Records Management University
-
Register
- Member - Free!
- *Further discounts may apply once you log in.
Records Management University is here to help you create a program that is compliant and that your employees can actually adhere to.
Join this free self-paced course which includes four on-demand sessions ranging from getting started to adoption, four interviews with seasoned practitioners, and a host of written resources that will help you assess your current program’s maturity and make the case for an upgrade.
Generously sponsored by Contoural
-
Contains 3 Component(s), Includes Credits
The past 10 years has seen a significant shift in how companies develop, execute and mange their records and other information.
Effective records program not only ensure compliance, but also reduce privacy and litigation risks, lower costs and make employees more productive. The past 10 years has seen a significant shift in how companies develop, execute and mange their records and other information. A cornerstone of a program is a modern, compliant and easier-to-execute records retention schedule. Topics in this ACC Webcast include:
- Key concepts of a modern records program
- Creating a compliant and easier-to-execute records retention schedule
- Techniques for gaining agreement with legal, IT, business units and employees on what information to save and not save including email, files and other electronic information
- Designing a schedule that is both compliant and much easier to execute
Generously sponsored by Contoural
Tom Mighell
Vice President of Delivery Services
Contoural, Inc.
I work with corporations and their lawyers to develop defensible information governance programs, including the development of policies, retention schedules, procedures, records management organizations, and training materials to ensure employees understand and adopt changes to their records management practices. I also work with organizations to assess their privacy risks, and to implement the policies and processes to help them comply with relevant privacy regulations.
I also work with these companies to ensure that their people, processes and technologies will support an efficient, repeatable, and defensible e-discovery process, when electronic records are requested in litigation, investigations, or other legal matters. I assist corporations in assessing their readiness to respond to an electronic discovery obligation, and develop response plans that companies can use to strengthen the credibility of their e-discovery programs. -
Contains 3 Component(s)
Success in records management execution needs to be designed into the program. This ACC Webcast reviews the steps, strategies and best practices for getting from policy to execution.
Success in records management execution needs to be designed into the program. This ACC Webcast reviews the steps, strategies and best practices for getting from policy to execution:
- Key steps in records program execution
- Moving records management from being exclusively owned by legal to a shared responsibility owned and funded by multiple functions
- Cadillac, Chevy, golf cart or bicycle â determining the right level of program maturity for your company
- How to avoid from getting stuck, or restarting a stalled initiative
- Designing a records program so it drives effective privacy, eDiscovery, and employee productivity
- If and when it's OK to adopt a policy even if has not yet been executed
Generously sponsored by Contoural
Tom Mighell
Vice President of Delivery Services
Contoural, Inc.
I work with corporations and their lawyers to develop defensible information governance programs, including the development of policies, retention schedules, procedures, records management organizations, and training materials to ensure employees understand and adopt changes to their records management practices. I also work with organizations to assess their privacy risks, and to implement the policies and processes to help them comply with relevant privacy regulations.
I also work with these companies to ensure that their people, processes and technologies will support an efficient, repeatable, and defensible e-discovery process, when electronic records are requested in litigation, investigations, or other legal matters. I assist corporations in assessing their readiness to respond to an electronic discovery obligation, and develop response plans that companies can use to strengthen the credibility of their e-discovery programs. -
Contains 3 Component(s) Recorded On: 10/10/2022
Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance.
Traditional, manually-oriented records management processes don't work into today's digital, employee habitual save-everything-forever, work-from-home environments. Today companies are creating modern, highly-automated record programs that both ensure compliance, but also drive employee productivity and compliance. This module explores real-world strategies for automating records processes and programs:
- The Five Second Rule â Creating combined records management, privacy, data classification and access control processes that employees can follow quickly
- A quick review of technologies to automate programs, including technologies that most companies already own today
- How to delete email, files, and other information quickly and defensibly
- Combining policies, processes, and technologies to automate records management
Generously sponsored by Contoural
Tom Mighell
Vice President of Delivery Services
Contoural, Inc.
I work with corporations and their lawyers to develop defensible information governance programs, including the development of policies, retention schedules, procedures, records management organizations, and training materials to ensure employees understand and adopt changes to their records management practices. I also work with organizations to assess their privacy risks, and to implement the policies and processes to help them comply with relevant privacy regulations.
I also work with these companies to ensure that their people, processes and technologies will support an efficient, repeatable, and defensible e-discovery process, when electronic records are requested in litigation, investigations, or other legal matters. I assist corporations in assessing their readiness to respond to an electronic discovery obligation, and develop response plans that companies can use to strengthen the credibility of their e-discovery programs. -
Contains 3 Component(s)
Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process.
Employees have built habits of saving everything forever in their own private areas over many years. Getting them to save the right information in the right place so it is retained for the right period doesn't just happen, but rather is a result of a formalized training and employee behavior change management process. This final module reviews:
- How messaging, communications plans, training, and audit can be combined into an effective employee behavior change management strategy
- Creating records management messages that resonate, even for employees that don't care about records management
- How to handle the 10% of employees who despite training will seemingly never follow records management policies
- How to audit and remediate ineffective or underperforming program components all while staying compliant.
Generously sponsored by Contoural
Tom Mighell
Vice President of Delivery Services
Contoural, Inc.
I work with corporations and their lawyers to develop defensible information governance programs, including the development of policies, retention schedules, procedures, records management organizations, and training materials to ensure employees understand and adopt changes to their records management practices. I also work with organizations to assess their privacy risks, and to implement the policies and processes to help them comply with relevant privacy regulations.
I also work with these companies to ensure that their people, processes and technologies will support an efficient, repeatable, and defensible e-discovery process, when electronic records are requested in litigation, investigations, or other legal matters. I assist corporations in assessing their readiness to respond to an electronic discovery obligation, and develop response plans that companies can use to strengthen the credibility of their e-discovery programs.