INDEX

  • 3G/4G interoperability, 322
  • Abatan, Peter, 271
  • Accenture, IG failure, 13–14
  • Access, 419
    • authorization, absence, 346–347
    • control methods, 32
    • GAPP criterion, 45
    • rights policies, development/updating, 115
  • Access control, 95
    • identity access management, usage, 254–255
  • Accountability, 234
    • GAR Principle component, 35, 37–38, 88
  • Accounting business-unit taxonomy, 454f
  • Actionable plans, development, 82
  • Active Directory Federation Services (ADFS), 354
  • Administration, decentralization, 267
  • Administrative metadata, 440
  • Adverse events, financial/operational impact (determination), 58
  • Adverse inference, 139
  • Agent-based solutions, usage, 264
  • Agreed-on trigger events, automated capture, 203
  • Amazon Machine Learning, 363
  • American Institute of Certified Public Accountants (AICPA), 45
  • American National Standards Institute (ANSI), 93, 449
  • American Recovery and Reinvestment Act, 241
  • Analytics, 357, 359–363
    • leverage, 79, 92
    • technologies, 155
  • Anonymous social networks, usage, 302
  • Anthem, Inc., IG failure, 12–13
  • Anticipation (executive sponsor purpose), 70
  • Anti-virus (mobile computing trend), 323
  • Apple iOS, usage, 326
  • Application programming interface (API), 218, 345
  • Applications catalogue, 188–189
  • Approval (executive sponsor purpose), 70
  • Archival information package (AIP), 398–403
  • Archival storage, 398, 415
  • Archive
    • disposition method, 41
    • management, 188
  • Archives Act, 469
  • ArchivesSocial, 310
  • Archiving technology, 289
  • ARMA International, 88, 118, 171, 198
    • GAR Principles, 91
  • Artificial intelligence as a service (AIaaS), 363
  • AS 8015, principles, 96
  • Asia-Pacific Economic Cooperation (APEC), 243–244
  • Asia, privacy, 243–244
  • Asset management, 95
  • Associates in Psychiatry and Psychology (APP), IG failure, 11
  • Audience, identification, 441
  • Auditing, 267
  • Auditor, usage, 150
  • Australasian Digital Recordkeeping Initiative (ADRI), 96
  • Australia
    • Archives Act, 469
    • Crimes Act, 471
    • Electronic Transactions Act, 471
    • Evidence Act, 471
    • Financial Management and Accountability Act, 471
    • Freedom of Information Act (FOIA), 469–470
    • Information Commissioner Act, 470
    • Privacy Act, 470
    • records management, laws/regulations, 469–471
  • Australian ERM standards, 101–102
  • Australian Government Locator Service (AGLS), 102
  • Australian Information Commissioner Act, 470
  • Australian records standards, development, 102
  • Australian standards, 102
  • Authentication, authorization, and audit (AAA) controls, 342
  • Auto-categorization analytics software, implementation, 116
  • Auto-classification, 155, 157, 365, 434
  • Automatic archiving, usage, 288–291
  • Automation, 126
  • Availability (GAR Principle component), 35, 40, 88
  • Azure Active Directory service, 354
  • Backups, 11
  • Backward compatibility, 418
  • Barnhart, Brent, 300
  • Best practices, 15, 91–92, 315–316, 330
  • Better Business Bureau, 232
  • Big Data, 75, 216, 358, 372
    • challenges, 88
    • data debris/information, value (loss), 79–80, 92
    • impact, 5–7, 137–138
    • opportunities/challenges, 122–123
    • tools/techniques, 128
  • Bitstream, 399
    • readability (maintenance), device/media removal (usage), 418
  • Blockchain, 357, 366–372
    • interrelated solution layers, 371f
    • solution, 369–371, 370f
    • technology, 366
  • Blogs, 308, 314
  • Blue Pill root technique, 346
  • Blueprints, protection, 271–272
  • Botnets, impact, 344
  • Brand equity, preservation/protection, 116
  • Breaches, 56
  • Bring-your-own-device (BYOD), 324–325, 331, 340, 349
  • British Standards Institute (BSI), 92–93, 449
  • Broadcast Wave Format (BWF), 409
  • Broad network access, 337
  • Brown, Jerry, 243
  • Budget (executive sponsor purpose), 70
  • Build and maintain (Navy Yard rebirth phase), 127, 128
  • Business, 76–77, 196, 212, 276, 397
    • activity, support (e-mail documentation), 198
    • goals/objectives (support), IG driving programs (creation), 82–83
    • IM use, best practices, 292–293
    • objective alignment, usage, 115–116
    • plans, change, 430
    • running, professionalism, 168
    • terms, usage (standardization), 212
  • Business Associates (BA), 240
  • Business classification scheme (BCS), 446–447
  • Business continuity (BC), 7, 87, 164
  • Business continuity management (BCM), 104
  • Business intelligence (BI), 131, 214
  • Business processes, 55, 126, 453–456
    • automation, 166
    • example, travel expense process, 456f
    • redesign, 79, 80, 92
  • Business process improvement (BPI) opportunities, 456
  • Business process management system (BPMS) software, 34
  • Business units, 26, 115
    • candidates, 117
    • data quality, accountability assignment, 21, 215
  • California Consumer Privacy Act (CCPA), 3, 14, 161, 242–243
  • Canada, records management (laws/regulations), 466
  • Canada Revenue Agency, 99, 466
  • Canadian Institute of Chartered Accountants (CICA), 45
  • Canadian Records Retention Database (excerpt), 201f
  • Capture, 39
  • Center for Internet Security (CIS), 250–251, 349–350
    • Database Server Benchmarks, 224
    • Mobile Companion Guide, release, 349
  • Certificate authority (CA), certificate issuance, 261
  • Certification and accreditation (C&A) report, 348
  • Certification checklists, 93
  • Certified Ethical Hacker (CEH), 252
  • Certified Information Privacy Manager (CIPM), 239
  • Change management (CM), 21, 33, 396, 426–429
  • Channel messaging, solutions, 294–295
  • Chief Information Governance Officer (CIGO), impact, 106, 425
  • Chief Information Security Officer (CISO), 64
  • Chief knowledge officer (CKO), 72
  • Children's Online Privacy Protection Act (COPPA), 242
  • Chipotle Mexican Grill, IG failure, 11–12
  • Choice/consent (GAPP criterion), 46
  • CIS Top 20, 62t, 116
  • Civil litigation, requirements, 164
  • Classification, 162, 435
    • micro-classification, avoidance, 185
  • Clean (Navy Yard rebirth phase), 127
  • Clinton, Hillary (email usage), 288
  • Closure, 203–204
  • CloudBurst, 346
  • Cloud computing, 165, 336–341
    • documents/records, management, 351
    • hacking, 344
    • information, 335, 341–342
    • insider threats, 343
    • rogue intrusions, 344
    • security threats, 341–350, 352
    • solutions, 351–352
  • Cloud connection, insecure points, 344–345
  • Cloud Controls Matrix (Cloud Security Alliance), 250
  • Cloud deployment models, 339
  • Cloud file storage, 340
