Aberdeen Group, 271
Accenture, 9
Accessibility of information:
costs associated with, 104
identity access management for, 212–213, 272
long-term digital preservation for, 26, 32, 322, 340–341, 343
principles of IG including, 26, 28, 32, 35, 37
records and information management availability principle on, 28, 32, 35, 37, 151, 309
security balanced with, 26, 32, 151, 203, 212–213, 215–216, 224
Accountability:
for disposition, 133
for IG policy implementation, 88
for IT governance, 17
for maintenance of IG program, 349–350
principles of IG including, 27, 28, 30, 35, 36
for records and information management, 28, 30, 35, 36, 53, 133, 309, 311–312
for social media, 267
Adler, Steven, 192
AirWatch, 275
Alperovitch, Dmitri, 207
Amazon:
Elastic Compute Cloud service, 296
Web Services, 344
American National Standards Institute (ANSI), 76, 87, 155, 371
Andrews, James, 259
AOL Instant Messenger, 247, 249
Apple:
AppSense, 275
Application programming interface (API), 293–294
ArchiveFacebook, 261
Archivematica, 344
Archiving information, 33, 34, 63–64, 85–86, 177, 244–247, 248–249, 261–262, 263, 321–323, 339. See also Long-term digital preservation
Association for Information and Image Management (AIIM), 176
Association of Records Managers and Administrators (ARMA), 6, 20, 28, 34, 62, 71, 72, 147, 155, 176
Auditing:
database auditing tools for, 203
long-term digital preservation audit and certification standards, 325–327
principles of IG including, 26, 30, 32
records and information management including, 30, 32, 150, 183
security functions including, 26, 203, 211, 213, 225, 291
strategic planning including, 63
technology-assisted review, 130
Australasian Digital Recordkeeping Initiative (ADRI), 80
AS 4390-1996 records and information management standard in, 84
AS 5044-2010 metadata standard in, 85
AS 5090:2003 records and information management standard in, 85
AS 8015 IT governance standard in, 19–20, 79, 201
Australian Government Locator Service in, 85
Australian Government Recordkeeping Metadata Standard Version 2.0 in, 84–85
Australian Information Commissioner Act 2010 in, 392
Crimes Act 1914 in, 393
Designing and Implementing Recordkeeping Systems (DIRKS) used in, 62, 80, 155
Electronic Transactions Act 1999 in, 393
Evidence Act 1995 in, 393
Financial Management and Accountability Act 1997 in, 393
Freedom of Information Amendment [Reform] Act 2010 in, 169, 391–392
AS ISO 15489 records and information management standard in, 84, 85
National Archives of Australia in, 80, 393
Office of the Australian Information Commissioner in, 392
records and information management regulations and standards in, 84–85, 149, 150, 303, 391–393
Standards Australia in, 76, 84, 87
standards in, 19–20, 76, 79, 84–85, 201
Bearing Point, 62
Best Buy, 264
Best practices:
for cloud computing, 64
of cross-functional IG implementation team, 62
for disposition of information, 62, 63–64
of executive sponsorship, 63, 65
for IG policy development and enforcement, 62, 75–76, 87–88
for instant messaging, 247–249
for international and national guideline standards usage, 64
for IT functions for IG, 190, 202–203
for long-term digital preservation, 64–65
for maturity model usage, 62
for metadata and taxonomy usage, 64, 190
for ongoing program aspect of IG, 61–62
for privacy protection, 63
for records and information management, 61, 62
for retention of information, 62–63, 64–65
of security functions, 62, 63, 202–203
for social media, 64, 262, 267–268
strategic planning consideration of, 61–65
Big Data, 3–5, 100–101, 106–107, 117, 355
Biometric authentication technologies, 272, 277
Blair, Barclay, 8
Bloomberg Messaging, 247
Bollinger, Bryan, 108
Box, 289
BoxTone, 275
British Standards Institute (BSI), 76, 371
Broddy, William, 216
Business considerations:
business classification schemes as, 368–369
business conditions and economic environment survey, 59–60
business continuity management as, 86–87, 150, 153, 320, 321, 327, 350
business intelligence for, 191, 194
business process analysis as, 377–379
changing information environment as, 97–99
corporate culture impacts as, 107
cost sources impacting, 103–105
data governance impact as, 16
disposition issues related to, 103, 136–137
full cost accounting of, 101–102
IG as good business, 7–8, 110–111
IG-enabled organization positives as, 110–111
impact of successful IG program as, 20–21, 97–112
information-calorie intake analysis as, 108
information cap-and-trade model as, 109
information cost calculations as, 99–100
information value creation as, 105–107
IT functions impacted by, 190, 194, 196–197
legal issues related to, 99–100, 103, 110, 125, 136–137
opportunities and challenges of Big Data as, 100–101, 106–107
professionalism as, 153
records and information management issues related to, 110, 149–150, 153, 303–304, 307–309
security functions related to, 111
SharePoint business objectives as, 303–304, 307–309
strategic plan alignment with, 57–58
taxonomies addressing, 356–357, 368–369, 377–379
unstructured information management as, 97–99, 101–111
BWF (broadcast wave format), 333
Canada:
Canada Revenue Agency, 82, 92, 388, 394
Canadian General Standards Board (CGSB), 92, 394
Canadian Standards Association (CSA), 92
cyberattacks on government of, 207
Electronic Records as Documentary Evidence CAN/CGSB-72.34-2005, 82, 92, 387–388, 394
Evidence Acts in, 82–83, 93, 388–389, 394–395
Fraser Health Authority in, 10
Freedom of Information and Protection of Privacy Act in, 169
Health Information Act in, 169
Library and Archives Canada, 330
Microfilm and Electronic Images as Documentary Evidence CAN/CGSB-72.11-93, 82, 92, 387–388, 394
records and information management regulations and standards in, 82, 92, 150, 303, 387–389, 394–395
records retention citation services in, 44, 138, 139, 178–179
Standards Council of Canada in, 76, 92, 394
standards in, 76, 82–83, 92–93, 387–388, 394
Centrify, 275
China:
instant messaging in, 247
mobile devices in, 271
security issues of files sent to, 229
Cisco Unified Presence, 247
CIS Database Server Benchmarks, 202
Citibank, 278
Citrix, 275
Cloud computing:
application programming interface in, 293–294
best practices for, 64
