Benefits and Limitations of Auto Classification in Records Management

As more organizations move from paper to electronic records, records management professionals face more complex challenges in managing these records. In their effort to maintain seamless records management processes within their organization, records managers expressed interest in products that specifically automate key records processes and controls. Records management professionals must ensure that the introduction of…

e-Records Conference 2018: Call for Presentations – Deadline July 20, 2018

We are still accepting presentation proposals for the annual e-Records Conference to be held on Friday, November 16, 2018. If you are interested in presenting or being a panelist, please complete the online form, Presentation Proposal Submission Form. The deadline for submitting presentation proposals is FRIDAY, JULY 20, 2018. Presentation formats could include 1-2 presenters…

e-Records Conference 2018: Call for Presentations

The annual e-Records Conference will be held Friday, November 16, 2018. This event promotes improved electronic records management in Texas government by bringing together staff responsible for and interested in records management and information technology. Texas technology managers and records managers are working together in new and exciting ways. From governance initiatives to cloud, here…

Electronic Records Resources Now Available

TSLAC updated Bulletin 1: Electronic Records Standards and Procedures in 2017, and since then, we’ve been gathering resources to provide guidance to state agencies trying to fulfill the requirements of the bulletin. The bulletin was rewritten to be intentionally higher-level and broad, to allow for more considerations of electronic records in a general sense, instead…

License: Creative Commons 3 - CC BY-SA 3.0

Cyber Blackmail: More Than Just Ransomware

We are happy to welcome guest writers from the Texas Department of Information Resources, Daniel Hankins, Shared Services Security Manager and Andy Bennett, Director Information Security Governance. Ransomware, which is when a criminal encrypts an organization’s data and then demands payment before releasing the key required to reverse the encryption that is holding the victim’s…

Strategies to Protect your Records from Ransomware

Over the past several years, cyber criminals have hacked into records management systems at the federal, state, and local levels. Once the criminals gain access to the system, they plant a virus, causing problems when trying to retrieve records from these systems. The virus is a malicious string of software known as ransomware because after…