SlideShare uma empresa Scribd logo
1 de 55
It Takes Two To Tango The Synergy of RIM & ECM Gordon E.J. Hoke, CRM Gordon E.J. Hoke, CRM M
The Presenter ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
We’re all in this together… ,[object Object],[object Object]
The Challenge: Get the best of both worlds ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Seeking Progress ,[object Object],[object Object]
History of Records & Information Management (RIM) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Records and Information Management – RIM Records: “ . . . information created, received, and maintained as evidence by an organization or person, in pursuance of legal obligations or in the transaction of business” –  ISO 15489-1 Information and Documentation – Records Management Records and Records Life Cycle Creation Production Storage/disposal Use/Modification Conversion
Individual organizations must determine the definition of what a record is and, often more importantly, what it is not. Legal Inconsistency ,[object Object],[object Object],[object Object],[object Object],[object Object]
Where do Records Exist? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],–  USB drives –  Multi-function devices –  RAID drives –  MP3 Players –  Social networks –  IP telephony –  Text messages –  Desktop files –  Dept. information silos –  Web 2.0/ Tweets The significant growth of unstructured electronic records presents significant demands on storage and production. Are these on your Data Map?
ARMA International ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Records and Information Management  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pushing the Barriers of   Content Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
AIIM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Association Liberation Movement ,[object Object],Shed no tears.
Lack of RIM is Risky ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News ,[object Object],[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News  (cont.) ,[object Object],[object Object]
RIM Is Front Page News   (cont.) ,[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News   (cont.) ,[object Object],[object Object],[object Object],[object Object]
RIM Is Front Page News   (cont.) ,[object Object],[object Object],[object Object],[object Object]
For failing to preserve internal e-mail communications, five major financial services firms paid $1.65 million each Wall Street & Technology, February 2003
Bank of America Securities paid $10 million on  record-keeping & access requirements violation claims   Chicago Sun-Times, March 2004
Morgan Stanley recently suffered an adverse $1.45 billion court judgment…MS had acted in “bad faith” in failing to turn over relevant e-mails. COMPUTERWORLD , July 2005
Lowering Risk ,[object Object],[object Object]
Lowering Risk ,[object Object]
“ How can I keep my CEO of jail?”
RIM Serves Business Operations ,[object Object],[object Object],[object Object],[object Object],[object Object]
Paper-based RIM ,[object Object],[object Object]
RIM ascends... ,[object Object],[object Object],[object Object],[object Object]
Myths We Have Known ,[object Object],[object Object],[object Object],[object Object]
Understand the Complementary Differences
The Real Differences ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Scopes are Incomparable ,[object Object],[object Object]
Differences between RIM and ECM ,[object Object],[object Object],[object Object],Content Management makes the tools; Records Management makes the rules.
Differences between RIM and ECM (continued) 2.  Perspective is based on experience
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],...Try a glossary or lexicon
Differences between RIM and ECM (continued) 5.  Media Orientation ,[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Differences between RIM and ECM (continued):  6.  Governance ,[object Object],[object Object],[object Object],President and CEO Chief Records Officer General Counsel Vital Records VP of Compliance VP of Operations Chief Information Officer Business Continuity Disaster Recovery Mail Clerk Security Privacy Workflow
Differences between RIM and ECM (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controls ,[object Object],[object Object],[object Object],[object Object]
Importance of RIM and ECM Coordination ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Implications of Independent RIM and ECM Initiatives   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
GARP – Generally Accepted Recordkeeping Principles ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How ECM and RIM can work together: ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Potential Benefits of ECM-powered RIM ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pointers for ECM/RIM Success ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Pointers for ECM/RIM Success   (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Different but Complementary ,[object Object]
Things that Go Well Together ,[object Object],[object Object],[object Object],[object Object]
Questions?
Stay in touch: Gordon E.J. Hoke, CRM http://PositivelyRIM.blogspot.com (507) 254-6474 [email_address]

Mais conteúdo relacionado

Mais procurados

Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ictACLC Antipolo
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"Yokimura Dimaunahan
 
The 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipThe 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipErvin Ramos
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Useuniversity of education,Lahore
 

Mais procurados (7)

Computer Ethics
Computer EthicsComputer Ethics
Computer Ethics
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Impact of computers on society
Impact of computers on societyImpact of computers on society
Impact of computers on society
 
Lesson 1 introduction to ict
Lesson 1   introduction to ictLesson 1   introduction to ict
Lesson 1 introduction to ict
 
empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"empowerment technology speech "The Higher Technology for Human Being"
empowerment technology speech "The Higher Technology for Human Being"
 
The 9 Elements of Digital Citizenship
The 9 Elements of Digital CitizenshipThe 9 Elements of Digital Citizenship
The 9 Elements of Digital Citizenship
 
Ethical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and UseEthical Issues related to Information System Design and Use
Ethical Issues related to Information System Design and Use
 

Destaque

Body Systems
Body SystemsBody Systems
Body Systemsjenmstone
 
The Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital PreservationThe Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital PreservationGordon Hoke
 
Body Systems
Body SystemsBody Systems
Body Systemsjenmstone
 
Slik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria LynkursSlik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria LynkursOle Johan Heum
 