  • Cloud Machine Learning, 363
  • Cloud Security Alliance, 341
  • Cloud services, 344
  • Code of Federal Regulations (CFR), 58, 200–201, 464–465
  • Collection
    • GAPP criterion, 46
    • limitation principle, 233
    • policy, 401
  • Committee of Sponsoring Organizations of the Treadway Commission (COSO), 23
  • Communications, 95
    • encryption, 325
    • plan, creation, 441–442
    • systems/network communications failure, 396
  • Community cloud, 339
  • Community government business-unit taxonomy, 452f
  • Complexity fees, 124
  • Compliance, 95, 126, 165, 270
    • culture, maintenance, 425
    • GAR Principle component, 35, 39–40, 88
    • IG best practices, 223–225
    • management, audit, 206
    • research, 200–201
    • risks/costs, excess, 117
  • Compliance, Governance and Oversight Council (CGOC), 6, 79, 88, 118, 137
  • Component obsolescence, 396
  • Computer-aided design (CAD), 266, 271–272
  • Computer-assisted review, 135
  • Computer systems, failure, 396
  • Conceptual data modeling approach, 219
  • Confidential data, large print files (security issues), 258–259
  • Confidential documents, theft, 13
  • Confidential e-documents, challenge, 256–257
  • Confidentiality Integrity Availability (CIA) triad, 45
  • Confidentiality National Health Service (NHS), code of practice, 245
  • Confidential stream messaging, 275–276
  • Consensus mechanism, 367
  • Consultative Committee for Space Data Systems, OAIS development, 397
  • Consumer review networks, usage, 301
  • ContentandCode, 304
  • Content control, 316
  • Content, impact, 195
  • Content management principles, 315–316
  • Content services, 163
  • Contextual enforcement, 273
  • Continuous improvement, 33–34, 430
  • Continuous process improvement (CPI), 429
  • Controlled vocabulary, 436
  • Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM), 242
  • Control Objectives for Information and (related) Technology (COBIT®), 22–23, 220–221
  • Corporate governance, 8
  • Corporate memory, preservation, 167
  • Corporate objectives, 115, 116
  • Corporate-owned, personally enabled (COPE) devices, 349
  • Cost factors, 125f
  • Cost sources, 125–126
  • Council of Information Auto-Classification, “Information Explosion,” 152
  • Covered Entities (CE), 240
  • Credit card information (PCI), 30
  • Crimes Act, 471
  • Cross-functional communications, promotion, 315
  • Cross-functional IG council, establishment, 78, 92
  • Cross-functional IG team, creation, 145
  • Cross-functional mobile strategy team, formation, 331
  • Cross-mapping scheme, 446
  • Culture, establishment, 145
  • Current state capabilities, 410
  • Customer relationship management (CRM), usage, 327
  • Custom taxonomies, prebuilt taxonomies (contrast), 448–449
  • CyberArk, 248
  • Cyberattacks, proliferation, 246
  • Cybersecurity, 116, 245, 376
    • assessments, 250–252
    • considerations/approaches, 253–254
  • Cyber-security process, accountability, 56
  • Dashboards, usage, 124
  • Da Silva Moore v Publicis Groupe, 155
  • Data
    • access, right, 477
    • analytics, 357–358
    • architecture, 217–218
    • asset, uniqueness (recognition), 21
    • breach, 214, 477
    • categories, 219f
    • cleansing/scrubbing, 20, 213
    • debris, deletion, 79–80, 92
    • growth, 152–154
    • information, value (loss), 79–80
    • integration (data modeling approach), 219
    • management, 398
    • map, 195
    • modeling, 218–219, 218f
    • portability, 477
    • privacy, 169–171, 190
    • protected data, data security design pattern, 273
    • protection, 26, 190, 225, 478
    • quality, 215, 233
    • securing, approaches, 272–274
    • stewardship, 20
    • type, 236
    • value, computation, 214
  • Database
    • compliance, IG best practices, 223–225
    • security, 223–225, 270
    • strengthening, 224
  • Database activity monitoring (DAM), usage, 224–225
  • Data Controller (DC), 239
  • Data governance, 19–21, 213–215
    • efforts, focus, 79, 92
    • Information governance/IT governance, difference, 19
  • Data Governance Institute (DGI) data governance framework, 215, 216f
  • Data loss prevention (DLP), 26, 130, 224, 263–265
    • IRM, combination, 270
    • technology, 181, 262–265
  • Data Protection Act, 172, 245
  • Data Protection Officer, 478
  • Data quality, 21, 79
  • Decentralized architecture, 367
  • Decision-based processes, 181
  • Decision making
    • executive sponsor purpose, 70
    • improvement, analytics (leverage), 79, 92
  • De-duplication, 20, 213
  • Deep learning, 363
  • Defense in depth, 254
  • Defensibility, end state, 156–157
  • Defensible deletion, 145
  • Defensible disposal, 151
  • Defensible disposition, 135, 146, 153, 157
  • Deleted files, location, 258
  • Deposit agreements, 402
  • Descriptive analytics, 357, 358
  • Descriptive metadata, 440
  • Design and Implementation of Recordkeeping Systems (DIRKS), 96, 171
  • Device
    • control methods, 269
    • media renewal, 415
  • Diagnostic analytics, 357, 358
  • Digital content, indexing, 155
  • Digital information assets, preservation, 81, 92
  • Digital preservation, 393
    • capabilities, 410f, 411–412
    • capability maturity model, 412f
    • capability performance metrics, 416–417
    • infrastructure, 413–414
    • performance metrics, 417t
    • policy, 413
    • processes/services, 415–416
    • requirements, 409
    • standards, 397–403
    • strategies, 413, 417–419
    • techniques, 417–419
  • Digital records, 98, 155
  • Digital repository, 414–415, 419–420
  • Digital signatures, 34, 261–262
  • Digital subject access request (dSAR), 26
  • Digitization, 126
  • Direct observation, usage, 180
  • Disaster recovery (DR), 7
  • Discard (disposition method), 41
  • Disclosure (third parties) (GAPP criterion), 47
  • Discovery
    • costs, increase, 153
    • phase, 135
  • Disposition, 126, 162, 192
    • capabilities, 203
    • event-based disposition, prerequisites, 202–203
    • event-based retention scheduling, 201–202
    • final disposition criteria, 203–204
    • improvement, 156
    • timing, 205
  • Disposition (GAR Principle component), 36, 41–42, 88
  • Dissemination information package (DIP), 398, 414
  • Distributed ledger technology (DLT), 367
  • Dixon, Helen, 238
  • DLM Forum, 101
  • Document life cycle security (DLS) technology, 248, 342
  • Documents
    • analytics, 275
    • document type, term (usage), 196
    • encryption, 262
    • governance efforts, 31
    • integrity/trustworthiness, 166
    • labeling, 274–275
    • management, 7, 351
    • records, contrast, 442
  • Dominant principle, 466
