MANAGING ELECTRONIC RECORDS
|
|
- Louise Arnold
- 6 years ago
- Views:
Transcription
1 TOPIC FIVE MANAGING ELECTRONIC RECORDS
2 ELECTRONIC RECORDS DEFINITION Electronic records are records whose creation, storage, access, retrieval and update requires the use of a computer. Electronic records are: Written on magnetic or optical medium Recorded in binary code Accessed using computer hardware and software
3 DATA AND ELECTRONIC RECORDS Data comprises raw unformatted information. Data lacks context and structure and is therefore meaningless on its own Electronic records have meaning and they derive meaning from their context, structure and content.
4 CONTENT, CONTEXT AND STRUCTURE OF A RECORD Content is what the records say they are. Structure relates to the appearance and arrangement of the content. (font layout, table etc) Context is the background information that helps to explain the meaning of the record. It may include information about the title, author and date of creation of the record.
5 CHARACTERISTICS OF ELECTRONIC RECORD Machine Dependent Compactness (high storage capacity) Ease of manipulation Re-packageable Multi-user Access
6 FORMATS AND TYPES OF ELECTRONIC RECORDS Data sets or database : They are a group of related electronic records organized and treated as a unit. Text-based document: these are primarily basic word processing documents with mainly words with a few or no graphical images. Multi-dimensional documents: are electronic records which consist of images of document that are converted into computer files
7 PAPER AND ELECTRONIC RECORDS The content and functions of electronic and paper records are closely related. Data may be extracted from an electronic database to produce a report on a paper. The implication of this is that paper and electronic records management must be closely coordinated.
8 THE LIFE CYCLE OF ELECTRONIC RECORDS Creation of electronic records: This stage is referred to as the input stage Methods of creating electronic records Keying-in directly into a computer using keyboard Reinserting storage equipment into a computer system to upload the stored information. Scanning a record onto a computer system
9 SAVING ELECTRONIC RECORDS Electronic records are stored in files and directories (folders). The records manager needs to provide a guideline on the structure of the storage The guidelines provided must reflect the structure of the activities and functions of the institution.
10 CREATING A DIRECTORY The structure of the directory may include subdirectories as well The directory can be compared to a tree with directories, sub-directories branching off from the main (root) directory resulting in a hierarchical structure A directory structure should based on the functions, programmes and activities of an organization
11 DOCUMENT CONTROL VERSION Version control is the means by which different versions and drafts of a document (or file or record or dataset) are managed. Version control involves a process of naming and distinguishing between a series of draft documents which lead to a final (or approved) version, which in turn may be subjected to further amendments. It provides an audit trail for the revision and update of draft and final versions of documents.
12 EXTERNAL STORAGE DEVICES Optical disks Diskettes or floppy disks Pen drives or flash disk Magnetic tapes
13 LABELING EXTERNAL STORAGE DEVICE Storage device can be identified by placing adhesive labels on them. The labels should indicate; The name of the originating office The title of the document The start and end dates The equipment on which it was used
14 LABELING EXTERNAL STORAGE DEVICE External storage device should be labeled and filed alphabetically or numerically When dealing with many devices, colouredcoded labels could be used to help identify and retrieve documents quickly. For instance, each colour could refer to a different programme, activity, subject or organizational unit.
15 ACCESS, RETRIEVAL & USE OF ELECTRONIC RECORDS The mode and speed of access and retrieval of electronic records depends on the following The media on which records are stored The structure of the storage platform The naming convention The computer system in use The skill of the searcher
16 MANIPULATION OF ELECTRONIC RECORDS Electronic records may be edited by updating, merging, adding, deleting, rearranging, reformatting or repackaging.
17 DISTRIBUTION OF ELECTRONIC RECORDS Once information is stored on a computer, it is necessary to disseminate it to people who need it Electronic records are distributed for use through: Electronic mail Local area network Wide area network Transporting external storage device
18 DISPOSITION OF ELECTRONIC RECORDS Disposition is carried out by purging inactive records from the system most often on external storage devices for keeps at the archives The dormant or inactive records could also be transferred directly into an archival facility designed into the system.
