Wait a second!
More handpicked essays just for you.
More handpicked essays just for you.
Relevance of record keeping
Don’t take our word for it - see why 10 million students trust us with their essay needs.
Recommended: Relevance of record keeping
When archiving, retrieving and deleting information, there are procedures to follow. At first need to divide the information into important and with limited importance and into active and not in active use. The higher value of the information makes it more important. Inactivity indicates that the information with the higher activity requires often and quick access. The paper documents and files should be stored in a manual system, when they’re once filed, read and dealt with. In the electronic storage system files should be saved in a proper place and secured. The paper documents which need to be stored in an electronic system should be scanned at first, then the paper copy filed or shredded. To retrieve the information, the person who requested …show more content…
They should be found easily, but some of important information are sensitive and confidential, so this information must be kept safe, monitored and controlled. In my workplace the example of this information is actual customer’s orders, manning plans, current contracts with the customers.
Important and inactive information have also a high value, but don’t require an often access for them. This kind of information is archived, what allows to retrieve the information if they’re needed. Also it should be clarified who can retrieve the sensitive information. In my workplace this kind of information could be the employees personal details, out of date contracts with the customers and the suppliers.
Active information with a limited importance have a value in a short period of time. This information have a low activity level – once the information have lost the value, it’s become irrelevant and never need to be used again. It doesn’t require storing and archiving, could be deleted quickly. The example of the information which can be deleted after limited importance in my workplace is Town Hall meeting details (once the meeting is done, the details of place and time can be
COSHH records hold information in relation to risk assessments, safety data sheets and how you can work with various hazardous substances, it ensures that all companies follow health precautions to make staff members safe. They are non-confidential information as all staff members should be allowed to access them, yet their extremely important detailed records which must be kept safe, so they should be stored within an office or a locked filing cabinet. They will be used when required so having them on the PC will be practical, for example when changes occur on when an evaluation of the COSHH records happen. The reason for keeping these types of records is that they’re only updated when it’s important and it allows all staff members to become more knowledgeable about things relation to the COSHH register.
Workplaces must keep suitable and accurate records required by the regulations of RIDDOR; these records help to identify patterns in accidents and injuries and will help when risk assessments are carried out. Personal records of employees must also be kept, but must be kept confidential in order to comply with the Data Protection Act. In the event of work-related claims workplaces may also insure they keep all their records and information as insurance company will want to see these records.
Automated is transform the materials or records into digital form. As the era of the technology present, the demanding of digital records is drastically increased. Automated records may present archivists their greatest challenge in identifying, selecting, and preserving records of enduring value. Since the introduction of the computer, archivists have been concerned about its impact on their profession's mission. Based on report by the National Archives of Canada on machine-readable data stated that "if one were to take the traditional archival approach of waiting for whatever recorded information came out of the system, then the archivist in the electronic age will undoubtedly die of information starvation."23 Over the past decade archivists have tried to redefine their role in the modern information age, 24 but many seem to have been merely paying lip service to society's major shift to an "information" era. At present one can count on one hand the number of major programs established to deal with automated records, and these are only located at some of the largest archival institutions - The National Archives of Canada, the U.S. National Archives, and the New York, Utah, and Kentucky state archives. Contrast this with the facts: computers have been used for three decades, personal computers have become an ubiquitous feature of society in just the past decade, and a major portion of all information presently being created is going into automated systems of some variety. Nevertheless, there is overwhelming evidence that archivists are not effectively appraising such information nor using the helpful findings of previous research. 25 Current research is, however, both innovative and promising. Archivists have made substantial pro...
Since the success of our jobs and National Security rely heavily on the maintenance and tracking of personnel security clearance information, information security information and industrial security information, what better way of achieve our goals then to develop a relational database which can track and monitor the progress of these three area disciplines. Microsoft Access is a relational database allowing for the quick analysis and retrieval of vital security information. Capron (2000) defines a relational database as, “A relational database organizes data in a table format consisting of related rows and columns” (p.404). Since all of the computers used in our security division are personal computers, it only seems logical to implement a relational database in order to manage our critical and sensitive security data. Nickerson (2001) supports the need for a relational database to effectively manage data on a personal computer by stating, “Almost all common personal computer database programs use the relational approach” (p.80). There are many benefits in using Microsoft Access. We will discuss some of them in this analysis.
With technology being as worldwide and as it is today, such information can easily get into the wrong hands. Such as hackers or people who steal
1.1 Describe Systems and Procedures for Storing and Retrieving Information Collect documents to be filed, sort in to alphabetical, numerical or chronological order, find the relevant file and place the document inside after it’s divider, and return the file to its original place. Confidential files should be kept in a lockable cabinet and old documents should be shredded after the length of time outlined by the organisation. Electronic filing is similar but on the computer. It is important to name files so that they are easily recognisable by everyone who may need to access it. If the information is confidential it should be encrypted with a password to prevent unauthorised access.
For lawsuit, an indexing system is used to identify and retrieve documents to pay for itself. Response to Rule 26. In a federal lawsuit, parties are required by a new law to identify and produce relevant records within 85 days of the beginning of the litigation. Also required a quick and accurate retrieval of records. For organization, records retention compliance includes federal, state and local governments to regulate record retention periods and over 10,000 federal recordkeeping laws are presented (Skupsky, 1989).
At the end of the year when it comes time to condense and archive your work files or complete your shredding for the past year you are in for big trouble. There are two main aspects to the common filing problem. Number one is that people don't know how to set up a system. It is crucial to know you NEED a filing system when learning how to be organized at work. But where do you even begin?
With the introduction of the IT facilities, the amount of room information takes up is drastically reduced from a whole filing cabinet to a small hard drive. Information can be easily copied and since the advent of the Internet, information does not even have to be on a psychical media to leave the building. This therefore makes it much more easier to copy and take out valuable information. All the companies details, there accounts and their customers account are prone to the risk. A single person can take out all the information on a zip disk or even a floppy disk depending on the size of the file.
In ancient times Humans at some point decided to keep information. Most of this information was kept on walls and scrolls. Elaborate types of database systems were created and used by businesses big and small and government.
Today technology is developing rapidly often the changes are so quick it is hard to keep up to date on emerging technologies. Many consumers enjoy the upgrades but often do not consider that changes can leave old data and information behind. Twenty five years ago, people were using floppies disk to store data. Technology has evolved and today even a cell phone has more storage then early personal computers. After all the emerging technology often it is difficult to find old software or devices to retrieve old data. Although it is a challenge many institutions are overcoming the challenges to preserve information. One of effective development on the field to the altering new technology is occurring in libraries. In the article “Archiving Writers Work in the Age of E-Mail,” Steve Kolowich stated that “archivists should be knowledgeable to new technology in order to transfer data from old technology to another (101). In the library system, people already have technique to preserve papers but digital data requires new machines to transfer from old data to new technology.
Information of low value should not be kept because it only makes the process of information retrieval more difficult. Keeping a massive amount of items can be distracting when manual search is used to find the relevant information.
The process for record retention and destruction play another large part of record management. The retention is based on the amount of space a company has to store the information. Active files are stored at your place of business and inactive files are stored at an offsite location. Then management will decide how long the records will stay in active s...
China. It aimed to enlighten issues pertaining to the components of records management used in operation that involved records resources, system resources as well as people resources. Some of issues be emphasized were on how records are maintained and used, how records are stored and secured or where records are located, the retention schedule developed by organization and qualifications and requirement needed to manage the organization records etc. Yet, different organizations adopted different practices, where these practices also be presented in this study.
It is need to be process before it can turn into something useful. Data also related to transaction, event and facts.