SlideShare une entreprise Scribd logo
1  sur  54
From ISO to Implementation   A framework for ECM Implementation George Broadbent Director Enterprise Solutions,  Entium Technology Partners Education Code: TR1-1315
Learning Objectives ,[object Object],[object Object],[object Object]
Learning Objectives ,[object Object],[object Object],[object Object]
Session Outline ,[object Object],[object Object],[object Object],[object Object]
Enterprise Content Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Enterprise Content Management Photos and Blueprints Web Content Documents and Records Enterprise Applications eMails Faxes Forms Desktop Applications Graphics, Video, & Audio Reports
Overview of ISO ,[object Object],[object Object],[object Object],[object Object]
Overview of ISO ,[object Object],[object Object],[object Object],The organization adopted “ ISO”  based on the Greek word “ἴσος” ( isos ), which means “ equal .”
ISO Standards Used ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO Standards Used, Cont’d. ,[object Object],[object Object],[object Object],[object Object]
ISO Standards Used, Cont’d. ,[object Object],[object Object],[object Object],[object Object]
Benefits of Using a Framework ,[object Object],[object Object],[object Object],[object Object],[object Object]
Framework Components
Putting it Together Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Records Management Program Records Management Program Strategic Records Improvement Program
Records Management Program Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules
Records Management Program ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Strategic Records Program ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Corporate Policies and Procedures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Classification Plan ,[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Retention Schedule ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Regulatory Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Regulatory Research
ISO 15489 – Regulatory Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Regulatory Research
Bring RM and RR Together ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 15489 – Records Management ,[object Object],[object Object],Source: ISO 15489 ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 15489 – Records Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 23081 Meta Data For Records ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 15836 – Dublin Core ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Program Information Security Program Holistic Framework for Information Security
Information Security Program ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
ISO 17799 – Information Security ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 18492:2005 Long-Term Preservation ,[object Object],[object Object]
ISO 18492:2005 Long-Term Preservation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IS Holistic Corporate Framework ,[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Software Requirements Software Requirements Software Selection
Software Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Software Requirements ,[object Object],[object Object],[object Object]
Software Selection ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
ISO 14721 – Open Archival Information Systems ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ECM Implementation Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation
IEC 82045 – Technical Standard For Document Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 9001 – Quality Management Standard ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISO 19005-1 – Electronic File Format Long Term Preservation ,[object Object],[object Object],[object Object],[object Object]
Document Type Classification ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Taxonomy and Meta Data ,[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Technical Architecture Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
ECM Program Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Business Process Management Business Process Management
Business Process Improvement ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
Recap Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
From ISO to Implementation   A framework for ECM Implementation George Broadbent [email_address] Education Code: TR1-1315 Please Complete Your  Session Evaluation

Contenu connexe

En vedette

[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data AccuracyAIIM International
 
ICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_managementICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_managementJohn Macasio
 
A Brief History of Content
A Brief History of ContentA Brief History of Content
A Brief History of ContentSeth Grimes
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case NarrativesJhoy Pedreza
 
How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...AIIM International
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sampleoaes2006
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 
Types of ISO Certification
Types of ISO CertificationTypes of ISO Certification
Types of ISO CertificationMike Walker
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Bill Annibell
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010Donald E. Hester
 
Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)SOLOMON M KAMINDA
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsERPScan
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveRob Gerbrandt CD, PMP
 

En vedette (20)

[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
[Webinar Slides] How to Increase Your Profits by Improving Your Data Accuracy
 
ICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_managementICT4GOV information architecture_recod_management
ICT4GOV information architecture_recod_management
 
A Brief History of Content
A Brief History of ContentA Brief History of Content
A Brief History of Content
 
[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...
[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...
[EN] Records Management: Definitions, Principles, Standards and Trends | DMS ...
 
Diplomado Gestión del Conocimiento - FAC - PUJ
Diplomado Gestión del Conocimiento - FAC - PUJDiplomado Gestión del Conocimiento - FAC - PUJ
Diplomado Gestión del Conocimiento - FAC - PUJ
 
Workshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and ArchivematicaWorkshop slides - Introduction to AtoM and Archivematica
Workshop slides - Introduction to AtoM and Archivematica
 
[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer
[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer
[DE] EIM Enterprise Information Management | Vortrag Dr. Ulrich Kampffmeyer
 
Acitivity diagram
Acitivity diagramAcitivity diagram
Acitivity diagram
 
Updated Use Case Narratives
Updated Use Case NarrativesUpdated Use Case Narratives
Updated Use Case Narratives
 
How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...How Global Records Management Practices and Standards Are Evolving for Busine...
How Global Records Management Practices and Standards Are Evolving for Busine...
 
Information Security Committee Presentation Sample
Information Security Committee Presentation SampleInformation Security Committee Presentation Sample
Information Security Committee Presentation Sample
 
Taxonomy Fundamentals Workshop
Taxonomy Fundamentals WorkshopTaxonomy Fundamentals Workshop
Taxonomy Fundamentals Workshop
 
Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013Taxonomy Fundamentals Workshop 2013
Taxonomy Fundamentals Workshop 2013
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
Types of ISO Certification
Types of ISO CertificationTypes of ISO Certification
Types of ISO Certification
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 
NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010NIST IT Standards for Local Governments 2010
NIST IT Standards for Local Governments 2010
 
Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)Business classification scheme (Taxonomy)
Business classification scheme (Taxonomy)
 
EAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applicationsEAS-SEC: Framework for securing business applications
EAS-SEC: Framework for securing business applications
 