19 APPRAISAL OF ELECTRONIC RECORDS Electronic records are appraised using the same general standards used to appraise information in any other medium. Appraisal of electronic records require; A content analysis: an evaluation of the evidential and informational value of the data A technical analysis: an evaluation of the usability of the data Data with enduring value are preserved in electronic format and transferred to archives
20 DESTRUCTION OF ELECTRONIC RECORDS Electronic records should be erased in a manner that will ensure that files that have supposedly been deleted cannot be recovered.
21 REASONS FOR PROTECTION OF ELECTRONIC RECORDS short lifespan of storage media Sensitivity of storage media: data should be protected from dust, temperature, humidity etc. Machine dependence Vulnerability of access: electronic records are susceptible to alteration and unauthorized access Susceptibility to virus attacks
22 PHYSICAL PROTECTION OF ELECTRONIC RECORDS Lockable workstation accommodation Lockable storage equipment Protection against power surges: this can be done through the use of stabilizers, voltage guards, UPS etc.
23 INTELLECTUAL PROTECTION OF Backing-up ELECTRONIC RECORDS Data migration Passwording Anti-virus systems
24 GUIDELINES FOR HANDLING ELECTRONIC RECORDS Cleanliness: the storage and use environment of electronic records must always be kept clean from dust and dirt Removal and handling: handling should be done to avoid fingerprint of pomade, oil or sweat. Avoid touching the read and write area of disks. Storage of electronic records: storage devices must not be placed under heavy objects. Avoid keeping magnetic storage device near magnetic materials or fields
25 GUIDELINES FOR HANDLING ELECTRONIC RECORDS Avoid serving food and drinks in the facility where electronic records are used and stored Conducive environment for storing records (low temperature and humidity levels, control light intensity atmospheric pollution
26 BENEFITS OF ELECTRONIC RECORDS Storage space saving Change in the office settings or work environment of an organization Reduction in paper and reprographic cost Improved administrative efficiency Increased competitive advantage Speedy task performance
27 CHALLENGES ASSOCIATED WITH ELECTRONIC RECORDS Loss of electronic records. Electronic records may be lost by: System failure Activities of vicious persons Virus attack Storage media instability Reliance on technology: the speed of technological obsolescence makes long term access to and utility of electronic records difficult
28 CHALLENGES ASSOCIATED WITH ELECTRONIC RECORDS Legal issues: the format of electronic records make their admissibility as evidence in the legal settings difficult Security: the vulnerability of electronic records to unauthorized access and corruption by viruses make records insecure.
29 PROBLEMS ASSOCIATED WITH ELECTRONIC RECORDS MANAGEMENT Poor version control and naming conventions (resulting in poor labeling and slow retrieval) Authorship and ownership of electronic records
30 SOLUTIONS TO THE PROBLEMS All electronic records must be inventoried, their ownership and authorship must be determined. All electronic records must be identified, named and clearly labeled. Assigned names must be based on the content of the record. Ideally, electronic records should be preserved in American Standard Code for Information Interchange (ASCII) format. As security and guarantee, retain paper copies of valuable electronic records.
31 End of slides
Chapter 1B-26, Florida Administrative Code RECORDS MANAGEMENT - STANDARDS AND REQUIREMENTS Electronic Recordkeeping
Chapter 1B-26, Florida Administrative Code RECORDS MANAGEMENT - STANDARDS AND REQUIREMENTS Electronic Recordkeeping 1B-26.003 Electronic Recordkeeping. (1) PURPOSE. These rules provide standards for record
More informationPART 5: INFORMATION TECHNOLOGY RECORDS
PART 5: INFORMATION TECHNOLOGY RECORDS SECTION 5 1: RECORDS OF AUTOMATED APPLICATIONS GR5800 01 AUDIT TRAIL RECORDS Files needed for electronic data audits such as files or reports showing transactions
More informationPOLICY AND GUIDELINES FOR THE RETENTION AND DISPOSITION OF ORIGINAL COUNTY RECORDS COPIED ONTO OPTICAL IMAGING AND DATA STORAGE SYSTEMS
POLICY AND GUIDELINES FOR THE RETENTION AND DISPOSITION OF ORIGINAL COUNTY RECORDS COPIED ONTO OPTICAL IMAGING AND DATA STORAGE SYSTEMS 1. Purpose Establish and clarify a records management policy for
More informationThe Office Procedures and Technology
The Office Procedures and Technology Chapter 9 Records Management Systems Copyright 2003 by South-Western, a division of Thomson Learning Overview Records management system Storage Set of media procedures
More informationSouthington Public Schools
3543 POLICY REGARDING RETENTION OF ELECTRONIC RECORDS AND INFORMATION I.POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the retention, storage and destruction
More informationControls Electronic messaging Information involved in electronic messaging shall be appropriately protected.