business considerations for, 285, 297
cloud-based mobile device management, 276
cloud deployment models, 289–290
community, 289
definition and description of, 285–286
disposition and retention issues in, 297, 299–300
employee/insider threats in, 291–292
growth of, 288
guidelines for, 300
hacking and unauthorized access in, 292–293, 295–296
IG policies on, 76, 291, 293, 296, 297–298
information breaches in, 291
information loss in, 290
IT trend analysis of, 59
key characteristics of, 287–288
legal issues with, 297
multitenancy and technology sharing issues in, 294–295
neighbors/other users of infrastructure in, 296–297
private, 289
public, 289
records and information management for, 151, 160, 297, 299–300
security issues with, 213, 224, 285–286, 290–298
Cloud Security Alliance, 290
CobiT® (Control Objectives for Information and related Technology), 18, 111, 197, 198–199, 200
Code of Federal Regulations (CFR), 44–45, 138–140, 178, 386, 387
Communication:
of business and financial cost considerations, 108
of IG policies, 25, 35, 89, 242–243, 248, 282, 352
of instant messaging policies, 248
of inventory goals, 158
of metadata use, 364
of mobile device policies, 282
principles of IG including, 25
of records and information management policies, 31, 158, 169, 313–314
of security functions, 233–234
of SharePoint policies, 313–314
of strategic plan, 55
Compliance, Governance and Oversight Counsel (CGOC), 4, 72, 73
Computer-assisted review, 128–130, 135
Computer Fraud and Abuse Act, 210
Computerworld, 106
Conniff, Richard, 109
Consultative Committee for Space Data Systems, 321
Corporate culture:
business and financial impacts of, 107
IT governance impacted by, 199
legal and e-discovery readiness impacted by, 124
SharePoint usage necessitating changes to, 304–305
strategic planning consideration of, 58
Corporate governance:
data governance in, 15–17, 25, 110, 191–194, 299–300
information governance in, 5, 6, 7, 15, 20 (see also Information governance)
IT governance in, 17–20, 79, 111, 196–201
Costs. See Financial issues
Council of Australasian Archives and Records Authorities, 80
Council of Information Auto-Classification, “Information Explosion” survey, 131
CTIA (The Wireless Association), 271
Customs and Border Protection, U.S., 223
CyberArk, 209
Data architecture, 195
Database activity monitoring (DAM), 203
Database auditing tools, 203
Data governance, 15–17, 25, 110, 191–194, 299–300
Data Governance Institute, 193
Data loss prevention (DLP) technology, 220–222, 227–228, 231, 291, 292
Data Protection Act, 156
Defense in depth, 212
Delivery platforms:
best practices using, 64, 247–249, 262, 267–268, 280–281
cloud computing as, 59, 64, 76, 151, 160, 213, 224, 276, 285–301
disposition of information from, 63–64, 125–126, 244–247, 248–249, 261–262, 263, 297, 299–300
e-mail as (see E-mail)
IG for various, 8, 9, 11, 241–251, 253–268, 271–283, 285–301, 303–314
IG policies applied to, 76, 242–243, 247–249, 257, 258, 259–260, 262–264, 267, 276, 281–282, 291, 293, 296, 297–298, 310–311
instant messaging as, 243, 247–250, 257
IT trend analysis of, 59
legal issues related to specific, 116, 119, 125–126, 243–244, 245, 259–260, 264–267, 282, 297, 303, 307
mobile devices as, 9, 11, 59, 151, 160, 164, 213, 220, 225, 230, 271–283, 298, 303
records and information management on various, 151, 159, 160, 164, 232, 264–267, 297, 299–300, 303–314
removable media as, 159, 164, 223, 277
retention of information on, 64, 126, 175–178, 243–247, 248–249, 261–262, 263, 264–267, 297, 299–300
risk management issues with, 242–243, 257–260
security issues with, 213, 217–218, 220, 223–224, 225, 226–227, 230, 233–234, 241–251, 256–268, 271–283, 285–286, 290–298, 303–314
SharePoint as, 160, 232, 303–314
social media as, 59, 64, 76, 151, 213, 253–268
training in specific, 258, 268, 282, 313
Department of Defense, U.S. (DoD) standards, 76, 80, 81–82, 179
Design Criteria Standard for Electronic Records Management Software Applications, 81
Designing and Implementing Recordkeeping Systems (DIRKS), 62, 80, 155
Device control methods, 227
Digital signatures, 218–219, 220
Digital Systems Knowledge Transfer Network, 271
DISA Security Technical Implementation Guides (STIGs), 202
Disasters, business continuity after, 86–87, 150, 153, 320, 321, 327, 350
Disposition of information:
accountability for, 133
archiving as, 33, 34, 63–64, 85–86, 177, 244–247, 248–249, 261–262, 263, 321–323, 339 (see also Long-term digital preservation)
auto-classification and analytics technologies assisting with, 134–135
business considerations related to, 103, 136–137
cloud computing, specifically, 297, 299–300
costs associated with, 103
discarding as, 34
e-mail, specifically, 63–64, 125–126, 244–247
essential steps to defensible, 136
final disposition and closure criteria, 181–182
IG policies on, 75–76, 121–122
imaging as, 34
information control through, 26
information value increased through appropriate, 106
instant messages, specifically, 248–249
legally defensible, 4–5, 6, 8, 62, 117, 121–122, 125–126, 130–137
proving record destruction in, 183
purging as, 34
records and information management addressing, 28, 33–34, 35, 37, 130–137, 150, 151, 170, 177–178, 179–183, 297, 299–300
shredding as, 34
social media, specifically, 261–262, 263
strategic plan consideration of, 62, 63–64
technologies assisting with, 134–136, 179, 183
volume of information necessitating improved, 131–132
DLM Forum, 84
Document labeling, 26, 231–232
Document life cycle security (DLS) technologies, 291, 292. See also Data loss prevention (DLP) technology; Information rights management (IRM) software
Dropbox, 289
Dublin Core Metadata Initiative (DCMI), 85, 365–366
Economist Intelligence Unit, 8, 105
E-discovery:
costs associated with, 60, 99–100, 103, 123
disposition issues with, 117, 121–122, 125–126
e-discovery process, steps of, 120
Electronic Discovery Reference Model, 62, 72, 119–122
e-mail as, 244
Federal Rules of Civil Procedure impacting, 115–116, 117–118, 119, 150, 265, 303
guidelines for e-discovery planning, 121–122
IG impact on, 123
IG proactive management of, 8
legal hold process impacting, 26, 60, 62, 117, 122–126, 297, 303
predictive coding assistance with, 58, 127–128