  • Dublin Core Element Set, 444
  • Dublin Core Metadata Initiative (DCMI), 102, 442–444
  • Early case assessment (ECA), 74, 83
    • e-discovery phase, 147
  • Economic environment, survey, 76–77
  • E-discovery, 10, 125, 135
    • assistance, technologies (usage), 147–151
    • collection, 63, 365
    • costs, 74, 124
    • dangers, 378
    • Federal Rules of Civil Procedure, 135–137
    • information governance (IG), 143–146, 143t–144t
    • issues, 377–380
    • legal case, 139
    • life cycle, 144
    • plan, development/execution, 143
    • planning, guidelines, 142–143
    • process, steps, 140
    • readiness, 145–146
    • review, 365
    • techniques, 140
    • usage, 146
  • E-Discovery Reference Model (EDRM), 140–143, 141f
  • E-documents, 6
    • external access, cessation, 258
    • protection, 257
    • repository-based approaches, limitations, 256–257
    • securing, challenge, 256–257
    • security, 80, 265
  • Elastic Compute Cloud service, usage, 34
  • Electronically stored information (ESI), 136, 140, 164, 199
  • Electronic Code of Federal Regulations (e-CFR), 201
  • Electronic Communications Privacy Act (ECPA), 244–245
  • Electronic content, migration, 400
  • Electronic document and records management systems (EDRMS), 97, 101, 447
  • Electronic records
    • inventory survey form, 178f–179f
    • management, challenges, 395
    • survey, 415
  • Electronic Records as Documentary Evidence (CAN/CGSB-72.34-2017), 99
  • Electronic records management (ERM), 31, 80, 161, 433, 438
    • agreed-on trigger events, automated capture, 203
    • Australian ERM, 101–102
    • benefits, 166–167
    • Canadian standards, 99–100
    • importance, 173
    • intangible benefits, 167–168
    • legal considerations, 99–100
    • retention/disposition capabilities, 203
    • software, usage, 34
    • system, acquisition/implementation, 174
    • system/application, 314
    • usage, 80
  • Electronic records management systems (ERMS), 101
  • Electronic Transactions Act, 471
  • E-mails, 287
    • archiving, 289
    • bucket approach, 291
    • destructive retention, 80, 147, 199–200, 290–291, 921
    • documentation, 198
    • encryption, 259, 273
    • information governance, usage, 285
    • integrity/admissibility (preservation), automatic archiving (usage), 288–291
    • messages, 80, 92, 197
    • records, 197–199, 290
    • retention period, 147, 199
    • risk, organizations (employee exposure), 286
    • social media, contrast, 305
  • Embedded protection, 268–270
  • Emerging technologies, leveraging/governing, 357
  • Empirical metrics, 401
  • Employees
    • social media security threat, 306–307
    • training, 116
  • Emulation, 418
  • Encryption, 92, 269, 342
  • Endpoint management, unification, 325
  • Enforcement, technology application, 14–15
  • Enterprise content management (ECM), 33, 256–257
    • ERM component, 163
    • software, 314
  • Enterprise data, 219, 273
  • Enterprise file synch and share (EFSS), 33
  • Enterprise information security practices, direct connection, 56
  • Enterprise mobility management (EMM), 321, 325, 350
  • Enterprise resource planning (ERP) database, 120
  • Enterprise, social media (usage), 304–305
  • Environmental Protection Agency (EPA), 167
  • Environmental security, 95
  • Equity value, protection, 56
  • E-records
    • disposition, event-based retention scheduling, 201–202
    • inventory, challenges, 172
    • inventorying, 168–169
    • management, 96–98
    • retention, legal issue, 287–288
    • shadow copies, 172
  • Etsy, Dan, 129
  • European Broadcasting Tech 3285: 2011 Broadcast Wave Format, 409
  • European Research Cluster on the Internet of Things, 374
  • European Union (EU) General Data Protection Regulation (GDPR), 3, 31, 235–239, 476–478
    • compliance, 238, 364
    • consent, 477
    • data subject rights, 477–478
    • enforcement/precedent setting, 238–239
    • fine, 26
    • impact, 118, 161
    • penalties, 476–477
    • requirements, 187
  • Event-based disposition, prerequisites, 202–203
  • Evidence Act, 100, 466–467, 471
  • Evidence-based practice (EBP) protocols, AI assistance, 365
  • Executive sponsors
    • purposes, 70
    • recruitment, 214
    • role, 70–71
  • Executive sponsorship, 33
  • Expectation management (executive sponsor purpose), 70
  • Expense report, 437
  • Extended enterprise, 257–259
  • Extensibility, 444
  • eXtensible Markup Language (XML), 400, 405, 407
  • External factors, survey/evaluation, 75–81
  • Extract, Transform, and Load (ETL) capabilities, 219
  • Extraterritorial applicability, 476
  • Facebook, social media site, 300, 309
  • Facet-driven mechanism, 149–150
  • Faceted search, usage, 445
  • Faceted taxonomies, 452
  • Fair and Accurate Credit Transaction Act, 240
  • Fair Credit Reporting Act (FCRA), 240
  • Fair Information Practices (FIPS), 232–233
  • Federal Bureau of Investigation, IG failure, 13
  • Federal Deposit Insurance Corp. (FDIC), 330
  • Federal Information Security Management Act, 348
  • Federal Rules of Civil Procedure (FRCP), 14, 135–137, 164, 380
  • Federal Trade Commission (FTC), 240
  • Federal Wiretap Act, 244
  • File analysis classification and remediation (FACR), 361, 365
  • Files
    • deletion, tracking, 258
    • delivery, response time (problem), 349
    • plans, 446–447
    • protection, 255–256
    • remediation, 365
    • response time, problem, 349
    • series, 196
  • Filtering technologies, 148
  • Final disposition criteria, 203–304
  • Financial Institution Privacy Protection Act, 463
  • Financial Management and Accountability Act, 471
  • Firefox browser, usage, 309
  • Flexibility, decrease, 93
  • Flynn, Nancy, 275
  • Folksonomies, 458
  • Food and Drug Administration (FDA), records inspection, 464
  • Ford Motor Company, IG failure, 13
  • Formal IG Program Charter, creation, 78, 92
  • Freedom of Information Act (FOIA), 172, 191, 193, 245, 469–470
  • Free-text metadata field, option, 458
  • Full cost accounting (FCA), 123–124
  • Full disk encryption (FDE), 260, 269
  • Fully managed devices, 349
  • Functional taxonomy, implementation, 116
  • Function records, 197
  • Future costs, 124
  • Geithner, Timothy, 288
  • General and administrative costs, 124
  • Generally Accepted Privacy Principles (GAPP), 45, 231–232
    • criteria, 46–48
  • Generally Accepted Recordkeeping Principles® (GAR Principles), 35–42, 79, 171, 193
    • assessment/improvement roadmap, 42, 43t–44t
    • IGRM, impact, 91
    • improvement areas, 42t
    • levels, 36t
    • review, 88
  • Generation Gmail entry, 304