I Use of computers This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security policy. To
More informationDIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018
DIRECTIVE ON RECORDS AND INFORMATION MANAGEMENT (RIM) January 12, 2018 A. OVERRIDING OBJECTIVE 1.1 This Directive establishes the framework for information management of the Asian Infrastructure Investment
More informationPS 176 Removable Media Policy
PS 176 Removable Media Policy December 2013 Version 2.0 Statement of legislative compliance This document has been drafted to comply with the general and specific duties in the Equality Act 2010; Data
More informationManagement: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
More informationFormatting, Organising and Storing Data
Formatting, Organising and Storing Data Scott Summers UK Data Service University of Essex Cancer Research UK Data Sharing and Management 24 th May 2017 Overview Looking after research data for the longer-term
More informationDeveloping an Electronic Records Preservation Strategy
Version 7 Developing an Electronic Records Preservation Strategy 1. For whom is this guidance intended? 1.1 This document is intended for all business units at the University of Edinburgh and in particular
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More informationHow Long to Keep Records & Legally Dispose of Them. Virginia Fritzsch Public Records Archivist Wisconsin Historical Society
How Long to Keep Records & Legally Dispose of Them Virginia Fritzsch g Public Records Archivist Topics Background: municipal clerks & WHS Public Records law Six basic steps in managing records Legally
More informationRISK ASSESSMENTS AND INTERNAL CONTROL CIS CHARACTERISTICS AND CONSIDERATIONS CONTENTS
CONTENTS Paragraphs Introduction... 1 Organizational Structure... 2 Nature of Processing... 3 Design and Procedural Aspects... 4 Internal Controls in a CIS Environment... 5 General CIS Controls... 6-7
More informationPolicy & Procedure HIPAA / PRIVACY DESTRUCTION
PURPOSE To ensure that any medium containing Protected Health Information ( PHI ) is properly destroyed. POLICY PHI stored in paper, electronic or other format will be destroyed utilizing an acceptable
More informationRecords Retention Schedule
Retention Schedule Form C must Record Title Storage 1. Page 18 of 104 106 Category 2: Electronic Data Processing Section 2.1 Automated Applications 2.1.001 38 Automated Files - Processing Files Machine-readable
More informationBest Practices for Organizing Electronic Records
Best Practices for Organizing Electronic Records October 2017 CONTACT US Division of Library, Archives and Museum Collections govarc@wisconsinhistory.org Best Practices for Organizing Electronic Records
More informationIntroduction to Digital Preservation. Danielle Mericle University of Oregon
Introduction to Digital Preservation Danielle Mericle dmericle@uoregon.edu University of Oregon What is Digital Preservation? the series of management policies and activities necessary to ensure the enduring
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationIntroduction to Computers. Joslyn A. Smith
Introduction to Computers Joslyn A. Smith March 9, 2010 5/18/2011 1 What is a Computer? An electronic device that has the capability of performing the following tasks: Responds to input. Processes the
More informationTOPIC 3 THE LIFE CYCLE & CONTINUUM CONCEPT OF RECORDS MANAGEMENT. Dr. M. Adams I N T R O D U C T I O N T O R E C O R D S M A N A G E M E N T
TOPIC 3 THE LIFE CYCLE & CONTINUUM CONCEPT OF RECORDS MANAGEMENT RECORDS LIFE CYCLE The theory of this concept is that records are born (creation), it lives (maintenance & use) and it dies (disposition).