retention issues with, 4, 100, 121–126
techniques of, 119
technologies assisting with, 58, 126–130
technology-assisted review assistance with, 128–130
Zubulake v. UBS Warburg on, 119
Eisenberg, Anne, 99
Electronic Code of Federal Regulations (e-CFR), 45, 139–140, 178
Electronic Communications Privacy Act (ECPA), 210
Electronic Discovery Reference Model (EDRM), 62, 72, 119–122
Electronic records management. See Records and information management
E-mail:
as business records, 175–176, 241, 245–246
destructive retention of, 64, 126, 177–178, 246–247
disposition of, 63–64, 125–126, 244–247
information value creation through, 106
legal issues related to, 116, 119, 125–126, 243–244, 245
ownership of, 98
realistic policies on, 243
retention of, 64, 126, 175–178, 243–247
risk management issues with, 242–243
security issues with, 217–218, 223–224, 226–227, 233–234, 241–247
social media distinction from, 257
stream messaging vs., 217–218, 233–234, 236
technology-agnostic policies on, 243
unstructured information management including, 97–99, 106
Employees/staff:
accountability of, 16, 17, 27, 28, 30, 35, 36, 53–54, 88, 133, 192, 267, 309, 311–312, 349–350
communication with (see Communication)
corporate culture among, 58, 107, 124, 199, 304–305
e-mail ownership issues with, 98
executive sponsorship by senior, 16, 25, 28, 30, 53–55, 63, 65, 88, 157, 159, 169, 182, 192, 197, 306, 349–350, 352, 388
IG benefits for, 8
IG continuity plan involving, 350
IG policies for (see Information governance policies)
IG teams/governance bodies including, 11, 35, 38, 55, 56–57, 62, 88, 124–125, 262–263, 281, 306–307, 350
information misuse by, 8–10, 26, 208–210, 228, 229, 242–243, 258–259, 291–292, 320–321
inventory team including, 157, 160
risk profile interviews with, 47–48
stakeholder consultation including, 26–27
training for (see Training)
Encryption, 26, 164, 203, 217, 219–220, 225, 226–227, 228, 276, 277, 281, 291, 294
Enterprise content management (ECM), 149
Environmental Protection Agency, U.S., 101, 153
Etsy, Dan, 109
European Union. See also specific countries
European Broadcasting Union in, 333
mobile devices in, 271
privacy laws in, 398
records and information management regulations in, 303
Executive sponsorship:
continuity of, 350
for IG maintenance, 349–350, 352
for IG policy development and implementation, 88
for inventory of records, 157, 159
for IT governance, 197
key purposes of, 54
as principle of IG, 25, 28, 30
for records and information management, 28, 30, 157, 159, 169, 182, 306, 388
for SharePoint implementation, 306
for strategic planning, 53–55, 63, 65
Facebook, 254, 256, 257, 261, 265
Federal Bureau of Investigation, 9
Federal Deposit Insurance Corporation (FDIC), 280
Federal Information Security Management Act of 2002, 296
Federal Register, 45, 139, 178
Federal Reserve Bank of New York, 244
Federal Rules of Civil Procedure (FRCP):
e-discovery impacts of, 115–116, 117–118, 119, 150, 265, 303
FRCP 1, 117
FRCP 16, 118
FRCP 33, 118
FRCP 34, 118
FRCP 37, 118
Federal Wiretap Act, 210
FedEx, 259
FILELAW®, 44, 138, 139, 178–179
Financial Institution Privacy Protection Act of 2001/2003, 385
accessibility costs as, 104
business considerations based on, 7–8, 16, 20–21, 59–60, 99–112, 125, 136–137
business process structuring costs as, 104–105
classification and organization costs as, 103
cost-benefit analysis of, 20–21, 152
digitization and automation costs as, 103–104
disposition costs as, 103
e-discovery costs as, 60, 99–100, 103, 123
full cost accounting of, 101–102
IG enabling or maturity impacting, 110–111
information cost calculations as, 99–100
information value creation as, 105–107
knowledge transfer costs as, 105
long-term digital preservation costs as, 321
migration to current system costs as, 104
mobile device costs as, 281–282
policy management and compliance costs as, 104
records and information management costs as, 151, 152
retention costs as, 4–5, 99, 104, 131
risk assessment calculating, 48
security breach costs as, 207, 220–221, 227, 271
standards-related costs as, 77
strategic planning of budgets as, 53, 54, 59–60
unstructured information ownership costs as, 102–105
Flash drives. See Removable media
Flickr, 261
Folksonomies, 381
Food and Drug Administration, 386
Ford Motor Company, 9
Forrester Research, 227, 230, 355
France:
privacy laws in, 398
records and information management regulations in, 149
Société Générale breach in, 212
FRCP. See Federal Rules of Civil Procedure
Freedom of Information Act, U.S., 45–46, 156, 169, 210
Friedman, Ted, 5
Frost & Sullivan, 275
Fulbright and Jaworski research, 126, 177
Gartner, Inc., 3, 5, 10, 27, 189, 194, 220, 271, 275, 288, 356
Geithner, Timothy, 244
General Accounting Office (GAO), 173
Generally Accepted Recordkeeping Principles®, 27–35, 36–37, 53, 71, 74, 155, 171
Germany:
privacy laws in, 398
records and information management regulations in, 149
Global Aerospace, Inc., et al. v. Landow Aviation, LP, et al., 127–128
Global Information Locator Service (GILS), 366–367
Good Technology, 275
Google:
Android Marketplace of, 278–279
Android OS of, 271, 272, 276, 279
security breach of, 229
Government Printing Office, 45, 139, 178
GPS (Global Positioning System), 273
Gramm-Leach-Bliley Act, 385
Gruman, Galen, 287
Health Insurance Portability and Accountability Act, 223, 385
Heartland, 296
Homeland Security, U.S., 223
House of Representatives Oversight and Government Reform Committee, U.S., 244
Huawei Technologies, 9
Hypervisors, virtualization, 294–295
Ibas, 208
IBM:
Endpoint Manager for Mobile Devices, 275
Lotus Sametime, 247
Identity access management, 212–213, 272
IG. See Information governance
India:
cyberattacks on government of, 207
mobile devices in, 271
privacy laws in, 399
records and information management regulations in, 149
security issues of files sent to, 229
Indonesia, security of files sent to, 229
Information governance (IG):
auditing in (see Auditing)
Big Data age necessitating, 3–5, 100–101, 106–107, 117, 355
business considerations in (see Business considerations)
communication related to (see Communication)
continuity plan for, 350
continuous improvement to, 27, 34–35, 36–37, 351–352
