Implementing Ecm Aiim 2009
Monica Crocker   Implementing Ecm Aiim 2009Monica Crocker   Implementing Ecm Aiim 2009
Monica Crocker Implementing Ecm Aiim 2009AIIM Minnesota
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life CycleCollabor8now Ltd
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
ECM & Records Management with SharePoint
ECM & Records Management with SharePointECM & Records Management with SharePoint
ECM & Records Management with SharePointIntergen
 
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...Keith Atteck C.Tech. ERMm
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IMalikPinckney86
 
20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhoferoberhofer
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMaria Thompson
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservationFIAT/IFTA
 

Ähnlich wie ISO ECM Implementation Framework (20)

eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Iso30300seminar16062014
Iso30300seminar16062014Iso30300seminar16062014
Iso30300seminar16062014
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810
 
Chapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxChapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docx
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Framework
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
 
Monica Crocker Implementing Ecm Aiim 2009
Monica Crocker   Implementing Ecm Aiim 2009Monica Crocker   Implementing Ecm Aiim 2009
Monica Crocker Implementing Ecm Aiim 2009
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life Cycle
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Dc2010 fanning
Dc2010 fanningDc2010 fanning
Dc2010 fanning
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
ECM & Records Management with SharePoint
ECM & Records Management with SharePointECM & Records Management with SharePoint
ECM & Records Management with SharePoint
 
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) I
 
20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM Lifecycle
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservation
 

Kürzlich hochgeladen

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdftbatkhuu1
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Dipal Arora
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Kürzlich hochgeladen (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
A305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdfA305_A2_file_Batkhuu progress report.pdf
A305_A2_file_Batkhuu progress report.pdf
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
Call Girls Navi Mumbai Just Call 9907093804 Top Class Call Girl Service Avail...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

ISO ECM Implementation Framework

  • 1. From ISO to Implementation A framework for ECM Implementation George Broadbent Director Enterprise Solutions, Entium Technology Partners Education Code: TR1-1315
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Enterprise Content Management Photos and Blueprints Web Content Documents and Records Enterprise Applications eMails Faxes Forms Desktop Applications Graphics, Video, & Audio Reports
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14. Putting it Together Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
  • 15. Records Management Program Records Management Program Strategic Records Improvement Program
  • 16. Records Management Program Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Security Program Information Security Program Holistic Framework for Information Security
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Software Requirements Software Requirements Software Selection
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. ECM Implementation Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. Technical Architecture Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
  • 50.
  • 51. Business Process Management Business Process Management
  • 52.
  • 53. Recap Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
  • 54. From ISO to Implementation A framework for ECM Implementation George Broadbent [email_address] Education Code: TR1-1315 Please Complete Your Session Evaluation