More information90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government
More informationClearing Out Legacy Electronic Records
For whom is this guidance intended? Clearing Out Legacy Electronic Records This guidance is intended for any member of University staff who has a sizeable collection of old electronic records, such as
More informationAn Overview of the Computer System. Kafui A. Prebbie 24
An Overview of the Computer System Kafui A. Prebbie -kafui@kafui.com 24 The Parts of a Computer System What is a Computer? Hardware Software Data Users Kafui A. Prebbie -kafui@kafui.com 25 The Parts of
More informationBasic Computer Hardware Notes in PDF
Basic Computer Hardware Notes in PDF Computer Awareness is tested in almost every exam. Some exams like SBI PO, SBI Clerk, IBPS PO, IBPS Clerk, SSC CGL, Railways RRB etc. require you to have Basic Computer
More informationServer Security Policy
Server Security Policy Date: Januray 2016 Policy Title Server Security Policy Policy Number: POL 029 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationFreedom of Access in Maine
Freedom of Access in Maine Managing Digital Reality: State Initiatives Presented by: Karla Black, Esq. The Reality of Digital Records If William Shakespeare had written Hamlet on a word processor, or If
More information11-3 Managing Electronic Records
11-3 Managing Electronic Records Outcomes 11-3a Create and access electronic records. 11-3b Apply procedures for managing electronic records. 11-3c Manage records in a database. Electronic Records An electronic
More informationPRINCIPLES AND FUNCTIONAL REQUIREMENTS
INTERNATIONAL COUNCIL ON ARCHIVES PRINCIPLES AND FUNCTIONAL REQUIREMENTS FOR RECORDS IN ELECTRONIC OFFICE ENVIRONMENTS RECORDKEEPING REQUIREMENTS FOR BUSINESS SYSTEMS THAT DO NOT MANAGE RECORDS OCTOBER
More informationComputer Technology Flash Card 2
Computer Technology Flash Card 2 Mouse An input device that allows the user to manipulate objects on the screen by moving the mouse along the surface of a desk. Data Refers to the symbols that represent
More informationRECORDS MANAGEMENT AND YOU
RECORDS MANAGEMENT AND YOU Carolyn Smith S.C. Archives & History Why Records Management Matters Citizens have a right to know. Records have historical importance. Good records makes your job easier. What
More informationInternet, , Social Networking, Mobile Device, and Electronic Communication Policy
TABLE OF CONTENTS Internet, Email, Social Networking, Mobile Device, and... 2 Risks and Costs Associated with Email, Social Networking, Electronic Communication, and Mobile Devices... 2 Appropriate use
More informationAccession Procedures Born-Digital Materials Workflow
Accession Procedures Born-Digital Materials Workflow Initiating Author: Department: Sam Meister Archives & Special Collections Revision History Date Version Description Changed by 02/29/12 0.1 Draft 03/27/12
More informationRECORDS MANAGEMENT Judith Read and Mary Lea Ginn
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 11 Electronic and Image Records Copyright 2011 South-Western, Cengage Learning Electronic and Image Records Electronic record Stored on electronic
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More informationDisaster Recovery Self-Audit
Disaster Recovery Self-Audit Disaster Recovery Audit There are 3 steps to this process: 1. Identify all data and IT-related functions (like credit card processing, documents on your file server, member
More informationDATA STRUCTURES USING C
DATA STRUCTURES USING C File Management Chapter 9 2 File Concept Contiguous logical address space Types: Data numeric character binary Program 3 File Attributes Name the only information kept in human-readable
More informationGreenTec Broderick Drive, Suite 155 Sterling, VA
Media and Systems Protection, Integrity and Accountability Whitepaper GreenTec 22375 Broderick Drive, Suite 155 Sterling, VA 20166 www.greentec-usa.com www.greentec-usa.com CJIS Compliance Whitepaper Table
More informationInformation System Security. Nguyen Ho Minh Duc, M.Sc
Information System Security Nguyen Ho Minh Duc, M.Sc Contact 2 Nguyen Ho Minh Duc Phone: 0935 662211 E-mail: duc.nhm@gmail.com Web:http://nhmduc.wordpress.com 3 Lecture 01 INTRODUCTION Topics 4 What information
More informationTHE TEXAS A&M UNIVERSITY SYSTEM RECORDS RETENTION SCHEDULE
2.1.001 02.100.10 01.404.10 Curriculum Files, including Revisions, Departmental US+5 01.405.10 Instructor/Faculty Evaluations +1 =Academic term 01.406.10 Instructor Grade Books +1 =Academic term 01.407.10
More informationelc International School
Subject: COMPUTER SCIENCE (0478) Syllabus 2016 Topics to be covered Section 1: Theory of Computer Science Theory: At the end of the section candidates should be able to Practical: At the end of the section
More informationMay 15, REVISED. TOTAL PAGES Dec. 30, Division Computer Systems
Columbus Police Division Directive EFFECTIVE NUMBER May 15, 1993 3.63 REVISED TOTAL PAGES Dec. 30, 2007 8 Division Computer Systems Cross Reference: I. Definitions A. Executable File A program or file
More informationTerms in the glossary are listed alphabetically. Words highlighted in bold are defined in the Glossary.