corporate governance including, 5, 6, 7, 15, 20
data governance distinction from, 15–17 (see also Data governance)
definition and description of, 5–7, 20
delivery platforms for (see Delivery platforms)
disposition of information in (see Disposition of information)
employees working with (see Employees/staff)
executive sponsorship of (see Executive sponsorship)
financial issues in (see Financial issues)
information technology functions in (see Information technology (IT) functions)
IT governance distinction from, 17–20 (see also IT governance)
key points related to, 12, 21–22, 38, 51, 68, 90–91, 111–112, 142–143, 184–186, 204, 234–236, 250–251, 268, 283, 301, 314, 345–346, 352–353, 382
laws and regulations impacting (see Laws and regulations)
legal issues for (see Legal issues)
long-term program issues with (see Long-term program issues)
maintenance of IG program, 349–353
metadata management in (see Metadata)
monitoring in (see Monitoring)
policies for (see Information governance policies)
privacy protection in (see Privacy protection)
records and information management in (see Records and information management)
retention of information and (see Retention of information)
risk management in (see Risk management)
security functions in (see Security functions)
strategic planning and best practices for (see Strategic planning)
taxonomies in (see Taxonomy/common terminology)
training in (see Training)
Information governance policies:
accountability for, 88
best practices for developing and enforcing, 62, 75–76, 87–88
business continuity management under, 86–87
cloud computing under, 76, 291, 293, 296, 297–298
communication of, 25, 35, 89, 242–243, 248, 282, 352
controls, monitoring, auditing and enforcement of, 89–90
cost of development of and compliance with, 104
development of, 10–11, 25, 62, 71–91
disposition under, 75–76, 121–122
Information Governance Reference Model usage for, 62, 72–75
instant messaging under, 243, 247–249
international and national standards impacting, 76–88, 92–93
long-term digital preservation under, 85–86, 326, 327, 337, 338
mobile devices under, 276, 281–282
realistic, 243
records and information management under, 71, 74, 79–86, 92–93, 150–151, 310–311
retention under, 46, 75–76, 85–86, 121–122
risk management under, 46, 62–63, 75, 77
roles and responsibilities for, 88
security function under, 72, 78–79, 213, 214, 221, 222, 224, 233–234, 291, 293, 297–298
social media under, 76, 257, 258, 259–260, 262–264, 267
teams/governance bodies determining, 11, 35, 38, 88
technology-agnostic, 243
Information Governance Reference Model, 62, 72–75
Information life cycle management (ILM), 195. See also Disposition of information; Retention of information
Information management, 194–196, 197
Information rights management (IRM) software, 9, 26, 62, 164, 210, 222–226, 227–228, 229, 291, 292
Information technology (IT) functions:
best practices for, 190, 202–203
business considerations impacting, 190, 194, 196–197
customization of, 190
data architecture as, 195
data governance as, 15–17, 25, 110, 191–194, 299–300
data modeling as, 195–196, 197
delivery platforms for (see Delivery platforms)
IG enabling or maturity impacting, 110–111
information life cycle management as, 195 (see also Disposition of information; Retention of information)
information management as, 194–196, 197
IT governance as, 17–20, 79, 111, 196–201
IT network diagram detailing, 160
IT strategic planning as, 58, 59
IT trend analysis as, 59
master data management as, 194
records and information management relationship to, 151, 160, 164, 176
risk management through, 192, 193, 198
security functions as, 202–203
Information Technology Infrastructure Library (ITIL), 18, 19, 197, 198, 200–201
Inside Out, 342
Insider threats, 8–10, 26, 208–210, 228, 229, 242–243, 258–259, 291–292, 320–321
Instagram, 261
Instant messaging:
disposition and retention of, 248–249
monitoring of, 249
social media distinction from, 257
tips for safer use of, 249–250
Intellectual property, security of, 9, 208–210, 223, 228, 229, 260
Internal Revenue Agency, 296
International Council on Archives (ICA), Principles and Functional Requirements for Records in Electronic Office Environments (Req), 80
International Data Corporation (IDC), 131, 272
International Olympic Committee, 207
International Organization for Standardization (ISO):
best practices on referral to, 64
IG policies impacted by, 76, 77–81, 84
ISO 14721:2003, 321
ISO 14721:2012, 85–86, 318, 325, 333, 334, 335–336
ISO 15489-1:2001, 79–80, 141, 155, 324
ISO 15498:2004, 332
ISO 15836:2009, 365
ISO 16175-1:2010, 141
ISO 16363 (2012), 325–327, 333, 334, 335
ISO 16363:2012, 86
ISO 19005, 331
ISO 19005-1:2005, 85
ISO 23950, 366
ISO 25964, 371
ISO 28500:2009, 333
ISO 31000:2009, 77
ISO/IEC 13818-3:2000, 333
ISO/IEC 27001:2005, 78
ISO/IEC 38500:2008, 19–20, 79, 111, 201
ISO TR 18492 (2005), 86, 324–325
IT governance standards, 19–20, 111, 198, 200–201
long-term digital preservation standards, 85–86, 318, 321, 324–327, 331, 332–333, 334, 335–336
records management standards, 79–81, 84, 85–86, 141, 147, 155, 369
risk management standards, 46, 77
security standards, 78–79, 210
thesauri standards, 371
Inventory of records:
conductor of inventory determined for, 157, 160
definition of, 154
executive sponsorship of, 157, 159
Generally Accepted Recordkeeping Principles® for, 155
information/elements to be collected determination for, 157, 159–160
information location determination for, 157, 163
interviews as method of conducting, 164, 165–166, 167
inventory forms for, 157, 160, 161–163
IT security based on, 202
long-term digital preservation use of, 339
observation as method of conducting, 164
purposes of, 156
records and information management including, 154–168, 173, 202, 339
records value appraisal in, 167–168
results verification and analysis for, 157, 166–168
retention schedule detailed in, 154, 173, 339
surveys as method of conducting, 164
IRC Federal, 242
ISACA (formerly Information Systems Audit and Control Association), 18, 198
ISO. See International Organization for Standardization
IT. See Information technology (IT) functions
IT governance, 17–20, 79, 111, 196–201