  • Global Aerospace, Inc., Et al. v. Landow Aviation, LP, et al., 148
  • Global Information Locator Service (GILS), 444–445
  • Global positioning systems (GPS), 322
  • “Going forward” strategy, implementation, 21
  • Goodgle Android, apps (usage), 328
  • Governance, risk management, and compliance (GRC), 77
  • Government oversight, increase, 163–164
  • Gramm-Leach-Bliley Act (GLBA), 463
  • Graphics image format (GIF), compression algorithms, 408
  • Gruman, Galen, 337
  • Hacker intrusion events, number (reduction), 63
  • Hacking, 346–347
    • protection, 326
  • Health care, AI (usage), 364–365
  • Health Information Act in Canada, 191
  • Health Information Technology for Economy and Clinical Health (HITECH), 241
  • Health Insurance Portability and Accountability Act (HIPAA), 240–242, 463–464
    • fine, 26
    • Privacy Rule, inclusion, 241
  • Heat map, 60
  • High-level strategic plans, creation, 61–62
  • Hijacking, 346–347
  • HootSuite, 301
  • HP Security Research study, 379
  • Human error, impact, 396
  • Human resources security, 95
  • Human review (predictive coding component), 148–149
  • Hybrid cloud, 339
  • Hypertext transfer protocol secure (https), 325
  • IBM Watson, 363
  • Identity access management, usage, 254–255
  • Identity and access management (IAM), 254
  • Imaging (disposition method), 41
  • Implementation frameworks, 93
  • Indirect costs, 124
  • Individual participation principle, 234
  • Industrial Internet Consortium (IIC), 382
  • Industry
    • best practices, 77–80, 430
    • industry-specific best practices, 212
    • regulation, increase, 163–164
  • Infonomics, 10, 117, 244
  • Infonomics (Laney), 4, 30, 117, 214
  • Information
    • accessibility, 32
    • baseline, 130
    • breaches, 342
    • cap-and-trade system, 130
    • classification, technology (usage), 155–156
    • confidence, obtaining, 26
    • control, 32–33
    • costs, calculation, 121–122
    • creation/usage, mapping, 26
    • custodians, 154
    • delivery platforms, changes, 165
    • effectiveness, impact, 152
    • environment, changes, 119–121
    • footprint, 6
    • full cost accounting, 123–124
    • growth, 151–152
    • harvesting/leveraging, 26
    • integrity, 31
    • life cycle, 90
    • loss, 341–342
    • management, 80, 151–158, 216–219
    • models, 129–130
    • monetization, 26
    • organization/classification, 31–32, 433
    • privacy, 32, 229–231
    • quality, 213–214
    • retrieval, 150
    • safeguarding, 167
    • search/access/collaboration, 126
    • security expert, hiring, 330
    • stakeholder, participation, 29
    • systems, acquisition/development/maintenance, 95
    • units (tracking/trading), internal accounting system (creation), 130
    • value, 117, 127–129, 145
  • Information and communication technologies (ICT), 75
  • Information Asset Register (IAR), 185–189
  • Information asset risk planning
    • audit/review/adjustment, 55
    • countermeasure, 55
    • impact, assessment, 55
    • management, 55
    • metrics, establishment, 55
    • plan, execution, 55
    • policy, creation, 55
    • process, benefits, 56
    • responsibilities, assignation, 55
    • steps, 55
  • Information assets
    • access/use, 190
    • confidentiality, 190
    • dates, 190
    • description, 190
    • ownership, 190
    • problems/issues, risk/impact, 191
    • protection/preservation, 56
    • register, approach, 185–189
    • retention, 190
    • risk mitigation plan, 61–62
    • risk mitigation plan, auditing, 65
    • survey questions, 190–191
    • tracking, 185–189
  • Information governance (IG), 25, 94–96, 115, 142
    • accountability, importance, 34
    • approach, customization, 212
    • artificial intelligence, role, 363–366
    • awareness, 164
    • best practices, 69, 78–80, 91–92, 223–225
    • business case, 212
    • business conditions, survey, 76–77
    • challenges, 372–375
    • common terms, usage, 26
    • continuous improvement, 33–34
    • debt, increase, 382
    • decisions, 30
    • defining, 7–9
    • development, 4–5
    • economic environment, survey, 76–77
    • E-discovery, relationship, 143–146
    • efforts, standards (relevance), 93–98
    • enforcement, 255–256
    • executive sponsor role, importance, 70–71
    • executive sponsorship, 33
    • external factors, survey/evaluation, 75–81
    • failures, 11–14
    • formal IG Program Charter, creation, 78, 92
    • framework, best practices/standards selections (impact), 105
    • framework/maturity model, usage, 79, 92
    • functions, 211, 229
    • good business, 9–10
    • guidelines, 351–352, 434
    • IG-enabled organization, appearance, 130–132
    • impact, 135
    • imperative, 3
    • importance, 361
    • industry best practices, survey/determination, 77–80
    • input, gaining, 83
    • IoT trustworthiness, contrast, 384
    • issues, 376–377
    • IT governance/data governance, differences, 19
    • legal functions, 135
    • legal hold process, 144
    • legal/regulatory/political factors, analysis, 77
    • monitoring/accountability, 425–426
    • monitoring/auditing, 33
    • ongoing program, 9, 78–79
    • plan, organizational strategic plan (alignment), 73–75
    • policies, 14–15, 48–49, 80, 87, 92, 394
    • principles, 29
    • process, steps, 128t
    • proof of concept, e-discovery (usage), 146
    • requirements, 165
    • RIM functions, relationship, 161
    • Sedona Conference® Commentary, 29–30, 87
    • Smallwood information governance principles, 30–34
    • strategic plan, 81–83
    • strategic planning, 69
    • strategy, information (synthesis/fusion), 81–82
    • team, 72–73
    • threats/concerns, 348–349
    • usage, 285, 299, 319, 335
  • Information Governance for Healthcare Professionals, 118
  • Information Governance Framework (IGF), 380
  • Information Governance Process Maturity Model (IGPMM), 79, 89, 119
  • Information governance (IG) program, 3
    • analytics, role, 360
    • auditing, effectiveness, 80, 92
    • best practices, 92
    • business considerations, 119
    • conformance/performance, measurement, 80
    • creation, 82–83
    • efforts, 211
    • elements, 80
    • establishment, 29
    • guidelines, 30–34
    • impact, 25–26
    • implementation, 29, 142
    • independence, 29
    • information stakeholder participation, 29
    • initiation, 118
    • maintenance, 425
    • objectives, 115, 116
    • organizational strategy, development, 78
    • piloting, business unit candidates, 117
    • SAT, impact, 249
    • strategic objectives, 29
  • Information Governance Reference Model (IGRM), 88–91, 89f
    • Center, 90–91