Glossary 2010 The Records Management glossary is a list of standard records terms used throughout CINA s guidance and training. These terms and definitions will help you to understand and get the most
More informationViolations of any portion of this policy may be subject to disciplinary action up to and including termination of employment.
Page 1 of 6 Policy: All computer resources are the property of Lee County and are intended to be used for approved County business purposes. Users are permitted access to the computer system to assist
More informationMedia Protection Program
Media Protection Program Version 1.0 November 2017 TABLE OF CONTENTS 1.1 SCOPE 2 1.2 PRINCIPLES 2 1.3 REVISIONS 3 2.1 OBJECTIVE 4 3.1 PROGRAM DETAILS 4 3.2 MEDIA STORAGE AND ACCESS 4 3.3 MEDIA TRANSPORT
More informationIT CONTINUITY, BACKUP AND RECOVERY POLICY
IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption
More informationManaging Records in Electronic Formats. An Introduction
Managing Records in Electronic Formats An Introduction Jefferson County Public Schools Archives and Records Center November 2012 Managing Records in Electronic Format As we create and use more and more
More informationComputer Devices Part 1 25 Question(s) Test ID:
Computer Part 1 25 Question(s) Test ID: 148114 Name: Date: 1) Match the term with the definition Output s Storage How to tell it what to do Allows the user to enter information into a system, such as a
More informationGetting Started. Here's how to get started using your Zip 250 drive: 1. Unpack the Zip 250 drive and accessories.
Getting Started IMPORTANT! Before installing or using your Zip 250 drive, read and follow the USB guidelines to ensure reliable performance of your USB devices. Here's how to get started using your Zip
More informationProcedure re-written. (i.e. All staff with responsibility for the creation, use and management of organisational responsibility)
Standard Operating Procedure Title of Standard Operation Procedure: Corporate Records Management Procedure Reference Number: ECT002863 Version No: 2.0 Supersedes Versions No: 0.1 Amendments Made: Procedure
More informationIncident Response Data Acquisition Guidelines for Investigation Purposes 1
Incident Response Data Acquisition Guidelines for Investigation Purposes 1 1 Target Audience This document is aimed at general IT staff that may be in the position of being required to take action in response
More informationGeographic Information Systems (GIS) - Hardware and software in GIS
PDHonline Course L153 (5 PDH) Geographic Information Systems (GIS) - Hardware and software in GIS Instructor: Steve Ramroop, Ph.D. 2012 PDH Online PDH Center 5272 Meadow Estates Drive Fairfax, VA 22030-6658
More informationTechnologies 1ºESO. Unit 2. Hardware and software. Name Nº Class. After having explained page 26 of your book:
After having explained page 26 of your book: Make sure you get this concepts right: 1. What is computer science? A computer system collects data, processes it and transmits the information. Computer science
More informationThe InterPARES Glossary
The InterPARES Glossary December 2001 Glossary action The conscious exercise of will by an officer of the records creator or by an external person aimed to create, maintain, modify or extinguish situations.