IT Governance Institute:
Board Briefing on IT Governance, 17
CobiT® development by, 18, 198
ITIL (Information Technology Infrastructure Library), 18, 19, 197, 198, 200–201
Jabber XCP, 247
Japan:
privacy laws in, 399
records and information management regulations in, 149
Jaquith, Andrew, 230
Jolicloud, 261
JPEG 2000 (joint photographic engineers group) standard, 332–333, 343
Key point summaries, 12, 21–22, 38, 51, 68, 90–91, 111–112, 142–143, 184–186, 204, 234–236, 250–251, 268, 283, 301, 314, 345–346, 352–353, 382
Knorr, Eric, 287
Kortchinksy, Kostya, 295
Labels, documents, 26, 231–232
LANDesk, 275
Laws and regulations. See also specific regulatory bodies; Standards
citation services summarizing, 44, 138, 139, 178–179
cloud computing impacted by, 297
Code of Federal Regulations, 44–45, 138–140, 178, 386, 387
e-mail under, 245
Federal Rules of Civil Procedure, 115–116, 117–118, 119, 150, 265, 303
freedom of information laws as, 45–46, 156, 169, 210, 391–392
IG policies impacted by, 76–88
privacy, 169, 210–211, 297, 385, 392, 397–400
records and information management compliance with, 28, 32, 33, 35, 36–37, 130–142, 149–150, 151, 156, 169, 176–179, 303, 307, 385–395
risk management research and application of, 43–46, 62–63, 123
security functions impacted by, 223, 227, 296
social media impacted by, 265
strategic planning consideration of, 56–57, 60
Legal issues. See also Laws and regulations
Big Data effect on, 117
business considerations related to, 99–100, 103, 110, 125, 136–137
cloud computing-specific, 297
e-discovery as, 4, 8, 26, 58, 60, 62, 72, 99–100, 103, 115–130, 150, 244, 260, 264–265, 297, 303
e-mail-specific, 116, 119, 125–126, 243–244, 245
FRCP impacting, 115–116, 117–118, 119, 150, 265, 303
IG policies impacted by, 76–88
legal hold process as, 26, 60, 62, 117, 122–126, 297, 303
legally defensible disposition of information as, 4–5, 6, 8, 62, 117, 121–122, 125–126, 130–137
mobile device-specific, 282
overview of, 115
privacy protection impacted by, 43–44, 63, 169, 210–211, 297, 385, 392, 397–400
records and information management legal compliance as, 28, 32, 33, 35, 36–37, 130–142, 149–150, 151, 156, 169, 176–179, 303, 307, 385–395
retention impacted by, 4, 26, 33, 43–44, 62–63, 122–126, 137–142, 169, 177–179, 243–244
risk management research and application of, 43–46, 62–63, 123
security functions impacted by, 43–44, 223, 227, 296
SharePoint compliance with, 303, 307
social media-specific, 259–260, 264–267
strategic planning consideration of, 56–57, 60, 62–63, 123
taxonomies addressing, 357
technologies assisting with, 58, 126–130, 134–136
Leslie, Phillip, 108
Library of Congress, U.S., 328, 330, 361, 366, 371–372
Lightweight directory access protocol (LDAP), 226
LinkedIn, 254, 256, 259–260, 262
Long-term digital preservation:
accessibility of information through, 26, 32, 322, 340–341, 343
archiving as, 177, 321–323, 339
audit and certification standards for, 325–327
business continuity issues in, 320, 321, 327
costs of, 321
digital object management in, 326–327
digital preservation infrastructure of, 337–338
digital preservation processes and services of, 339–341
evolving marketplace for, 344
future of, 344
IG policies on, 85–86, 326, 327, 337, 338
integrity of information in, 340, 343
Long-Term Digital Preservation Capability Maturity Model®, 334–341
media obsolescence and renewal in, 320, 339–340, 342–343
metadata in, 318, 328–329, 340, 343
OAIS Reference Model for, 321–323
open standard technology-neutral formats for, 321, 324, 329–333, 338, 342, 343
optimal to nominal stages of preservation in, 335–336
organizational infrastructure of, 325–326
performance metrics for, 341
preservation description information for, 322–323
principles of IG including, 26, 32
producers and users of, 336–337, 344
records and information management addressing, 177, 182, 317–346
requirements for, 333
risk management of, 327
security issues related to, 32, 320–321, 325, 327, 340, 343
standards on, 85–86, 318, 321–333, 334, 335–336
strategic planning including, 59, 64–65, 325, 337
strategies and techniques for, 341–344
technical infrastructure of, 327, 338
trustworthy digital repository for, 339
Long-term program issues:
IG as ongoing, long-term program, 7, 11, 27, 61–62
IG policies addressing, 85–86, 326, 327, 337, 338
long-term digital preservation as, 26, 32, 59, 64–65, 85–86, 177, 182, 317–346
principles of IG including, 26, 32
standards on, 85–86, 318, 321–333, 334, 335–336
strategic plan addressing, 59, 61–62, 64–65, 325, 337
Mah, Paul, 242
Maintenance of IG program, 349–353
Management support. See Executive sponsorship
Managing Electronic Records: Methods, Best Practices and Technologies (Smallwood), 81
Man-in-the-middle attacks, 279, 280
Manning, Bradley, 258
Masking technology, 203
Master data management, 194
Master Data Management (MDM) Institute, 189
Metadata:
best practices for, 64
digital signatures in, 220
Dublin Core Metadata Initiative on, 85, 365–366
Global Information Locator Service on, 366–367
information organization and classification using, 26, 357, 358, 359–368, 370, 375, 381
long-term digital preservation of, 318, 328–329, 340, 343
records and information management use of, 265, 361–368, 370, 375, 381
security issues related to, 220
social media, 265
standards on, 82, 84–85, 328–329, 340, 360–362, 364–368
taxonomy relationship to, 357, 358, 359–360, 367–368, 370, 375, 381 (see also Taxonomy/common terminology)
training and communication in use of, 363–364
MI6, 10
Microsoft:
Active Direction, 226
instant messaging system, 247
Office (Word, Excel, PowerPoint), 215, 216, 232, 261, 329
Office Communications Server, 247
Outlook TwInbox, 261
Visio®, 377
Wave audio format, 333
Windows OS, 272
MIKE2.0, 62
Mobile devices:
3G and 4G interoperability of, 273
anti-virus security measures for, 274, 278
authentication methods for, 277, 280
biometric authentication used with, 277
bring-your-own-device (BYOD) approach to, 275, 281–282, 298, 303
cloud computing via, 298
confidential information removal from, 274–275
costs associated with, 281–282
GPS for, 273
hacking protection for, 276
innovation vs. security for, 279–280
IT trend analysis of, 59
