-
Information Management

- Publisher:
- Association of Records Managers & Administrators (ARMA)
- Publication date:
- 2009-05-20
- ISBN:
- 1535-2897
- Copyright:
- COPYRIGHT TV Trade Media, Inc.<br/>COPYRIGHT GALE, Cengage Learning. All rights reserved.
Issue Number
- Vol. 51 Nbr. 2, March 2017
- Vol. 51 Nbr. 1, January 2017
- Vol. 50 Nbr. 6, November - November 2016
- Vol. 50 Nbr. 5, September - September 2016
- Vol. 50 Nbr. 4, July 2016
- Vol. 50 Nbr. 3, May 2016
- Vol. 50 Nbr. 2, March 2016
- Vol. 50 Nbr. 1, January - January 2016
- Vol. 49 Nbr. 6, November - November 2015
- Vol. 49 Nbr. 5, September - September 2015
- Vol. 49 Nbr. 4, July - July 2015
- Vol. 49 Nbr. 3, May - May 2015
- Vol. 49 Nbr. 2, March - March 2015
- Vol. 49 Nbr. 1, January - January 2015
- Vol. 48 Nbr. 6, November - November 2014
- Vol. 48 Nbr. 5, September - September 2014
- Vol. 48 Nbr. 4, July - July 2014
- Vol. 48 Nbr. 3, May - May 2014
- Vol. 48 Nbr. 2, March - March 2014
- Vol. 48 Nbr. 1, January - January 2014
Latest documents
- FRCP amendments dominated 2016 federal e-discovery cases.
- OSHA reiterates: employers must maintain accurate injury, illness records.
- Views clash on whether social media entries are records.
- Australian court recognizes value of predictive coding for e-discovery.
- NY setting precedent for cyber regulations in financial industry.
- Parliament Committee assails UK's cybersecurity defenses.
- NYC Commission wants to collect details on Uber, lyft trips.
- Federal agencies can't compete for top cybersecurity analysts, says FBI.
- Lawmakers unveil cyber recommendations for Trump administration.
- RIM can help organizations seize GDRP opportunities.
Featured documents
- Protecting privacy in an IoT-connected world.
- Exploring the principles for increasing integrity, objectivity in external audits.
- The Sedona Conference[R] adds data security working group.
- Privacy groups oppose proposed Google settlement, Facebook policy changes.
- Compliance is key demand for legal tech providers.
- Checklists for evaluating electronic records storage protection.
- With big data comes big privacy concerns.
- Conducting a business and systems analysis to protect your ECM investment.
- Focusing on points of collaboration for RIM and IT professionals.
- Taking control of e-mail with uniform retention rules.