More informationContents: Safety instructions... 1 Introduction... 3
Contents: Contents:...i Safety instructions... 1 Safety and installation... 1 Cabling... 1 Electromagnetic compatibility/ Conformity with norms... 2 Cleaning... 2 Recycling and disposal... 2 Data security...
More informationUELMA Preservation. Jason Judt & Daniel Kruse Office of the Revisor of Statutes, Minnesota
UELMA Preservation Jason Judt & Daniel Kruse Office of the Revisor of Statutes, Minnesota UELMA System Overview Server-side authentication Complete versioning system Tracking and auditing tools developed
More informationHIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics
HIPAA Security SERIES Security Topics 1. Security 101 for Covered Entities 2. Security Standards - Administrative Safeguards 3. Security Standards - Physical Safeguards 4. Security Standards - Technical
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 29121 First edition 2009-02-15 Information technology Digitally recorded media for information interchange and storage Data migration method for DVD-R, DVD-RW, DVD-RAM, +R,
More informationNorcom. e-fileplan Electronic Cabinet System
Norcom e-fileplan Electronic Cabinet System Revision 2.0 \ Phone: (866) 726-6328 Email:sales@norcom-inc.com e-fileplan Overview e-fileplan is an electronic filing cabinet and document imaging system. e-fileplan
More informationUsing the Computer & Managing Files Part 2
Using the Computer & Managing Files Part 2 Using the Computer & Managing Files...65 Example 1 File compression, or zipping...66 Exercise 1 Download and install software...66 Exercise 2 Understand file
More informationFinancial CISM. Certified Information Security Manager (CISM) Download Full Version :
Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as
More informationChapter 9 Section 3. Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats
Records Management (RM) Chapter 9 Section 3 Digital Imaging (Scanned) And Electronic (Born-Digital) Records Process And Formats Revision: 1.0 GENERAL 1.1 The success of a digitized document conversion
More informationThis Document is licensed to
GAMP 5 Page 291 End User Applications Including Spreadsheets 1 Introduction This appendix gives guidance on the use of end user applications such as spreadsheets or small databases in a GxP environment.
More informationManaging Born- Digital Documents.
Managing Born- Digital Documents www.archives.nysed.gov Objectives Review the challenges of managing born-digital records Provide Practical strategies to ensure born-digital records are well managed Understand
More informationCHAPTER 5 1 RECORDS MANAGEMENT
Slide 1 Slide 2 Using Databases Databases are organized for rapid search and retrieval Databases have objects: Tables Forms Queries Reports Slide 3 Access Database Table Fields are arranged in columns
More informationIntroduction to OS. File Management. MOS Ch. 4. Mahmoud El-Gayyar. Mahmoud El-Gayyar / Introduction to OS 1
Introduction to OS File Management MOS Ch. 4 Mahmoud El-Gayyar elgayyar@ci.suez.edu.eg Mahmoud El-Gayyar / Introduction to OS 1 File Management Objectives Provide I/O support for a variety of storage device
More informationOperate a Personal Computer
ICA10105 Certificate I in Information Technology ICAU1128B Operate a Personal Computer (20hrs) ICAU1128B: Operate a Personal Computer Description This unit defines the competency required to operate a
More informationDefining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005
Defining OAIS requirements by Deconstructing the OAIS Reference Model Date last revised: August 28, 2005 This table includes text extracted directly from the OAIS reference model (Blue Book, 2002 version)
More informationThe Evolution of Data Warehousing. Data Warehousing Concepts. The Evolution of Data Warehousing. The Evolution of Data Warehousing
The Evolution of Data Warehousing Data Warehousing Concepts Since 1970s, organizations gained competitive advantage through systems that automate business processes to offer more efficient and cost-effective
