Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this...
This is part 2 of my question to the community. What are you using your RRS for? I really don’t understand why organizations are in a hurry for a Records and Information Management Policy and Records Retention Schedule (RRS) when they are not going to use them. What is the point? Maybe...
This blog is the first part of a series that asks the questions, raises some issues and maybe answers a few questions about the use of a Records Retention Schedule. When your senior management said “we must have a Records Retention Schedule (RRS)” did you feel a sigh of relief?...
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Fax: (301) 587-2711Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use