Approaching Information Management from a Framework Perspective
Approaching Information Management from a Framework PerspectiveApproaching Information Management from a Framework Perspective
Approaching Information Management from a Framework Perspective
 

Similaire à ISO ECM Implementation Framework

eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!J. David Morris
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810cmteti
 
Chapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxChapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxmccormicknadine86
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Frameworkbarnetdh
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.pptKhalilIdhman
 
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...Barry Peters
 
Monica Crocker Implementing Ecm Aiim 2009
Monica Crocker   Implementing Ecm Aiim 2009Monica Crocker   Implementing Ecm Aiim 2009
Monica Crocker Implementing Ecm Aiim 2009AIIM Minnesota
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life CycleCollabor8now Ltd
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessLaura Perry
 
ECM & Records Management with SharePoint
ECM & Records Management with SharePointECM & Records Management with SharePoint
ECM & Records Management with SharePointIntergen
 
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...Keith Atteck C.Tech. ERMm
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity modelnooralmousa
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IMalikPinckney86
 
20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhoferoberhofer
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMaria Thompson
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservationFIAT/IFTA
 

Similaire à ISO ECM Implementation Framework (20)

eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!eDiscovery and Records Oh...My!
eDiscovery and Records Oh...My!
 
Iso30300seminar16062014
Iso30300seminar16062014Iso30300seminar16062014
Iso30300seminar16062014
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810
 
Chapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docxChapter 6Information Governance policy developmentDr. Sand.docx
Chapter 6Information Governance policy developmentDr. Sand.docx
 
Compliance Framework
Compliance FrameworkCompliance Framework
Compliance Framework
 
gray_audit_presentation.ppt
gray_audit_presentation.pptgray_audit_presentation.ppt
gray_audit_presentation.ppt
 
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
15 Months to Certification: Using SharePoint as the Platform for an ISO 9001 ...
 
Monica Crocker Implementing Ecm Aiim 2009
Monica Crocker   Implementing Ecm Aiim 2009Monica Crocker   Implementing Ecm Aiim 2009
Monica Crocker Implementing Ecm Aiim 2009
 
Information Management Life Cycle
Information Management Life CycleInformation Management Life Cycle
Information Management Life Cycle
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Dc2010 fanning
Dc2010 fanningDc2010 fanning
Dc2010 fanning
 
Information Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your BusinessInformation Security Program & PCI Compliance Planning for your Business
Information Security Program & PCI Compliance Planning for your Business
 
ECM & Records Management with SharePoint
ECM & Records Management with SharePointECM & Records Management with SharePoint
ECM & Records Management with SharePoint
 
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
2011 Canadian Institute - Records Retention - The Indispensable Nitty Gritty ...
 
Sudarsan Jayaraman - Open information security management maturity model
Sudarsan Jayaraman  - Open information security management maturity modelSudarsan Jayaraman  - Open information security management maturity model
Sudarsan Jayaraman - Open information security management maturity model
 
In order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) IIn order to have a successful IG program, one of the eight (8) I
In order to have a successful IG program, one of the eight (8) I
 
20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer20080208 Dia Edm Maximizing Metadata Oberhofer
20080208 Dia Edm Maximizing Metadata Oberhofer
 
Motorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM LifecycleMotorola Case Study: Digitization of the IAM Lifecycle
Motorola Case Study: Digitization of the IAM Lifecycle
 
de theory and practice of digital preservation
de theory and practice of digital preservationde theory and practice of digital preservation
de theory and practice of digital preservation
 

Dernier

Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...ictsugar
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessSeta Wicaksana
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 

Dernier (20)

Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
No-1 Call Girls In Goa 93193 VIP 73153 Escort service In North Goa Panaji, Ca...
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...Global Scenario On Sustainable  and Resilient Coconut Industry by Dr. Jelfina...
Global Scenario On Sustainable and Resilient Coconut Industry by Dr. Jelfina...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Organizational Structure Running A Successful Business
Organizational Structure Running A Successful BusinessOrganizational Structure Running A Successful Business
Organizational Structure Running A Successful Business
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Call Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North GoaCall Us ➥9319373153▻Call Girls In North Goa
Call Us ➥9319373153▻Call Girls In North Goa
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 

ISO ECM Implementation Framework

  • 1. From ISO to Implementation A framework for ECM Implementation George Broadbent Director Enterprise Solutions, Entium Technology Partners Education Code: TR1-1315
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Enterprise Content Management Photos and Blueprints Web Content Documents and Records Enterprise Applications eMails Faxes Forms Desktop Applications Graphics, Video, & Audio Reports
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 14. Putting it Together Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
  • 15. Records Management Program Records Management Program Strategic Records Improvement Program
  • 16. Records Management Program Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32. Security Program Information Security Program Holistic Framework for Information Security
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38. Software Requirements Software Requirements Software Selection
  • 39.
  • 40.
  • 41.
  • 42.
  • 43. ECM Implementation Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49. Technical Architecture Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
  • 50.
  • 51. Business Process Management Business Process Management
  • 52.
  • 53. Recap Enterprise Classification Corporate Standards Polices and Procedures Regulatory Research Classification Plan Retention Schedules Records Management Program Strategic Records Improvement Program Information Security Program Holistic Framework for Information Security Software Requirements Software Selection Document Type Classification Taxonomy and Metadata Hierarchy Technical Architecture ECM Program and Software Installation Business Process Management
  • 54. From ISO to Implementation A framework for ECM Implementation George Broadbent [email_address] Education Code: TR1-1315 Please Complete Your Session Evaluation