Category: Featured Articles
-
Thank You from Bill Gulley – Our September 2014 Presenter
Dear ARMA Colleagues, Thank you for your kind attention and questions during my recent presentation to your chapter. I thoroughly enjoyed the opportunity to share some of my experiences. Hopefully my presentation will help you avoid the mistakes others—myself included—have made in the wake of a records disaster. I had a professor in college that…
-
Ten Steps to Follow in the Event of a Security Breach — John Isaza, Esq.
“Although this issue may seem outside the scope for records managers, our new breed of Information Governance professionals may be called to participate in the response process. I say this because data breaches involve hacking into Records of the organization, which we have a duty to Protect under the Generally Accepted Record keeping Principles.” … Ten…