SlideShare a Scribd company logo
1 of 32
INFORMATION
MANAGEMENT 1
Study of principles and practices of basic administration (code of conduct)
Collection of documents.
Disposition is the
disposal of
information that has
come to the end of
the information
lifecycle. Most often,
this means destruction,
though it can also mean
transfer to another
organization in some
cases – for example, to
a corporate archive if it
has historical value.
What Are The 5 Key Areas of Information Management?
The five key areas of information management are
information collection, storage, distribution, archiving, and
destruction. Each of these key areas plays a vital role in the
effective management of information throughout
its lifecycle and ensures that an organization’s information is
collected, stored, and shared in a way that supports its
operations and decision-making.
1- Collection
At this stage, we must examine how the business
collects information, whether it is created internally or
externally, electronically or as paper documents,
verbally, written, audio, or video.
At this point, it is crucial to collect just the necessary
information in order to save storage costs, prevent
analyzing data that is unnecessary to business
governance, and guarantee that the information
obtained is of good quality.
2- Storage
We must determine where the information collected in
the previous phase will be stored. Paper documents
should be stored and arranged in physical cabinets
with fire-resistance measures in place.
Electronic information, on the other hand, might be
kept in databases, document management
systems, information systems, and so on.
We must also identify and configure user access,
version and change control, backups, and audit trails.
3- Distribution
This step entails deciding how different types of
information should be distributed, in what format, to
whom, how frequently, and through what media,
among other things.
Information is only valuable when it is presented to
the appropriate person in order for the proper action
to be taken. This is a critical phase since it helps the
overall success of your program.
4- Archiving
Archiving is the process of securely storing inactive
information in any format (both digital and paper) that
you no longer use regularly for long-term retention..
Such information is still important to organizations
and must be retained for future reference or
regulatory compliance.
You need to clearly state where the information is
going to be archived and for how long.
5- Destruction
Destruction is the act of disposing of records
permanently by obliterating records so that the
information in them can no longer be physically or
electronically reconstructed or recovered. Destruction
decisions must be formally approved before any
action is taken.
1. Introduction.pptx
1. Introduction.pptx

More Related Content

Similar to 1. Introduction.pptx

Records Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationRecords Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationEverteam
 
Document management strategy 2015
Document management strategy 2015Document management strategy 2015
Document management strategy 2015Michael Burgess
 
E Bryan Information Security Management Protecting Your Assets
E  Bryan   Information Security Management   Protecting Your AssetsE  Bryan   Information Security Management   Protecting Your Assets
E Bryan Information Security Management Protecting Your AssetsEmerson Bryan
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
RCR 4 Data Management Introduction System Information
RCR 4 Data Management Introduction System InformationRCR 4 Data Management Introduction System Information
RCR 4 Data Management Introduction System Informationlumaeducation
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligenceMichael Burgess
 
records management workshop updated 20141112.pptx
records management workshop updated 20141112.pptxrecords management workshop updated 20141112.pptx
records management workshop updated 20141112.pptxErmiyas33
 
Discussion -1 100 words with a reference. Records administrato.docx
Discussion -1 100 words with a reference. Records administrato.docxDiscussion -1 100 words with a reference. Records administrato.docx
Discussion -1 100 words with a reference. Records administrato.docxcharlieppalmer35273
 
Records-Management_Getting_Started_WP[9]
Records-Management_Getting_Started_WP[9]Records-Management_Getting_Started_WP[9]
Records-Management_Getting_Started_WP[9]Deja Nichols
 
Key steps to implement an information management plan
Key steps to implement an information management planKey steps to implement an information management plan
Key steps to implement an information management planshopiawilson
 
Seven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingSeven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingEMC
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfHome
 
Master of Computer Application (MCA) – Semester 4 MC0076
Master of Computer Application (MCA) – Semester 4  MC0076Master of Computer Application (MCA) – Semester 4  MC0076
Master of Computer Application (MCA) – Semester 4 MC0076Aravind NC
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfYihune Ephrem
 
DocuLynx Software Capabilities
DocuLynx Software CapabilitiesDocuLynx Software Capabilities
DocuLynx Software CapabilitiesDocuLynx
 

Similar to 1. Introduction.pptx (20)

Records Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationRecords Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your Information
 
Document management strategy 2015
Document management strategy 2015Document management strategy 2015
Document management strategy 2015
 
E Bryan Information Security Management Protecting Your Assets
E  Bryan   Information Security Management   Protecting Your AssetsE  Bryan   Information Security Management   Protecting Your Assets
E Bryan Information Security Management Protecting Your Assets
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
What are the three main goals of data lifecycle management (DLM).pdf
What are the three main goals of data lifecycle management (DLM).pdfWhat are the three main goals of data lifecycle management (DLM).pdf
What are the three main goals of data lifecycle management (DLM).pdf
 
RCR 4 Data Management Introduction System Information
RCR 4 Data Management Introduction System InformationRCR 4 Data Management Introduction System Information
RCR 4 Data Management Introduction System Information
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligence
 
records management workshop updated 20141112.pptx
records management workshop updated 20141112.pptxrecords management workshop updated 20141112.pptx
records management workshop updated 20141112.pptx
 