    • diagram, interpretation, 90–91
    • Outer Ring, 90
  • Information life cycle management (ILM), 217
  • Information rights management (IRM), 14, 62t, 265–268
  • Information risk
    • management, summary, 65
    • planning, summary, 65
    • reduction, 116
  • Information risk planning process, 56–59
    • steps, 56–59
    • vulnerabilities/threats (identification), formal process (conducting), 56–58
  • Information security (InfoSec), 32, 94–96
    • assessments/awareness training, 248–253
    • improvement/optimization, 80
    • incident management, 95
    • management, 95
    • organization, 95
    • penetration testing (pen test), 252–253
    • principles, 45–48
  • Information Security NHS Code of Practice, 245
  • Information technology (IT), 115
    • changes, 162
    • concerns, 287
    • department/provider, dependence, 165
    • functions, 211
    • governance, 19, 21–25, 220–223
    • infrastructure, deployment, 336
    • network diagram, 176
    • platform, migration, 156
    • processes, control objectives (mapping), 221
    • security practices, assessment, 116
    • trends, analysis, 75–76
  • Information Technology Infrastructure Library (ITIL), 22, 24, 222–223
  • Inherited metadata, 438
  • Innovation, security (contrast), 328–330
  • In-person interviews, conducting, 179
  • Insider threats, 247–248, 343
  • Instant messaging (IM), 63, 291–292
    • advice, 294
    • attachments, 294
    • business IM use, best practices, 292–293
    • contacts, restriction, 294
    • information governance, usage, 285
    • messages, archiving, 293
    • monitoring, technology (usage), 293
    • policies, enforcement, 294
    • screen names, privacy, 294
    • social media, contrast, 305
  • Institute for Security and Open Methodologies (ISECOM), 251–252
  • Intangible benefits (ERM), 167–168
  • Integration, data modeling steps, 218f
  • Integrity (GAR Principle component), 35, 39, 88
  • Intellectual entities, 404
  • Intellectual property (IP), 153, 247
  • Internal accounting system, creation, 130
  • Internal price lists, securing, 272
  • Internal Revenue Service (IRS), Elastic Compute Cloud service (usage), 348
  • International Association of Privacy Professionals (IAPP), 45–46, 239
  • International Council on Archives (ICA), 96
  • International Data Corporation (IDC), 151
  • International metadata standards/guidance, 442–446
  • International Organization of Standardization (ISO), 93, 161, 394, 449
  • Internet-based applications, integration, 304
  • Internet-based networks, usage, 302
  • Internet of Things (IoT), 75, 231, 357
    • challenges, 379–380
    • contracts system, 375
    • cybersecurity, 376
    • data, 381–382
    • definitions, 373
    • Detect Derive Decide Do (4 Ds), 380
    • devices, 325, 378
    • E-discovery issues, 377–380
    • growth, 373
    • information governance (IG), 372–377
    • privacy, 376
    • publicity, 376
    • risks, 376–377
    • states, 383
    • trustworthiness, 380–386
  • Internet of Things European Research Cluster (IERC), IoT definition, 373
  • Interoperability support, 93
  • Interviewees, selection, 181
  • Interviews, 182, 182f–183f
  • Inventory
    • conducting, 179–182
    • goals, definition, 173
    • information/elements, collection, 175–176
    • management support, executive sponsor, 175
    • project, goals, 173–174
    • results, analysis/verification, 183
    • scope, defining, 173
    • scoping, 174–175
    • surveys, distribution/collection, 179
  • Irish Data Protection Commission (DPC), 238
  • ISO13008:2012 (Information and documentation), 98
  • ISO 14721:2012 (Space Data and Information Transfer Systems), 103
  • ISO14721:2012 “Space Data and Information Transfer Systems,” 103
  • ISO 14721/ISO 16363, 413–415
  • ISO 15489 Records Management, 102
    • definitions/relevance, 442
  • ISO 16175, 97
  • ISO 16363:2012 (Space Data and Information Transfer Systems), 103, 401–403
  • ISO 19005-1:2005 “Document Management,” 102
  • ISO 19005 (PDF/A) Document Management, 406–407
  • ISO 22301:2012 (Societal Security), 104
  • ISO 28500: 2009—WebARChive, 409
  • ISO 30300:2011 (Information and Documentation), 97
  • ISO 38500, 24–25, 95–96, 223
  • ISO/IEC 13818: 2000 Motion Picture Expert Group, 409
  • ISO/IEC 15444:2000—Joint Photographic Engineers Group, 408
  • ISO/IEC 15498: 2004 Information Technology-Computer Graphics, 408
  • ISO/IEC20000, 222
  • ISO/IEC 27001:2013, 94–95
  • ISO Technical Specification 23081-1:2006 Information and Documentation, 442–443
  • ISO/TR 13028:2010 (Information and documentation), 98
  • ISO/TR 18128:2014, 94
  • ISO TR 18492 (2005) (Long-Term Preservation of Electronic Document Based Information), 103, 400–401
  • Jailbreaking, 326
  • Joint Photographic Engineers Group (JPEG), 400, 408
  • Kelly, John, 328
  • Keyword search capabilities, 148
  • Knorr, Eric, 337
  • Knowledge
    • capture/transfer, 126
    • leveraging, 362–363
  • Knowledge Exchange (KX), 13–14
  • Knowledge management (KM), 72, 131, 445
  • Koirtchinksy, Kostya, 346
  • Laney, Doug, 4, 30, 117, 214, 357
  • Laptops, IG (usage), 326
  • Layoffs, trade secrets (securing), 270–271
  • Legacy electronic records, acquisition, 418
  • Legal costs, 124
  • Legal hold notification (LHN), 31–33
    • initiation process, 144–145
    • process, 80, 92, 130
  • Legal hold process, 144
  • Legal hold programs, building, 146
  • Legal review team, 150
  • Leming, Briton Reynold, 186, 189
  • Leverage technology, 143
  • Library of Congress subject headings (LCSH), 449, 450f
  • Lightweight directory access protocol (LDAP), 268
  • LinkedIn, social media site, 300, 309
  • Linux Foundation, 369
  • Litigation, 117, 153
  • Logan, Debra, 34, 211
  • Logical data modeling approach, 219
  • Long-term archival records, 200
  • Long-term business planning, 402
  • Long-Term Digital Preservation (LTDP), 7, 32, 39, 102–104
    • defining, 393–394
    • factors, 394–396
    • methods, 162
    • policies, 204
  • Long-Term Digital Preservation Capability Maturity Model (CMM)
    • scope, 412–416
  • Long-Term Digital Preservation Capability Maturity Model (DPCMM), 409–412
  • Long-term evolution (LTE) (mobile computing trend), 322
  • Lossy compression, irreversibility, 408
  • Machine learning, 74, 147
    • predictive coding component, 149
  • Madrid Resolution 2009, 234–235
  • Malicious insider, 247
  • Malware, impact, 344
  • Management (GAPP criterion), 46
  • Management location, 120
  • Management systems for records (MSR), 97
  • Manning, Bradley (Chelsea), 307
  • Many-to-many associations, 437
  • Marketing professionals, tools (usage), 300t–301t
