SlideShare a Scribd company logo
Records Management 2.0:   Compliance and the Cloud Jesse Wilkins, CRM AIIM International February 8, 2011
About AIIM International  - Members in 146 countries Independent  - Unbiased and vendor neutral Implementation Focused  - Processes, not just technology  Industry Intermediary  - users, suppliers, consultants, analysts, and the channel http://www.aiim.org
Jesse Wilkins, CRM Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Director, ARMA International Board of  Directors (2007-2010) Frequent industry speaker and author AIIM ERM and E2.0 Expert Blogger Instructor for AIIM Certificate Programs
Session agenda Blog this! Twitter in 140 characters or less Wiki-wiki Social networking Social sharing Records Management 2.0
Blog this!
Informata
Use case: project management
Use case: internal communications
Twitter (in 140 characters or less)
 
Ways to send updates Through the website Via text/SMS Via desktop clients Via web-based clients,  services, and widgets Via email and IM Via cellphone clients
Announcements
Links to resources
Wiki-wiki
Wikipedia
Wikipedia RM article
Wikis are more archival than email, less process than Word. -- Mike Cannon-Brookes Co-founder and CEO of Atlassian
Process documentation
Meeting agenda/minutes
There are plenty of ways to commit career suicide;  wikis are just the newest one.  Eric M. Johnson State Department Office of eDiplomacy
Social Networking
 
 
 
 
 
Use cases: social networking
Use cases: social networking
Use cases: social networking
Social Sharing
Screenshot of social sharing
Use cases: social sharing
Use cases: social sharing
Use cases: social sharing
Records Management 2.0
Is it a record? Is the information unique and not available anywhere else? Does it contain evidence of an agency’s policies, business, mission, etc.? Is the tool being used in relation to an agency’s work? Is there a business need for the information? Does it document a transaction or decision?
What is the record? Individual social network status updates or Tweets? The entire stream over a given period? Many of these tools do not lend themselves to metadata…. Policy and consistency are key
Address in policies
Policy 2.0 – in 140 characters Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.”
Secure the tools or set them to be private
The good news Many of the most commonly used 2.0 tools already track changes and versions Wikis Blogs  Track changes
Monitor Monitor the tools
What’s the record? Blog post Comments? Updates? Individual Tweet Links and shortened URLS? Wiki article The article? Its changes over time? It depends…. Prepare for discovery
Implement enterprise versions
Implement a compliance solution And many others
Questions?
For more information Jesse Wilkins, CRM, CDIA+, ecm m , emm m , erm m Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct [email_address] http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins

More Related Content

PPTX
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
DOCX
Webinar
PPT
From Zero to 18,000
PPTX
Open Assessments and OERs as Enablers in Competency-Based Education
PPTX
20110427 ARMA Houston Professional Development for the RIM Practitioner
PDF
8 Common Causes Of Car Accidents
PPTX
Nuevas tecnologías de la educación aplicadas en la educación
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
Webinar
From Zero to 18,000
Open Assessments and OERs as Enablers in Competency-Based Education
20110427 ARMA Houston Professional Development for the RIM Practitioner
8 Common Causes Of Car Accidents
Nuevas tecnologías de la educación aplicadas en la educación

Viewers also liked (13)

PDF
не будет больше жаждать - Thirsty no more
PDF
Certificate ZA-IWE_00067_Colour
PDF
Whitehead ice tutorial
PPTX
Evangelization of LinkedIn in a Local Tamil Weekly
PDF
Grafico diario del dax perfomance index para el 07 06-2012
PDF
What's the Difference Between Google Analytics and Website Visitor Tracking?
PPTX
Ilias 4 # clients - On shared hosting with cPanel
PPT
Demystifying sebi takeover code lecture du-30.03.2009
PDF
Audipresse ONE 2012/2013 - Principaux résultats d'audience
 
PPTX
Team Building Sydney: The Ways to Ensure your Success
DOCX
PDF
Developing Learning Outcomes for Competency-based Education
PPT
VTP Configuration
не будет больше жаждать - Thirsty no more
Certificate ZA-IWE_00067_Colour
Whitehead ice tutorial
Evangelization of LinkedIn in a Local Tamil Weekly
Grafico diario del dax perfomance index para el 07 06-2012
What's the Difference Between Google Analytics and Website Visitor Tracking?
Ilias 4 # clients - On shared hosting with cPanel
Demystifying sebi takeover code lecture du-30.03.2009
Audipresse ONE 2012/2013 - Principaux résultats d'audience
 