legal issues related to, 282
long-term evolution of, 273
mobile application security for, 277–280
mobile device management of, 273, 275–276
password protection for, 276, 277
push-button applications for, 274
records and information management for, 151, 160, 164
security issues with, 213, 220, 225, 230, 271–283
SharePoint supporting, 303
smartphone applications for, 273
software updates for, 276
solid state drives for, 274
supplemental broadband for, 274
timeout function for, 276, 277
training and communication related to, 282
trends in mobile computing, 273–274
Virtual Private Network hardware and software for, 273
WiMax networks for, 273
MobileIron, 275
Model Requirements for Management of Electronic Records (MoReq2010), 80, 82–83
Monitoring:
database activity monitoring as, 203
data governance plan, 192
instant messaging, 249
maintenance of IG program including, 349–350
principles of IG including, 26, 32
records and information management including, 150, 169
security functions including, 202–203, 209, 249, 295, 296
Montague Institute, 357
Motorola, 9
MPEG-2 (motion picture expert group) standard, 333
MSN instant messaging system, 249
National Archives and Records Administration, 45, 76, 81, 139–140, 141, 154, 172–173, 178, 254, 299, 321, 386–387
Office of the Federal Register, 45, 139–140, 178
National Association of Securities Dealers (NASD), 223
National Institute of Standards and Technology (NIST), 76, 286–287, 296
National Labor Relations Board, 263
National Security Agency, U. S., 8–9, 208, 241–242, 291
Nerney, Chris, 258
Office of Management and Budget, 296
Office of the Federal Register, 45, 139–140, 178
Open archival information system (OAIS), 85–86, 321–323
Organizational culture. See Corporate culture
Osterman Research, 126, 176, 177
Pace, Nicholas M., 99
Passwords, computer, 215, 276, 277, 295
PATRIOT Act, 386
Payment Card Industry Data Security Standard (PCI-DSS), 227
PDF995, 262
PDFCreate, 262
Peck, Andrew, 135
Pew Research Center, 101
Picasa, 261
PNG (portable network graphics) format, 332
Policies. See Information governance policies
Political environment, 60. See also Laws and regulations; specific governments by country name
Portable storage devices. See Removable media
Predictive coding, 58, 127–128
PREMIS preservation metadata standard, 328–329, 340
PrimoPDF, 262
Principles of information governance:
accountability as, 27, 28, 30, 35, 36
continuous improvement as, 27, 34–35, 36–37
executive sponsorship as, 25, 28, 30
Generally Accepted Recordkeeping Principles® as, 27–35, 36–37
information accessibility as, 26, 28, 32, 35, 37
information control as, 26
information governance monitoring and auditing as, 26, 30, 32
information integrity as, 25, 28, 31, 35, 36
information organization and classification as, 25–26
information policy development and communication as, 25
information security as, 26, 28, 32, 35, 36
stakeholder consultation as, 26–27
team/governance body for implementing, 35, 38
Privacy protection:
best practices for, 63
failures of, 10
IG policies addressing, 72, 264
instant messaging policy on, 248
legal requirements for, 43–44, 63, 169, 210–211, 297, 385, 392, 397–400
perimeter security limitations impacting, 211
personally identifiable information (PII) in, 26, 43–44, 210, 297, 385
principles of IG including, 26
risk management consideration of, 43–44, 63
security function of, 9, 10, 26, 43–44, 63, 72, 169, 207, 210–211, 248, 264, 297, 385, 392, 397–400
social media, 264
strategic planning consideration of, 63
PRONON program, 330
Quest Software, 248
Records and information management:
accountability for, 28, 30, 35, 36, 53, 133, 309, 311–312
adoption and compliance with, 168–169
assessment and improvement roadmap for, 34–35, 36–37
audit process for, 30, 32, 150, 183
availability of records through, 28, 32, 35, 37, 151, 309
business considerations related to, 110, 149–150, 153, 303–304, 307–309
challenges of, 150–151, 304–306
cloud computing issues with, 297, 299–300
communication related to, 31, 158, 169, 313–314
definition of, 147
delivery platforms impacting, 151, 159, 160, 164, 232, 264–267, 297, 299–300, 303–314
disposition requirements in, 28, 33–34, 35, 37, 130–137, 150, 151, 170, 177–178, 179–183, 297, 299–300 (see also Disposition of information)
enterprise content management relationship to, 149
executive sponsorship of, 28, 30, 157, 159, 169, 182, 306, 388
Federal Rules of Civil Procedure impacting, 150, 265, 303
Generally Accepted Recordkeeping Principles® for, 27–35, 36–37, 53, 71, 74, 155, 171
IG policy relationship to, 71, 74, 79–86, 92–93, 150–151, 310–311
integrity of, 28, 31, 35, 36, 340, 343, 389
inventory of records in, 154–168, 173, 202, 339 (see also Inventory of records)
IT relationship to, 151, 160, 164, 176
legal and policy compliance through, 28, 32, 33, 35, 36–37, 130–142, 149–150, 150–151, 156, 169, 176–179, 303, 307, 385–395
long-term (see Long-term program issues)
maturity levels/model of, 29, 34, 36–37, 62, 334–341
metadata in, 265, 361–368, 370, 375, 381
protection or security of records in, 28, 32, 35, 36, 151, 202, 215, 232, 297 (see also Security functions)
records groupings rationale in, 174, 368
records series identification and classification in, 174–175
retention requirements in, 28, 32–33, 35, 37, 85–86, 137–142, 150, 151, 154, 167–168, 169–183, 264–267, 297, 299–300, 368, 369 (see also Retention of information)
risk management through, 158
SharePoint for, 160, 232, 303–314
social media-specific, 151, 264–267
standards on, 79–86, 92–93, 141, 147, 155, 179, 364–365, 369, 387–389
taxonomies in, 134, 355–360, 367–381
transparency of, 28, 31, 35, 36
user assistance and compliance with, 151, 164–167, 307
Reference data management, 196
Regulations. See Laws and regulations
Removable media, 159, 164, 223, 277
Research Library Group, 328
Retention of information:
auditing of, 183
best practices for, 62–63, 64–65
classification of records for, 173–175
cloud computing, specifically, 297, 299–300
destructive, 64, 126, 177–178, 246–247
disposition vs. (see Disposition of information)
e-mail, specifically, 64, 126, 175–178, 243–247
event-based impact on, 179–181
Generally Accepted Recordkeeping Principles® for, 28, 32–33, 35, 37, 171