  • Masking, deployment, 225
  • Master Data Management (MDM), 211, 213, 216–217, 225
  • Meaning-based search, usage, 148
  • Meaningful use, benefits, 365
  • Media renewal, 400
  • Medicare reimbursements, 365
  • Metadata, 433, 436
    • application, 438f
    • cross-referencing, 454f
    • governance, implementation/maintenance, 441
    • governance/standards/strategies, 438–440
    • issues, 441–442
    • management, 79–80, 439
    • schema, implementation, 116
    • taxonomy, relationship, 437–438
    • terms, creation, 79
    • types, 440–441
  • Metrics
    • access, 124
    • determination, 63–64
    • empirical metrics, 401
    • establishment, 55
    • requirement, 80
    • usage, 116
    • variation, 63–64
  • Micro-classification, avoidance, 185
  • Micro-electromechanical systems (MEMS), 372, 374
  • Microsoft Active Directory (AD), 268
  • Microsoft Cognitive Services, 363
  • Microsoft Windows Office Desktop, security, 257–258
  • Migration, 126, 418
    • refreshment/replication/repackage/transformation, 399
  • Mission-critical process protection, 104
  • Mission statement, 401
  • Mitigation efforts (risk reduction measurement), metrics (determination), 63–64
  • Mobile applications
    • innovation/security, contrast, 328–330
    • securing, best practices (usage), 330
    • security, building, 326–329
    • threats, understanding, 327–328
  • Mobile application vetting (MAV), 350
  • Mobile Companion Guide, release, 349
  • Mobile computing, 165
    • information governance (IG), 325–326
    • security risks, 323–324
    • trends, 322–323
  • Mobile data, securing, 324
  • Mobile device management (MDM), 321, 324–325
  • Mobile devices
    • budgeting/expense control, 331
    • communications/training plan, development, 332
    • device/data security issues, 331–332
    • information governance, usage, 319
    • legal aspects/liability issues, 331
    • policies, development, 330–332
    • policy requirement details, 331
  • Mobile guide, CIS controls, 349–350
  • Mobile strategy, goals (clarification), 331
  • Mobile threat defense (MTD), 350
  • Model Contract Clauses (MCCs), 478
  • Model Requirements for Management of Electronic Records (MoReq2), 101
  • Monetize (Navy Yard rebirth phase), 127, 128–129
  • Monitoring/auditing tools, deployment, 224–225
  • Monitoring/enforcement (GAPP criterion), 48
  • MoReq2010, MoReq2 requirements unbundling, 101
  • Motion Picture Expert Group (MPEG-2), 409
  • Multitenancy, issues, 345–346
  • National Archives and Records Administration (NARA), 93, 98, 168, 194–195, 465
    • guidelines, 351
    • Office of the Federal Register (OFR), 201
    • social media strategy, 302
  • National Association of Realtors, 369
  • National Association of Securities Dealers (NASD), 266, 463
  • National Cultural AudioVisual Archives (NCAA), 420
  • National Institute of Standards and Technology (NIST), 93, 336, 339
    • Cybersecurity Framework, 250
  • National Security Agency (NSA), 246
  • Natural disaster, impact, 396
  • Navigation, importance, 435
  • Naylor, David, 363
  • Near-preservation-ready formats, electronic records (acquisition/transformation), 417–418
  • Neighbors, knowledge, 347–348
  • Nerney, Chris, 306
  • Netbooks, IG (usage), 326
  • Net neutrality, 231
  • Network infrastructure, storage (relationship), 126
  • NextRequest, 311
  • NHS Care Record Guarantee for England, 245
  • Noncompliance fines/sanctions, 57
  • Non-Invasive Data Governance (Seiner), 19
  • Nonmalicious insider, 248
  • Non-record information, categorization/scheduling, 32–33
  • Notice (GAPP criterion), 46
  • Noto, Anthony, 307
  • Offensive Security Certified Profession (OSCP), 252–253
  • Office365, IG (usage), 352–354
  • Office for Civil Rights (OCR), 240
  • Office of the Australian Information Commissioner (OAIC), 470
  • On-demand self-service, 337
  • One-to-many associations, 437
  • Open access period, 469
  • Open Archival Information System (OAIS), 397
    • core, functional model, 398
    • Information Model, 398
    • Reference Model, 397–398, 399f
  • Open Archival Initiative Protocol for Metadata Harvesting (OAI-PMH), 443
  • Open Archives Initiative Protocol for Metadata Harvesting (OAI-PMH), 443
  • Openness principle, 234
  • Open-Source Security Testing Methodology Manual, 251–252
  • Open standard technology-neutral formats, 400, 405–409, 406t, 414
    • adoption, 417
    • migration, 418–419
  • Open Web Application Security Project (OWASP), 252
  • Operating systems (OS), 319, 346
  • Operational technology (OT), 374
  • Operations management, 95
  • Opt-in/opt-out jurisdiction, 230
  • Organisation for Economic Co-operation and Development (OECD) privacy principles, 233–234
  • Organizational “defense in depth,” 56
  • Organizational goals/objectives (support), actionable plans (development), 82
  • Organizational infrastructure, 401–402
  • Organizational strategic plans, IG plan (alignment), 73–75
  • Organizational strategy, development, 78
  • Organizations
    • information glut, 153
    • reputation/brand/equity value, protection, 56
  • PageFreezer, cloud storage, 310
  • Password protection, 325
  • Pattern search, usage, 148
  • Payment Card Industry Data Secured Standard (PCI-DSS), 270
  • Peck, Andrew, 155
  • Penetration testing (pen test), 252–253
  • Perimeter security, limitations, 253–254
  • Personal archiving, 80, 92, 289
  • Personal data, usage, 186–187, 235–236
  • Personal digital assistants (PDAs), 337
  • Personal information, divulging, 294
  • Personally identifiable information (PII), 12, 30, 190, 229–230, 243
    • data deletion, 379
    • handling, 63
    • protection, 244
    • storage, 349
  • Phishing, 285
  • Physical data modeling approach, 219
  • Physical security, 95
  • Planning/control (executive sponsor purpose), 70
  • Policy
    • creation/management, 267
    • management, compliance, 126
  • Portable computers, IG (usage), 326
  • Portable Document Format (PDF), 407
  • Portable storage devices, IG (usage), 326
  • Prebuilt taxonomies, custom taxonomies (contrast), 448–449
  • Predictive analytics, 357, 358
  • Predictive coding, 74, 135
    • components, 148–149
    • impact, 149
    • usage, 147–149
  • Prescriptive analytics, 357, 359
  • Preservation
    • metadata, 416, 419, 441
    • planning, 398
    • policies, 402
    • preservation-ready formats, electronic records (acquisition), 417
    • strategic plan, 401
  • Preservation description information (PDI), 398, 399
  • PREservation Metadata Information Strategies (PREMIS)
    • Data Model, 404f
    • PREMIS-based data dictionary, 416