More informationIntroduction to Computers
Introduction to Computers Considers: Definition of computer Computer system devices Central Processing Unit Introduction to software What Is A Computer? A computer is an electronic device, operating under
More informationThe InterPARES Glossary
The InterPARES Glossary A controlled vocabulary of terms used in the InterPARES Project No.2 Vol. 1 January 1, 2002 University of British Columbia. Vancouver, Canada. The InterPARES Glossary action The
More informationUser Guide. Trade Finance Global. For customers using Guarantees. October nordea.com/cm OR tradefinance Name of document 5/8 2015/V1
User Guide Trade Finance Global For customers using Guarantees October 2015 nordea.com/cm OR tradefinance Name of document 2015/V1 5/8 Table of Contents 1 Trade Finance Global (TFG) - Introduction... 4
More informationSTORAGE & FILE CONCEPTS, UTILITIES
STORAGE & FILE CONCEPTS, UTILITIES (Pages 6, 150-158 - Discovering Computers & Microsoft Office 2010) I. Computer files data, information or instructions residing on secondary storage are stored in the
More informationCOMPUTER STORAGE DEVICES
COMPUTER STORAGE DEVICES A storage device records and retrieves items to and from a storage medium. A storage media is the actual physical material that holds data and programs. Writing is the process
More informationINFORMATION. Guidance on the use of the SM1000 and SM2000 Videographic Recorders for Electronic Record Keeping in FDA Approved Processes
INFORMATION No. INF02/70 Issue 3 Date: October 2007 Product SM1000 and SM2000 Videographic Recorders Manuals IM/SM1000 and IM/SM2000 Guidance on the use of the SM1000 and SM2000 Videographic Recorders
More informationDIGITAL RECORDS MANAGEMENT GUIDELINES
DIGITAL RECORDS MANAGEMENT GUIDELINES This Digital Records Management Guidelines document will primarily address the following types of digital records: Email Media Born Digital Records Scanned Records
More informationNEW YORK PUBLIC LIBRARY
NEW YORK PUBLIC LIBRARY S U S A N M A L S B U R Y A N D N I C K K R A B B E N H O E F T O V E R V I E W The New York Public Library includes three research libraries that collect archival material: the
More informationSECURITY & PRIVACY DOCUMENTATION
Okta s Commitment to Security & Privacy SECURITY & PRIVACY DOCUMENTATION (last updated September 15, 2017) Okta is committed to achieving and preserving the trust of our customers, by providing a comprehensive
More informationHow do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?
Cybersecurity Due Diligence Checklist Control # Control Name Risks Questions for IT 1 Make an Benign Case: Employees Inventory of using unapproved Authorized devices without Devices appropriate security
More informationRELATIONSHIP BETWEEN THE ISO SERIES OF STANDARDS AND OTHER PRODUCTS OF ISO/TC 46/SC 11: 1. Records processes and controls 2012
RELATIONSHIP BETWEEN THE ISO 30300 SERIES OF STANDARDS AND OTHER PRODUCTS OF ISO/TC 46/SC 11: Records processes and controls White paper written by ISO TC46/SC11- Archives/records management Date: March
More informationIBM Tivoli Storage Manager Version Introduction to Data Protection Solutions IBM
IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM IBM Tivoli Storage Manager Version 7.1.6 Introduction to Data Protection Solutions IBM Note: Before you use this
More informationAPPENDIX THREE RETENTION AND DISPOSAL SCHEDULE IMPLEMENTATION GUIDELINES FOR NSU PROVIDERS
APPENDIX THREE RETENTION AND DISPOSAL SCHEDULE IMPLEMENTATION GUIDELINES FOR NSU PROVIDERS National Screening Unit Version 3 April 2012 Prepared by SWIM Ltd 2012 1 Table of Contents 1 What is a retention
More information!IlflimTIII~III~III~l~I~IIII!
This document is made available electronically by the Minnesota Legislative Reference Library as part of an ongoing digital archiving project. http://www.leg.state.mn.us/lrl/lrl.asp 12-0429!IlflimTIII~III~III~l~I~IIII!
