Risk Assessment

A risk assessment is the practice of evaluating the inherent threats to and weaknesses in a government entity’s records and information. It is a recommended practice to evaluate the protection of your entity’s records in order to mitigate the potential destruction, harm, or loss to the information. While it may seem daunting to conduct a…

A faceless cartoon man conducts a training in front of an easel while three attendees listen.

Developing Internal Training

Developing training can be an intimidating task, but it doesn’t need to be insurmountable. Check out the tips below to get started on building an internal training program for your own organization. Get Top-Down Support We know we sound like a broken record about getting executive buy-in, but that is how important it is. This…

The words "You Ask, We Answer" over two puzzle pieces labeled "Q" and "A" as well as the TSLAC logo.

AV and Me

Administratively Valuable (AV) is a retention code that stirs a lot of questions. How long is AV? What even is AV? Can you say “Administratively Valuable” five times fast? While we analysts at TSLAC can point out best practices and strategies regarding this retention code, we can only speculate so much. To offer a different…

Hand in file folder

Tips for Folder Structure Design and Cleanup

Shared file environments can be a real challenge to organize and maintain. Below are some tips to help your shared drive structures get into and stay in shape. Consistency Structure and Control Change Management Disposition Shared drives can be chaotic, but they don’t have to be that way. Employing simple techniques like the ones above…

Email Management Policy: Tips and Ideas

Some of the consulting questions we receive revolve around the subject of how to manage email and email records. From those questions the matter becomes how should a government entity address the management of its email. The best way an entity can capture their practices and procedures for email management is to create a policy.…