Ed3508lesson2
Ed3508lesson2Ed3508lesson2
Ed3508lesson2LoriB3508
 
Body Systems
Body SystemsBody Systems
Body Systemsjenmstone
 

Destaque (7)

Body Systems
Body SystemsBody Systems
Body Systems
 
The Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital PreservationThe Mind-Boggling Challege of Long-Term Digital Preservation
The Mind-Boggling Challege of Long-Term Digital Preservation
 
Intro to wikis in education
Intro to wikis in educationIntro to wikis in education
Intro to wikis in education
 
Body Systems
Body SystemsBody Systems
Body Systems
 
Slik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria LynkursSlik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
Slik Blir Morgendagens Arbeidsplass Del 1. Steria Lynkurs
 
Ed3508lesson2
Ed3508lesson2Ed3508lesson2
Ed3508lesson2
 
Body Systems
Body SystemsBody Systems
Body Systems
 

Semelhante a RIM & ECM Synergy

Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag ConferenceJonathan Yarmis
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaPeter Mojica
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsPrakash Prasad ✔
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachLogikcull.com
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Managementgetripcord
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Imjessicalaverne
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007brzaaap
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull.com
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceJeff Lemmermann
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)smkengkilili2011
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beachelgolfo
 
Irma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionIrma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionConni Christensen
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records tooBob Larrivee
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus PresentationGraeme McGowan
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IPipspat
 

Semelhante a RIM & ECM Synergy (20)

Stream Computing: Defrag Conference
Stream Computing:  Defrag ConferenceStream Computing:  Defrag Conference
Stream Computing: Defrag Conference
 
Snia Eiw2007 Peter Mojica
Snia Eiw2007 Peter MojicaSnia Eiw2007 Peter Mojica
Snia Eiw2007 Peter Mojica
 
ASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report DetailsASCL_Syllabus_Project Report Details
ASCL_Syllabus_Project Report Details
 
Protecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data BreachProtecting Data in the Age of Cybercrime and Data Breach
Protecting Data in the Age of Cybercrime and Data Breach
 
New Tech Application in Records Management
New Tech Application in Records ManagementNew Tech Application in Records Management
New Tech Application in Records Management
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
Private Public Sector Im
Private Public Sector ImPrivate Public Sector Im
Private Public Sector Im
 
eDiscovery
eDiscoveryeDiscovery
eDiscovery
 
Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007Ibm Data Management 4 Mar 2007
Ibm Data Management 4 Mar 2007
 
Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk Logikcull Webinar: Preventing the #1 Litigation Risk
Logikcull Webinar: Preventing the #1 Litigation Risk
 
IT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 ConferenceIT Security Presentation - IIMC 2014 Conference
IT Security Presentation - IIMC 2014 Conference
 
Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)Ict form 4 chapter 1(answer)
Ict form 4 chapter 1(answer)
 
Techno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle BeachTechno Security 2009 Presentation-Myrtle Beach
Techno Security 2009 Presentation-Myrtle Beach
 
Irma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And SelectionIrma Article Edrm Software Design And Selection
Irma Article Edrm Software Design And Selection
 
Wipo smes ge_08_topic07
Wipo smes ge_08_topic07Wipo smes ge_08_topic07
Wipo smes ge_08_topic07
 
Electronic files are records too
Electronic files are records tooElectronic files are records too
Electronic files are records too
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Columbo Financial Focus Presentation
Columbo Financial Focus PresentationColumbo Financial Focus Presentation
Columbo Financial Focus Presentation
 
Bridging the Gap: Securing IP
Bridging the Gap: Securing IPBridging the Gap: Securing IP
Bridging the Gap: Securing IP
 
Chapter 1.ppt
Chapter 1.pptChapter 1.ppt
Chapter 1.ppt
 

Último

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

RIM & ECM Synergy

  • 1. It Takes Two To Tango The Synergy of RIM & ECM Gordon E.J. Hoke, CRM Gordon E.J. Hoke, CRM M
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7. Records and Information Management – RIM Records: “ . . . information created, received, and maintained as evidence by an organization or person, in pursuance of legal obligations or in the transaction of business” – ISO 15489-1 Information and Documentation – Records Management Records and Records Life Cycle Creation Production Storage/disposal Use/Modification Conversion
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. For failing to preserve internal e-mail communications, five major financial services firms paid $1.65 million each Wall Street & Technology, February 2003
  • 22. Bank of America Securities paid $10 million on record-keeping & access requirements violation claims Chicago Sun-Times, March 2004
  • 23. Morgan Stanley recently suffered an adverse $1.45 billion court judgment…MS had acted in “bad faith” in failing to turn over relevant e-mails. COMPUTERWORLD , July 2005
  • 24.
  • 25.
  • 26. “ How can I keep my CEO of jail?”
  • 27.
  • 28.
  • 29.
  • 30.
  • 32.
  • 33.
  • 34.
  • 35. Differences between RIM and ECM (continued) 2. Perspective is based on experience
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
  • 53.
  • 55. Stay in touch: Gordon E.J. Hoke, CRM http://PositivelyRIM.blogspot.com (507) 254-6474 [email_address]