Team Building Sydney: The Ways to Ensure your Success
Developing Learning Outcomes for Competency-based Education
VTP Configuration
Ad

Similar to 20110208 ARMA Cincinnati RM 2.0 (20)

PPTX
20110427 ARMA Houston Keynote Records Management 2.0
PPTX
Managing Web 2.0 Records.
PPTX
20110407 NARA E-Records Forum on RM 20
PPTX
20110518-4 ARMA Central Iowa Records Management 2.0
PPT
20081117 Enterprise2.0
PPTX
20110720 fose 2011 sm governance
PPTX
Fyronic seminar-engage-slideshare
PPTX
Enterprise 2.0 - Who, What, Where, Why, When & How
PPT
Intranet 2.0 by Toby Ward, Prescient Digital Media
PPT
Web 20 For Acra
ODP
Shibboleth Guided Tour Webinar
PPT
Web 20 For Technical Communicators
PPTX
Fyronic seminar-software factorymeeting-sls
PPT
Steve Perry presentation at the Perfect Information Conference 13 May 10
PPT
Web 2.0
PPT
Web 2.0 Workshop
PPTX
Intranet Case Studies
PPTX
Intranet Case Studies
PPTX
20110411 Archive Systems User Conference Keynote Future of EDRM
20110427 ARMA Houston Keynote Records Management 2.0
Managing Web 2.0 Records.
20110407 NARA E-Records Forum on RM 20
20110518-4 ARMA Central Iowa Records Management 2.0
20081117 Enterprise2.0
20110720 fose 2011 sm governance
Fyronic seminar-engage-slideshare
Enterprise 2.0 - Who, What, Where, Why, When & How
Intranet 2.0 by Toby Ward, Prescient Digital Media
Web 20 For Acra
Shibboleth Guided Tour Webinar
Web 20 For Technical Communicators
Fyronic seminar-software factorymeeting-sls
Steve Perry presentation at the Perfect Information Conference 13 May 10
Web 2.0
Web 2.0 Workshop
Intranet Case Studies
Intranet Case Studies
20110411 Archive Systems User Conference Keynote Future of EDRM
Ad

More from Jesse Wilkins (20)

PPTX
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
PPTX
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
PPTX
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
PPTX
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
PPTX
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
PPTX
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
PPTX
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
PPTX
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
PPTX
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
PPTX
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
PPTX
20230719 ARMA Canada Professional Development.pptx
PPTX
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
PPTX
20230816 6 Most Common Mistakes in Records Modernization.pptx
PPTX
20230919 ARMA New England Keynote on IG Industry Trends.pptx
PPTX
20230117 ARMA MHD Building Your RM Playbook.pptx
PPTX
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
PPTX
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
PPTX
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
PPTX
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
PPTX
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx
20240409 ARMA NE Ohio Building a RIM Program with a RIM Playbook.pptx
20240425 ARMA Milwaukee Records Mgmt in the Age of Privacy.pptx
20240215 ARMA OK Building a RIM Program with a RIM Playbook Final.pptx
20240213 ARMA GCAC Business and Technical Assessment for an Info Mgmt Initiat...
20240202 Austin ARMA Bringing Your RIM Program Under the Big Top with a RIM P...
20240118 ARMA St Louis Building a RIM Program with a RIM Playbook.pptx
20240110 ARMA GKC Build and Sustain Your RIM Program with a RIM Playbook.pptx
20231207 ARMA Madison Build and Sustain Your RIM Program with a RIM Playbook....
20231219 ARMA Florida Gulf Coast How to Select the Right Certifications for Y...
20231005 ARMA San Diego RIM-IG Certifications and the Path to Professional De...
20230719 ARMA Canada Professional Development.pptx
20230717 ARMA Canada How to Select the Right IM Certifications for You.pptx
20230816 6 Most Common Mistakes in Records Modernization.pptx
20230919 ARMA New England Keynote on IG Industry Trends.pptx
20230117 ARMA MHD Building Your RM Playbook.pptx
20160602 ARMA Boston - You Shared WHAT? Applying Governance to Social Media
20230523 MER 2023 How to Build and Sustain Your IG Program with an IG Playboo...
20230912 AIIM True North Generative IA Tools The Good The Bad The Ugly no car...
20230419-4 Building Your RIM-IG Program with a RIM Playbook.pptx
20230419-3 ARMA Nebraska Prof Dev for Info Pro.pptx