    • Preservation Metadata Standard, 404–405
  • Primary Trustworthy Digital Repository Authorisation Body (PTAB), 420
  • Prime directive, 466
  • Principle of Least Privilege (POLP), 45
  • Privacy, 45–48, 56, 229–232, 478
    • Asia, privacy, 243–244
    • infonomics, relationship, 244
    • information privacy, 32, 229–231
    • IoT, 376
    • laws, 244–245, 475, 478–480
    • OECD privacy principles, 233–234
    • organizational “defense in depth,” 56
    • process, accountability, 56
    • programs, 239
    • regulations, 475
    • requirements, measurement/enforcement, 56
    • United States privacy, 240–244
  • Privacy Act, 470
  • Privacy Awareness Training (PAT), 107, 130
  • Privacy compliance, 10
  • Private cloud, 339
  • Privileged access, verification, 225
  • Probability, determination, 55
  • Productivity gains/losses, 124
  • Program communications/training, 106–107
  • Program controls, monitoring/auditing/enforcement, 107
  • Programs/service staff, interview, 181
  • Progress (measurement), metrics (usage), 116
  • Project Management Book of Knowledge (PMBOK), 23
  • PRONON program, 406
  • Propagation-based mechanism, 150
  • Protected health information (PHI), 30, 230, 240, 324
  • Protected process/data, data security design pattern, 273
  • Protection (GAR Principle component), 35, 39, 88
  • Provenance, 189
  • Public cloud, 339
  • Public health initiatives, AI contribution, 365
  • Public key infrastructure (PKI), usage, 368
  • Public Record Office (PRO), 101
  • Public Records Act, 245
  • Public social media solutions, 309–310
  • Purge (disposition method), 42
  • Purpose specification principle, 233
  • Push-button applications (mobile computing trend), 323
  • Quality (GAPP criterion), 47
  • Quality assurance support, 93
  • Quest Software, 292
  • Radio frequency identification (RFID), 322
  • Rallo, Artemi, 235
  • Ransomware, 56–57, 214
  • Ransomware-as-a-service, 57
  • Really simple syndication (RSS), 299
  • Records
    • appraisal, 40, 184
    • classification, 195, 447
    • creation/growth, control, 167
    • creators/owners, 413
    • destruction, proving, 205
    • disposal, 204–205
    • documents, contrast, 442
    • findability, improvement, 80
    • grouping rationale, 196, 446
    • identification, 315
    • integrity, 39
    • inventory/classification, 195–196
    • location, determination, 179
    • preservation, threats, 396–397
    • producers/stakeholders, proactive engagement, 419
    • provenance, 195
    • record-free e-mail, usage, 260
    • scheduling, decisions, 195–196
    • series, 196–197
    • storage, centralized policies/systems (absence), 153
    • taxonomy, 447
    • threshold determinations, 314
    • value, appraisal, 184
  • Records and information management (RIM), 31, 35, 77
    • big bucket approach, 170
    • functions, IG (relationship), 161
    • perspective, 152
  • Records inventory
    • information, presence, 184
    • process, steps, 173
    • purposes, 172–173
    • steps, 173–183
    • survey form, 176f–177f
      • creation, 176–178
  • Records management (RM), 96–98, 351
    • business rationale, 163–164
    • challenges, 165–166, 305
    • data privacy management, relationship, 169–171
    • functionality, 316, 349
    • issues, 335
    • laws/regulations, 463
    • micro-classification, avoidance, 185
    • policies/procedures, access, 38
    • policy, adoption/compliance, 184–189
    • processes, 88
    • programs, 35, 88
    • requirements, identification, 471–472
    • space, 161
    • standards, 101–102
    • strategy, 153
    • technologies, assimilation, 167
  • Records Management NHS Code of Practice, 245
  • Records retention
    • guidelines, 314–315
    • policy, creation/implementation, 142–143
    • regulations/legislation, impact, 468
  • Redundant, outdated, and trivial (ROT)
    • data storage, 361
    • information, 4, 5, 76
    • records, 377
  • Reference data management (data modeling approach), 219
  • Relationships, understanding, 186
  • Repository-based approaches, limitations, 256–257
  • Resource pooling, 337–338
  • Responsibility assignment matrix (RACI matrix), 105–106
  • Responsible, accountable, consulted, informed (RACI) matrix, 64
  • Retention, 162, 188
    • automation, 205
    • capabilities, 203
    • compliance research, 200–201
    • event-based retention scheduling, 201–202
    • GAR Principle component, 36, 40, 88
    • legal limitation periods, 200
    • legal requirements, 200–201
    • periods, 203–204
    • policy, extension, 143
    • records retention schedule, development, 192
    • schedule, 204–207, 315
    • scheduling, principles, 191–192
  • Retention schedules, 193–195
  • Return on investment (ROI), 10, 146, 157, 304, 306
  • Risk
    • adverse findings, reduction, 63
    • assessment, 62t, 65, 214–215
    • avoidance, 315
    • events, materialization (likelihood), 58–59
    • identification, 55, 65
    • levels, evaluation, 65
    • management, 10, 94
    • map, 60
    • mitigation, 61–62, 64–65
    • probabilities, evaluation, 65
    • profile, creation, 59–61
    • recognition, 145
    • reductions (measurement), metrics (determination), 63–64
  • Rogue intrusions, 344
  • Rooting, 326
  • Rules-driven mechanism, 149
  • Rutowska, Joanna, 346
  • Sampling, 148
    • predictive coding component, 149
  • Sarbanes-Oxley Act (SOX), 163–164, 289, 464
  • Scalable Vector Graphics (SVG): 2003—W3C Internet Engineering Task Force, 408
  • Scotland, Parliament (acts), 468
  • Search capabilities, 316
  • Search results (improvement), taxonomies (impact), 436–437
  • Secure communications, record-free e-mail (usage), 260
  • Secure printing, 258
  • Secure sockets layer (SSL), 325
  • Securities and Exchange Commission (SEC)
  • Security
    • benefits, 166
    • building, 326–329
    • classifications, 186
    • concerns, 165
    • e-document security, provision, 80
    • enterprise information security practices, direct connection, 56
    • functions, 229
    • information security, 32
    • innovation, contrast, 328–330
    • issues, 258–259, 378–379
    • mobile computing trend, 322–323
    • perimeter security, limitations, 253–254
    • policy, 95
    • processes, integration/automation, 225
    • risk management, 403
    • safeguards principle, 233
  • Security Awareness Training (SAT), 31, 76, 82
  • Security Information Event Monitoring (SIEM), usage, 249
  • Security Technical Implementation Guides (STIGs), 224
  • Sedona Conference®, 29–30, 87, 313
  • Seiner, Robert, 19
  • Senior records officer (SRO), 72–73
  • Sensitive data, encryption, 330