Pp1
Pp1Pp1
Pp1
 
Discussion -1 100 words with a reference. Records administrato.docx
Discussion -1 100 words with a reference. Records administrato.docxDiscussion -1 100 words with a reference. Records administrato.docx
Discussion -1 100 words with a reference. Records administrato.docx
 
Records-Management_Getting_Started_WP[9]
Records-Management_Getting_Started_WP[9]Records-Management_Getting_Started_WP[9]
Records-Management_Getting_Started_WP[9]
 
Key steps to implement an information management plan
Key steps to implement an information management planKey steps to implement an information management plan
Key steps to implement an information management plan
 
Seven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective ArchivingSeven Essential Strategies for Effective Archiving
Seven Essential Strategies for Effective Archiving
 
Data Security
Data SecurityData Security
Data Security
 
BIS-bit (1).pdf
BIS-bit (1).pdfBIS-bit (1).pdf
BIS-bit (1).pdf
 
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdfEFFICIENCY MEETS ACCURACY  IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
EFFICIENCY MEETS ACCURACY IN M&A DUE DILIGENCE WITH VIRTUAL DATA ROOMS.pdf
 
Master of Computer Application (MCA) – Semester 4 MC0076
Master of Computer Application (MCA) – Semester 4  MC0076Master of Computer Application (MCA) – Semester 4  MC0076
Master of Computer Application (MCA) – Semester 4 MC0076
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdf
 
DocuLynx Software Capabilities
DocuLynx Software CapabilitiesDocuLynx Software Capabilities
DocuLynx Software Capabilities
 
Records Management
Records ManagementRecords Management
Records Management
 

More from EllenGrace9

4. ERD Cardinality.pptx
4. ERD Cardinality.pptx4. ERD Cardinality.pptx
4. ERD Cardinality.pptxEllenGrace9
 
3. Venn Diagram.pptx
3. Venn Diagram.pptx3. Venn Diagram.pptx
3. Venn Diagram.pptxEllenGrace9
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptxEllenGrace9
 
Data Structures and Algorithm - Module 1.pptx
Data Structures and Algorithm - Module 1.pptxData Structures and Algorithm - Module 1.pptx
Data Structures and Algorithm - Module 1.pptxEllenGrace9
 

More from EllenGrace9 (8)

3. ERD.pptx
3. ERD.pptx3. ERD.pptx
3. ERD.pptx
 
4. ERD Cardinality.pptx
4. ERD Cardinality.pptx4. ERD Cardinality.pptx
4. ERD Cardinality.pptx
 
3. Venn Diagram.pptx
3. Venn Diagram.pptx3. Venn Diagram.pptx
3. Venn Diagram.pptx
 
Introduction.pptx
Introduction.pptxIntroduction.pptx
Introduction.pptx
 
Sets.pdf
Sets.pdfSets.pdf
Sets.pdf
 
Sets.pptx
Sets.pptxSets.pptx
Sets.pptx
 
Data Structures and Algorithm - Module 1.pptx
Data Structures and Algorithm - Module 1.pptxData Structures and Algorithm - Module 1.pptx
Data Structures and Algorithm - Module 1.pptx
 
implication.pdf
implication.pdfimplication.pdf
implication.pdf
 

Recently uploaded

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

1. Introduction.pptx

  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8. Study of principles and practices of basic administration (code of conduct)
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 20.
  • 21.
  • 22.
  • 23. Disposition is the disposal of information that has come to the end of the information lifecycle. Most often, this means destruction, though it can also mean transfer to another organization in some cases – for example, to a corporate archive if it has historical value.
  • 24.
  • 25. What Are The 5 Key Areas of Information Management? The five key areas of information management are information collection, storage, distribution, archiving, and destruction. Each of these key areas plays a vital role in the effective management of information throughout its lifecycle and ensures that an organization’s information is collected, stored, and shared in a way that supports its operations and decision-making.
  • 26. 1- Collection At this stage, we must examine how the business collects information, whether it is created internally or externally, electronically or as paper documents, verbally, written, audio, or video. At this point, it is crucial to collect just the necessary information in order to save storage costs, prevent analyzing data that is unnecessary to business governance, and guarantee that the information obtained is of good quality.
  • 27. 2- Storage We must determine where the information collected in the previous phase will be stored. Paper documents should be stored and arranged in physical cabinets with fire-resistance measures in place. Electronic information, on the other hand, might be kept in databases, document management systems, information systems, and so on. We must also identify and configure user access, version and change control, backups, and audit trails.
  • 28. 3- Distribution This step entails deciding how different types of information should be distributed, in what format, to whom, how frequently, and through what media, among other things. Information is only valuable when it is presented to the appropriate person in order for the proper action to be taken. This is a critical phase since it helps the overall success of your program.
  • 29. 4- Archiving Archiving is the process of securely storing inactive information in any format (both digital and paper) that you no longer use regularly for long-term retention.. Such information is still important to organizations and must be retained for future reference or regulatory compliance. You need to clearly state where the information is going to be archived and for how long.
  • 30. 5- Destruction Destruction is the act of disposing of records permanently by obliterating records so that the information in them can no longer be physically or electronically reconstructed or recovered. Destruction decisions must be formally approved before any action is taken.