More informationCREATE YOUR RECORDS RETENTION AND DISPOSITION SCHEDULE. Tweet about this session at #MMLConference
H CREATE YOUR RECORDS RETENTION AND DISPOSITION SCHEDULE Tweet about this session at #MMLConference MARYLAND STATE ARCHIVES RECORDS MANAGEMENT GUIDANCE https://msa.maryland.gov/msa/intromsa/html/record_mgmt/homepage.html
More informationStoreVault and NetApp Snapshot Technology
StoreVault and NetApp Snapshot Technology Instant backup and instant restore The backup window eliminated Added data protection and ease of recovery Introduction 2 How NetApp Snapshot Technology Can Help
More informationSecurity Policies and Procedures Principles and Practices
Security Policies and Procedures Principles and Practices by Sari Stern Greene Chapter 3: Information Security Framework Objectives Plan the protection of the confidentiality, integrity and availability
More informationAdministrative Inquiry (AI) Guidelines for Information Systems (IS)
Administrative Inquiry (AI) Guidelines for Information Systems (IS) Guidelines for Conducting an AI Involving a Nonaccredited IS The format of the information is NOT important. Classified information,
More informationUniversity Information Technology Data Backup and Recovery Policy
University Information Technology Data Backup and Recovery Policy I. Purpose and Scope A. The purpose of this policy is to document the University of Utah Information Technology (UIT) data backup and recovery
More informationDepartment of Public Health O F S A N F R A N C I S C O
PAGE 1 of 9 Category: Information Technology Security and HIPAA DPH Unit of Origin: Department of Public Health Policy Owner: Phillip McDown, CISSP Phone: 255-3577 CISSPCISSP/C Distribution: DPH-wide Other:
More informationThink Twice Before you Write-Once
Think Twice Before you Write-Once Pegasus Disk Technologies, Inc. WORM (Write-Once-Read-Many) technology is used in many applications because of the integrity of the data and the accepted legal admissibility
More informationPlasmon Diamond Library Manager
Plasmon Diamond Library Manager Release Details Product Release Notes Release Name: Diamond Library Manager Release Note Number: Note091 Release Version: 2.09.31 Release Date: 1 st July 2005 Release Type:
More informationISO27001 Preparing your business with Snare
WHITEPAPER Complying with ISO27001 Preparing your business with Snare T he technical controls imposed by ISO (International Organisation for Standardization) Standard 27001 cover a wide range of security
More informationBest practices with Snare Enterprise Agents
Best practices with Snare Enterprise Agents Snare Solutions About this document The Payment Card Industry Data Security Standard (PCI/DSS) documentation provides guidance on a set of baseline security
More informationSupersedes Policy previously approved by TBM
Document Title: Email Policy Pages Document Type: Policy 6 No. Of Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 27 Treasury Board Approval ( # ) TBM2009-298 Supersedes
More informationAccessioning. Kevin Glick Yale University AIMS
Accessioning Kevin Glick Yale University What is Accessioning? Archival institution takes physical and legal custody of a group of records from a donor and documents the transfer in a register or other
More informationTitle: Case Study 08 North Vancouver Museum and Archives (NVMA): Customizable Versions of Products
Title: Case Study 08 North Vancouver Museum and Archives (NVMA): Customizable Versions of Products Brochure 2. Maintaining Digital Records: Business Edition Status: Version: 1.0 Final (public) Last Revised:
More informationCSC 553 Operating Systems
CSC 553 Operating Systems Lecture 12 - File Management Files Data collections created by users The File System is one of the most important parts of the OS to a user Desirable properties of files: Long-term
More informationLAB1 INTRODUCTION TO PSS/E EE461: POWER SYSTEMS COLORADO STATE UNIVERSITY
LAB1 INTRODUCTION TO PSS/E EE461: POWER SYSTEMS COLORADO STATE UNIVERSITY PURPOSE: The purpose of this lab is to introduce PSS/E. This lab will introduce the following aspects of PSS/E: Introduction to
More information4. A mail box 9) What is an embedded system? 1. A program that comes wrapped in a box 2. A program that is permanent part of a computer 3.
SET 6 1) A 32 bit word computer can access bytes at a time. 1. 4 2. 8 3. 16 4. 32 2) Access control based on a person s fingerprints is an example of 1. Biometric identification 2. Characteristic identification
More informationQuick Recovery for INCREDIMAIL
Quick Recovery for INCREDIMAIL User s Guide Unistal Systems (P) Ltd. 1 End User License Agreement. Important: Read this before using your copy of Quick Recovery for INCREDIMAIL. Unistal Quick Recovery
More information