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Machine learning based COVID-19 study performance prediction
PPTX
Big Data Technologies - Introduction.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Monthly Chronicles - July 2025
Encapsulation_ Review paper, used for researhc scholars
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Machine learning based COVID-19 study performance prediction
Big Data Technologies - Introduction.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Unlocking AI with Model Context Protocol (MCP)
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Understanding_Digital_Forensics_Presentation.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Encapsulation theory and applications.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A Presentation on Artificial Intelligence
cuic standard and advanced reporting.pdf

20110208 ARMA Cincinnati RM 2.0

Editor's Notes

  • #3: AIIM International is a not-for-profit industry association representing professionals that work in Enterprise Content Management. AIIM defines ECM as the technologies and solutions used to CAPTURE, MANAGE, STORE, PRESERVE and DELIVER documents and content related to organizational processes . That is quite a mouthful, but we are hoping that through today’s class we can help you better understand both the strategy behind and technologies within ECM. AIIM is an international association with members in 146 countries. Our North American headquarters is located in Maryland and we have an office in the UK that services Europe. We also have a network of local chapters that spans North America. AIIM is an “independent” organization and this course is a good example of how AIIM provides a neutral ground for you to get advice and learn about the latest solutions. AIIM’s programs and initiatives focus not only on technology, but how to implement technology successfully. And, AIIM has been an intermediary for the many constituents that work in ECM, including users, suppliers, consultants and analysts for more than 60 years.
  • #8: Blogs are a great tool for project management. Instead of sharing updates to schedules, drafts, etc. through email, the project manager can post them to a blog that is available to team members, managers, and stakeholders. When a new member joins the project team, they can review the entire project to date simply by reviewing the blog.
  • #9: An internal blog can also cut down on email blasts from management, HR, or IT about upcoming holiday events, deadlines for payroll, or scheduled server maintenance respectively. In short, anything that is typically sent as a broadcast to many people and which doesn’t require everyone to respond can be published to a blog instead.
  • #13: And Twitter is great for sending reminders of deadlines or events – and for describing them to folks who aren’t there. This year has seen an explosion of “liveTweeting” sessions and I expect quite a bit of it at AIIM 2010 next year.
  • #19: Wikis are very effective tools for collaborative authoring, including but certainly not limited to documenting processes, answering frequently asked questions, drafting and reviewing contracts or other deliverables, or updating, say, a records retention schedule.
  • #20: Wikis are also great for setting up and managing meetings. A wiki could be set up for a meeting to get input for scheduling; draft the meeting agenda; provide supporting documentation (including links); and drafting and publishing the minutes of the meeting.
  • #21: Quoted in the New York Times, Aug 4, 2008
  • #23: Social networking is Facebook…
  • #24: And Myspace….
  • #25: Classmates.com to keep up with your high school or college classmates…
  • #26: So here’s a quick look at AIIM’s Information Zen. Note the groups.
  • #27: And it’s meta-social networking. This is Ning, which is a white label social network that allows you to create your own social network. As of this morning, I am a member of 16 separate Ning-based social networks, including GovLoop, AIIM’s Information Zen, Friends of Alchemy Document Management, and Steve Bailey’s Records Management 2.0. Ning boasts of more than 1 million social networks created as of April 2009, and more than 4,000 new ones being created every day. And they are by no means the only social networking meta-tool out there.
  • #28: The first business use most people think of is networking and recruiting. LinkedIn is certainly the best-known example of this. And according to a June 2009 study from Careerbuilder.com, forty-five percent of employers reported that they use social networking sites to research job candidates – both to find new employees and to screen them out.
  • #29: Social networking tools can also be used to collaborate across locations, timezones, and organizations.
  • #30: And many organizations use them to identify and aggregate experts and information sources relating to a particular topic, again often across organizational boundaries.
  • #32: Here is a screenshot of YouTube. You can see some of the social aspects of Youtube here, including ratings; the ability to mark it as a favorite; the ability to subscribe to updates either of the video or by the author; and the ability to share a video in a number of ways including sending a link or embedding it directly in another web application such as a blog or Facebook. Users can also comment on individual videos via text or by posting video responses. Most of the other social sharing tools offer similar capabilities.
