Interview With Mark Myers on the Texas Digital Archive

This is the first in a two-part series exploring the Texas Digital Archive (TDA) with Electronic Records Specialist Mark Myers of the Archives and Information Services (ARIS) division at TSLAC. Mark is responsible for ingesting electronic records into the TDA. It’s interesting to ponder that just a few years ago TSLAC had no way of…

Benefits and Limitations of Auto Classification in Records Management

As more organizations move from paper to electronic records, records management professionals face more complex challenges in managing these records. In their effort to maintain seamless records management processes within their organization, records managers expressed interest in products that specifically automate key records processes and controls. Records management professionals must ensure that the introduction of…

e-Records Conference 2018: Call for Presentations

The annual e-Records Conference will be held Friday, November 16, 2018. This event promotes improved electronic records management in Texas government by bringing together staff responsible for and interested in records management and information technology. Texas technology managers and records managers are working together in new and exciting ways. From governance initiatives to cloud, here…

Electronic Records Resources Now Available

TSLAC updated Bulletin 1: Electronic Records Standards and Procedures in 2017, and since then, we’ve been gathering resources to provide guidance to state agencies trying to fulfill the requirements of the bulletin. The bulletin was rewritten to be intentionally higher-level and broad, to allow for more considerations of electronic records in a general sense, instead…

License: Creative Commons 3 - CC BY-SA 3.0

Cyber Blackmail: More Than Just Ransomware

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. Ransomware, which is when a criminal encrypts an organization’s data and then demands payment before releasing the key required to reverse the encryption that is holding the victim’s…