  • Service-level agreements (SLAs), 346
  • Service-oriented architecture, 338
  • SHA128 hashing process, 354
  • SharePoint, capabilities, 275
  • SharePoint, IG, 352–354
  • Sharing economy networks, usage, 302
  • Short Message Service (SMS), 320
  • Short-term business planning, 402
  • Shred (disposition method), 41
  • Smallwood information governance principles, 30–34
  • Smarsh, 310–311
  • Smartphones
    • applications, 322
    • IG, usage, 325–326
  • Smishing, 320
  • SnapChat applications, 377
  • Snowden, Edward, 246, 307
  • Social Care Record Guarantee for England, 245, 276
  • Social engineering, 321
  • Social media, 165
    • archiving, 309–311, 310t
    • categories, 300t–301t, 303
    • e-mail/IM, contrast, 305
    • IG framework, 311
    • information governance, 299, 311
    • litigation considerations, 313–315
    • management software, 310t
    • planning stage, records (identification), 315
    • policy, 306, 312
    • posts, legal risks, 307–308
    • publication process, establishment, 315
    • public social media solutions, 309–310
    • records management, 313–316
    • risks, 306306
    • technology, leverage, 304–305
    • tools, usage, 302t, 303t
    • types, 299–302
    • usage, 304–305
  • Social shopping networks, usage, 301
  • Social tagging, 434, 458
  • Software development life cycle (SDLC), 330
  • Software tools, usage, 180
  • Solid state drives (SSDs), 396
    • mobile computing trend, 322
  • Space planning, 188
  • Spam, problem, 344
  • SQL databases, usage, 268
  • Stakeholder
    • confidence, 104
    • consultation, 31
    • input, gaining, 83
    • participation, 29
  • Standard General Markup Language (SGML), 407
  • Standard industry classification (SIC) codes, 219
  • Standards
    • benefits/risks, 93
    • confusion, 93
    • considerations, 92–93
    • development/promotion, benefits, 93
    • downside considerations, 93
    • European standards, 101–102
    • UK standards, 101–102
  • Standards Council of Canada, 93
  • State government regulatory agency functional taxonomy, 453f
  • Steering committee, establishment, 78, 92
  • Storage
    • costs, increase, 153
    • encryption, 325
    • media, failure, 396
    • network infrastructure, relationship, 126
  • Stored Communications and Transaction Records Act (SCTRA), 244–245
  • Strategic plans, development, 63
  • Stream messaging, 276
  • Structural metadata, 440
  • Structured data, 5
    • unstructured information, contrast, 360
  • Subject matter, asset tag, 188
  • Subject matter experts (SMEs), usage, 436, 441
  • Subject records, 197
  • Submission information package (SIP), 398–403
  • Systems/network communications failure, 396
  • Tablets, IG (usage), 326
  • Tagged image file format (TIFF), 400, 407
  • Taxonomy (taxonomies), 162, 433, 446–447
    • accounting business-unit taxonomy, 454f
    • community government business-unit taxonomy, 452f
    • faceted taxonomies, 452
    • maintenance, 457–458
    • metadata, 437–438, 437f, 454f
    • necessity, 435–436
    • prebuilt taxonomies, custom taxonomies (contrast), 448–449
    • records grouping, 446
    • records retention schedule, mapping, 447f
    • state government regulatory agency functional taxonomy, 453f
    • structure, metadata (application), 438f
    • testing, 457
    • thesaurus use, 449
    • types, 449–453
  • Team messaging, solutions, 294–295
  • Technical infrastructure, 403
  • Technical metadata, 440
  • Technology
    • application, 257–259
    • change, 430
    • emerging technologies, leveraging/governing, 357
    • focus, 212
    • importance, 155
    • sharing, issues, 345–346
    • usage, 155–156
  • Technology-assisted review (TAR), 82, 135, 143, 151
    • mechanisms, 149–150
  • Teisch, Rachel, 376
  • Terminations, trade secret (securing), 270–271
  • Territorial scope, increase, 476
  • Text analytics, 148–149
  • Text mining, 434, 445–446
  • The National Archives (TNA), 101
  • Theoretical basis, impact, 93
  • Thesaurus, 438
  • Thin clients, 269, 273
  • Thin device, data security design pattern, 273
  • Third-party disclosure (GAPP criterion), 47
  • Third-party possession, 273
  • Threat identification/assessment, 104
  • Threat, recovery planning, 104
  • Topic records, 197
  • Total cost of ownership (TCO), 123–124
  • Trade secrets, securing, 270–271
  • Transaction, e-mail documentation, 198
  • Transitory records, retention, 204
  • Transparency (GAR Principle component), 35, 38, 88
  • Trigger events, 202–203
  • Trump, Ivanka (personal e-mail account), 288
  • Twitter, social media site, 300, 309
  • Unified end-user commuting management (UEM) platforms, 325
  • United Kingdom
    • Parliament, statutory instruments, 468–469
    • records management, laws/regulations, 468–469
  • United States
    • Department of Defense 5015.2 Design Criteria Standard for Electronic Records Management Software Application, 98
    • Government Protection Profile for Authorization Server for Basic Robustness Environments, 256
    • privacy, 240–244, 475–476
    • records management, laws/regulations, 463
    • regulations, 242
  • United States National Archives (NARA), social media tools (usage), 302t
  • Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act (PATRIOT Act), 464
  • Unmanaged devices, 350
  • Unstructured information, 5
    • challenges/factors, 120
    • location, 124
    • ownership, cost (calculation), 124–126
    • structured data, contrast, 360
    • volume, 119
  • Up-front costs, 124
  • Use limitation principle, 233
  • User assistance/compliance, 165–166
  • Use/retention/disposal (GAPP criterion), 46–47
  • User testing, feedback (usage), 457
  • Val IT®, 23, 222
  • Value information, asset status, 30
  • Virtual private network (VPN), 325, 331
  • Visio, usage, 455
  • Vulnerabilities/threats (identification), formal process (conducting), 56–58
  • Vulnerability assessment, 251
  • Warwick Business School, 304
  • Web 2.0, 165
    • social media, types, 299–302
  • WebARChive (WARC), 409
  • Web sites/applications, 299
  • Whole disk encryption (WDE), 326
  • Winner, Reality Leigh, 307
  • Workflow, 148–149
  • Workplace, personal archiving (absence), 289
  • Worldwide Interoperability for Microwave Access (WiMax) (mobile computing trend), 322
  • World Wide Web Consortium (W3C) Internet Engineering Group, 407
  • Written records management plan, 173
  • Yellow Pages, text (example), 449–450, 451f
  • Zornes, Aaron, 211
  • Zubulake, Laura, 139
  • Zubulake v. UBS Warburg, 139
  • Zuckerberg, Mark, 238
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.222.240.21