  • #33: Slideshare, Scribd, and Google Docs are all great ways to share documents and presentations. Slideshare in particular will let you record audio for a presentation and make that available as a “slidecast”.
  • #34: Another significant use case is photo sharing. Sites like Flickr and Twitpick allow organizations and users to share photos of conferences or user group meetings; new or updated product lines; or even set up sharing for customers or attendees of a particular event
  • #35: This is delicious, which is used to share all kinds of bookmarks. It’s great for accessing your bookmarks from another computer such as an internet kiosk, but it’s even more valuable as a filter. As you see here, you can see bookmarks related to a particular topic and how many times it’s been bookmarked, which is one way to gauge its value to others. You can also post a link to your delicious page and others can access your bookmarks directly.
  • #37: The first step is to determine whether or not something is in fact a record. Just as we know that most email messages are not records, for most organizations their Facebook fan page updates will not be records either. In other words, we have to ask the same questions about these tools that we’d ask about any other type of information: Does it document a transaction or a decision? If it does, it’s probably a record. Is it captured in another form? This is the biggest reason why most social networking sites like Facebook and Twitter wouldn’t need to be captured as records – in most cases they are being used as another transmission mechanism for information stored elsewhere. Now, just because it isn’t a record doesn’t mean it couldn’t be discoverable or a public record and subject to FOIA-type laws. Again, same considerations here as for other types of information. [twitter]Determine whether something is a record or not according to its content and context.[/twitter]
  • #41: Most of these tools can be secured with passwords and/or have the default permissions set to be private. They are not hacker-proof, necessarily, but for most non-confidential information this is sufficient security.
  • #42: Fundamentally, most of the most commonly used 2.0 tools are databases + templates. That raises two points. The first is that most of these tools are already manageable in the same way that databases are. The second is that they tend to track changes and versions automatically. Here you see a screenshot of the change tracking in Wikipedia. On the right you see in yellow those areas that were changed, and on the left you see what they were changed to. Wikipedia tracks changes to the individual character level (and so do other wiki packages); other tools may not be quite as granular but can still provide an audit trail, though the granularity will vary widely.
  • #43: I’m not a big fan of pre-publication review – anything that’s been vetted by 12 layers of bureaucracy will sound like it has. It also defeats the purpose of some of these tools – Twitter in particular is based on rapid response. That said, it’s absolutely appropriate for the organization to monitor how its employees use social networking. This screenshot shows a query I did for “ARMA2009”, but it could just as easily be for my name, for my employer, etc. Any query can be saved and its results made available as an RSS feed, which you’ll see on the next screenshot.
  • #44: This means having the same type of data map you have in place inside the organization, but with listings of all the services you use, the accounts used there, etc. At a minimum you should list any official use of services and official accounts. It also means understanding the process for getting at that information in the event of litigation, FOIA request, etc. The time to put that process in place is before the subpoena is received. For hosted tools, such as FB or Twitter, it may mean taking periodic snapshots of what is posted to them. Right now there aren’t a lot of tools that do this; one way that can be effective is to capture the RSS feeds generated by these tools. As updates are made, they are published through the RSS feed, which can be saved locally. It might also require working with the third-party vendor in the event that some information or some updates are not available through RSS – for example, web-based email.
  • #45: Finally, there are enterprise versions of every Web 2.0 application. These enterprise versions are often available to be hosted inside the firewall, meaning that security is much more robust. Access can be secured to them much more effectively. They can be integrated into the organization’s identity infrastructure – whether Active Directory or something else – such that any change, post, comment, edit, update, etc. can all be tracked and, more importantly, tracked to a specific named user. No anonymous postings here. Of course, you have to pay for an enterprise version, but what you’re really paying for is a level of peace of mind. And you still get many of the same benefits – ease of use, familiarity with the type of tool, rapid and agile collaboration across geographical and time boundaries, etc. You’re just getting a more secure and robust version of it.
  • #47: At this point I’d be pleased to entertain your questions.