IG policies on, 46, 75–76, 85–86, 121–122
implementation of retention schedule, 182–183
information control through, 26
instant messages, specifically, 248–249
inventory of records detailing, 154, 173, 339
legal requirements for, 4, 26, 33, 43–44, 62–63, 122–126, 137–142, 169, 177–179, 243–244
long-term digital preservation for, 26, 32, 59, 64–65, 85–86, 177, 182, 317–346
need for retention schedules, 171–173
ongoing maintenance of retention schedule for, 183
principles of retention scheduling, 169–170
records and information management addressing, 28, 32–33, 35, 37, 85–86, 137–142, 150, 151, 154, 167–168, 169–183, 264–267, 297, 299–300, 368, 369
records groupings rationale related to, 174, 368
records retention citation services on, 44, 138, 139, 178–179
records series identification and classification for, 174–175
records value appraisal for, 167–168
retention period/duration/schedule of, 33, 46, 63, 126, 137–138, 140–142, 154, 169–183, 266, 339, 368, 369
risk management consideration of, 43–44, 46, 63, 100
social media, specifically, 261–262, 263, 264–267
steps for retention schedule development, 171–173
strategic planning consideration of, 59, 62–63, 64–65
technologies assisting with, 183
transitory record retention as, 182
Reuters Messaging, 247
Risk management:
corporate culture on risk tolerance in, 58
data governance role in, 192, 193
delivery platform impacting, 242–243, 257–260
heat maps in, 47
IG policy relationship to, 46, 62–63, 75, 77
inventory of records for, 158
IT functions role in, 192, 193, 198
legal and policy research and compliance in, 43–46, 62–63, 123
long-term digital preservation consideration of, 327
metrics and results measurements in, 50, 63
privacy issues addressed through, 43–44, 63
retention of information addressed through, 43–44, 46, 63, 100
risk analysis and assessment in, 48–49, 192
risk maps in, 47
risk mitigation plan auditing in, 51, 63
risk mitigation plan development in, 49, 63
risk mitigation plan execution in, 50
risk profile creation in, 46–48, 63
security issues addressed through, 43–44, 213, 327
strategic planning consideration of, 58, 62–63
top-10 lists in, 47
Rutkowska, Joanna, 295
Safety Deposit Box, 344
SAP Afaria MDM, 275
Sarbanes-Oxley Act of 2002 (SOX), 149, 223, 245, 386
Securities and Exchange Commission, Rule 17A-4, 386
Security functions:
accessibility balanced with, 26, 32, 151, 203, 212–213, 215–216, 224
anti-virus security measures as, 274, 278
application programming interface as, 293–294
auditing as, 26, 203, 211, 213, 225, 291
best practices of, 62, 63, 202–203
biometric authentication technologies as, 272, 277
blueprint and CAD document protection as, 228–229
business considerations related to, 111
costs of security breaches, 207, 220–221, 227, 271
cyberattack proliferation necessitating, 207–208
data loss prevention technology as, 220–222, 227–228, 231, 291, 292
defense in depth as, 212
deletion of files as, 215
delivery platforms impacting, 213, 217–218, 220, 223–224, 225, 226–227, 230, 233–234, 241–251, 256–268, 271–283, 285–286, 290–298, 303–314
device control methods as, 227
digital signatures as, 218–219, 220
document analytics as, 232–233
document life cycle security technologies as, 291, 292
embedded protection as, 226–227, 231
employee information misuse necessitating, 8–10, 26, 208–210, 228, 229, 242–243, 258–259, 291–292, 320–321
encryption as, 26, 164, 203, 217, 219–220, 225, 226–227, 228, 276, 277, 281, 291, 294
external access blockage as, 215–216
hybrid approach to, 227
identity access management as, 212–213, 272
IG addressing, 8–10, 26, 207–236
IG enabling or maturity impacting, 111
IG policy relationship to, 72, 78–79, 213, 214, 221, 222, 224, 233–234, 291, 293, 297–298
information rights management software as, 9, 26, 62, 164, 210, 222–226, 227–228, 229, 291, 292
innovation balanced with, 279–280
internal price list protection as, 229–230
legal requirements for, 43–44, 223, 227, 296
long-term digital preservation security issues, 32, 320–321, 325, 327, 340, 343
masking technology for, 203
monitoring as, 202–203, 209, 249, 295, 296
outside the organization security approaches as, 230–231
password protection as, 215, 276, 277, 295
perimeter security limitations impacting, 211, 214
persistent, 222–226, 228–229 (see also Information rights management (IRM) software)
principles of IG including, 26, 28, 32, 35, 36
print file security as, 216–217
privacy protection as, 9, 10, 26, 43–44, 63, 72, 169, 207, 210–211, 248, 264, 297, 385, 392, 397–400
protected data as, 231
protected process as, 230
records and information management protection as, 28, 32, 35, 36, 151, 202, 215, 232, 297
repository-based approach to, 214–215
risk management consideration of, 43–44, 213, 327
strategic plan consideration of, 62, 63
stream messaging as, 217–218, 233–234, 236
technologies improving, 215–217
thin devices as, 230
trade secret protection as, 228, 260
training in, 209, 228, 233–234, 236
Security Technical Implementation Guides (STIGs), 202
SharePoint:
accountability/responsibility for, 309, 311–312
business objectives of, 303–304, 307–309
challenges of implementing, 304–306
communication related to, 313–314
corporate culture changes necessitated by, 304–305
guiding principles for, 308–309
IG policy relationship to, 310–311
legal and policy compliance through, 303, 307
planning process for use of, 306–310
process established for use of, 312
records and information management including, 160, 232, 303–314
scope of deployment of, 309–310
training in, 313
Signatures, digital, 218–219, 220
Singapore:
privacy laws in, 399
Standards Singapore in, 87
SkyDrive, 289
Snapchat, 255
Snowden, Edward, 9, 208, 241–242
SocialFolders, 261
Social media:
accountability for, 267
best practices for, 64, 262, 267–268
as business records, 260, 265–266
content control models for, 267–268
disposition and retention of, 261–262, 263, 264–267
e-mail and instant messaging distinction from, 257
enterprise use of, 256
IG policies on, 76, 257, 258, 259–260, 262–264, 267
IT trend analysis of, 59
legal issues related to, 259–260, 264–267
privacy expectations for, 264
records and information management for, 151, 264–267
