Activity
Mon
Wed
Fri
Sun
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
Jan
Feb
What is this?
Less
More

Memberships

Records Information Management

122 members • Free

22 contributions to Records Information Management
Records Management as a pillar of Cybersecurity
To what extent should records management be treated as a core component of an organization’s cybersecurity strategy, rather than a support function, and how can this integration be practically achieved without duplicating controls or increasing operational complexity? Poorly managed records create vulnerabilities, including unauthorized access, data breaches, and loss of evidential integrity which increases the risk of cyber security
0
0
Records and Business Continuity
Business continuity relies on access to reliable records during disruptions, incidents, or system outages. Poorly managed records increase recovery time and operational risk. Identifying and protecting vital records is a core information governance responsibility. Reflection questions: - Are vital records clearly identified and protected? - Are backups and recovery processes tested? Action:Identify one vital record category critical to business continuity.
1 like • 7d
In the context of EDRMS, vital records should be identified during capture process and metadata clearly captured,, this would help in adding extra protection strategies and back up for such mission critical records
Creating an effective classification scheme.
Classification schemes organise records according to business functions rather than technologies. A good scheme reflects how the organisation works and evolves over time. Poor classification leads to misfiling and lost information. 1. Does your classification scheme match current business activities? 2. Is it intuitive for users? Action: Review one classification category for relevance and clarity.
1 like • 7d
This is correctly put... classification especially in 3 tier should reflect function, activities and transactions... as opossed to departmental classification .. This is the best practice
Risk is the real language of RIM
Records management risk rarely appears suddenly. It builds quietly through poor visibility, inconsistent disposal, and unclear ownership. Understanding where risk concentrates helps prioritise effort and justify decisions. Reflection questions: - Where does unmanaged information pose the biggest risk? - Which risks are least visible but most serious? Action: List one information risk you should address this quarter.
0 likes • 9d
ISO 27001 addresses risks related to confidentiality, integrity, and availability of records and information, including unauthorized access, loss, and breaches which must be mitigated
0 likes • 9d
@Paul Mullon Thanks, i'll get a copy
Managing Records in Legacy Systems
Legacy systems often hold large volumes of high-risk records with limited governance controls and poor visibility. Decisions to migrate, decommission, or maintain these systems are rarely straightforward. Governance should guide decisions about legacy systems — not convenience, cost alone, or organisational inertia. Reflection questions: - Do you have legacy systems holding critical or regulated records? - Is there a clear plan for managing or retiring those systems? Action: List one legacy system and the key records-related risks it presents.
1 like • 9d
This once affected me ... when my university migrated from an old system to a new system, unfortunately, they did not migrate all records, my fee payment records and academic records could not be traced, retrieved or verified... it was chaotic especialy when the only option was to repay the fees and go back to class... luckily i kept all my records well and i was able to retrieve them from my side... but i learnt a practical lesson... when migrating from this legacy system, it must be well planed and managed to avoid such challenges
1-10 of 22
Douglas Maina
3
42points to level up
@douglas-maina-5558
Records and nformation management professional

Active 5d ago
Joined Dec 22, 2025