risk management issues with, 257–260
security issues with, 213, 256–268
Sorensen, Alan, 108
Space Data Information Transfer System-Open Archival Information System (OAIS) Reference Model, 321–323
Spear phishing, 202
SQL injections, 202
Staff. See Employees/staff
Standards. See also Laws and regulations
American National Standards Institute (ANSI), 76, 87, 155, 371
best practices for usage of, 64
British Standards Institute (BSI), 76, 371
on business continuity management, 86–87
de jure vs. de facto, 76
Dublin Core Metadata Initiative standards, 85, 365–366
Global Information Locator Service standard, 366–367
IG policies impacted by, 76–88, 92–93
International Organization for Standardization (ISO), 18, 19–20, 46, 64, 76, 77–81, 84, 85–87, 111, 141, 147, 155, 198, 200–201, 210, 318, 321, 324–327, 331, 332–333, 334, 335–336, 364–366, 369, 371
on IT governance, 19–20, 79, 111, 198, 200–201
on long-term digital preservation, 85–86, 318, 321–333, 334, 335–336
major national and regional, 81–87 (see also under specific countries)
on metadata, 82, 84–85, 328–329, 340, 360–362, 364–368
National Institute of Standards and Technology (NIST), 76, 286–287, 296
open standard technology-neutral, 321, 324, 329–333, 338, 342, 343
PREMIS preservation metadata standard, 328–329, 340
on records and information management, 79–86, 92–93, 141, 147, 155, 179, 364–365, 369, 387–389
on security functions, 78–79, 210
Space Data Information Transfer System-Open Archival Information System (OAIS) Reference Model, 321–323
Standards Australia, 76, 84, 87
Standards Council of Canada, 76, 92, 394
Standards Singapore, 87
on thesauri, 371
U.S. Department of Defense, 76, 80, 81–82, 179
Storage of information. See Retention of information
Stored Communications and Transactional Records Act (SCTRA), 210
Strategic planning:
budgets/financial considerations in, 53, 54, 59–60
business conditions and economic environment survey in, 59–60
communication of, 55
corporate culture consideration in, 58
disposition consideration in, 62, 63–64
execution of, 67
executive sponsorship of, 53–55, 63, 65
external factors survey and evaluation in, 58–65
IG team building and responsibilities in, 55, 56–57, 62
industry best practices analysis in, 61–65
IT trend analysis in, 59
legal issues consideration in, 56–57, 60, 62–63, 123
long-term program issues in, 59, 61–62, 64–65, 325, 337
metadata and taxonomy consideration in, 64
organizational and IG strategic plan alignment, 57–58
project manager role in, 54–55, 56
retention of information consideration in, 59, 62–63, 64–65
risk management consideration in, 58, 62–63
security function consideration in, 62, 63
strategic plan formulation, 65–67
Stream messaging, 217–218, 233–234, 236
SVG (scalable vector graphics) format, 332
Symantec Mobile Management Suite, 275
Taxonomy/common terminology:
auto-classification for, 356
business classification scheme or file plan using, 368–369
business process analysis for development of, 377–379
definition of, 355
disposition of information use of, 134
faceted, 376
folksonomies as, 381
hybrid, 376
information organization and classification using, 26, 355–360, 367–381
metadata relationship to, 357, 358, 359–360, 367–368, 370, 375, 381 (see also Metadata)
navigation using, 357
need for new, 358
records and information management use of, 134, 355–360, 367–381
search results improvement through, 358–359, 367–368
security functions use of, 231
successful IG program including, 21
Technology-assisted review (TAR), 128–130, 135
Tessella Technology & Consulting, 344
Texas Children's Hospital, 10
Thin devices, 230
Thumb drives. See Removable media
TIFF (tagged image file format), 331–332
Trade secret protection, 228, 260. See also Intellectual property, security of
Training:
in business and financial cost considerations, 108
of IG team/governance body, 35
in inventorying records, 157
in metadata, 363
in mobile device policies, 282
in records and information management, 31, 169, 313
in security related to IG, 209, 228, 233–234, 236
in SharePoint, 313
TweetTake, 261
TwInbox, 261
Twitter, 254, 255, 256, 257, 258, 259–260, 261
United Kingdom:
British Standards Institute (BSI) in, 76, 371
BS 8723 thesauri standard in, 371
BS 15000 IT governance standard in, 200
BS 25999-2 business continuity standard in, 87
Digital Systems Knowledge Transfer Network in, 271
Freedom of Information Act 2000 in, 46, 169, 210
MI6 in, 10
Model Requirements for Management of Electronic Records (MoReq2010) in, 80, 82–83
National Archives of, 330
National Health Service in, 10
records and information management regulations and standards in, 80, 82–83, 150, 303, 389–391
standards in, 76, 83–84, 87, 200, 371
United States:
Code of Federal Regulations of, 44–45, 138–140, 178, 386, 387
Customs and Border Protection of, 223
cyberattacks on/by government of, 207, 208
Department of Defense of, 76, 80, 81–82, 179
Environmental Protection Agency of, 101, 153
Food and Drug Administration of, 386
General Accounting Office of, 173
Government Printing Office of, 45, 139, 178
Homeland Security of, 223
House of Representatives Oversight and Government Reform Committee of, 244
information governance in (see Information governance)
Internal Revenue Agency of, 296
laws and regulations of (see Laws and regulations)
Library of Congress of, 328, 330, 361, 366, 371–372
National Archives and Records Administration of, 45, 76, 81, 139–140, 141, 154, 172–173, 178, 254, 299, 321, 386–387
National Security Agency of, 8–9, 208, 241–242, 291
Office of Management and Budget of, 296
Office of the Federal Register of, 45, 139–140, 178
political environment in, 60
Securities and Exchange Commission of, 386
U.S. Protection Profile for Authorization Server for Basic Robustness Environments in, 213
Verizon, 274
ViaLumina, 105
Virtual Private Network (VPN), 273, 286
W3C Internet Engineering Task Force, 332
WebARChive (WARC), 333
WiMax (Worldwide Interoperability for Microwave Access) networks, 273
World Economic Forum, 3
XML (extensible markup language), 329, 331
Yahoo! instant messaging system, 247, 249
Zakaras, Laura, 99
Zornes, Aaron, 189
Zubulake v. UBS Warburg, 119
3.144.110.155