MARA 249 Terms Flashcards
access control list
In systems, such ERM, EDRMS, or document management systems, a list of individuals authorized to access, view, amend, transfer, or delete documents, records, or files. Access rights are enforced through software controls.
application programming interface (API)
A way of standardizing the connection between two software applications. They are essentially standard hooks that an application uses to connect to another software application.
archival information package (AIP)
One of three types of information packages that can be submitted in the OAIS preservation model for long-term digital preservation.
archive
Storing information and records for long-term or permanent preservation. Most digital records, like email, can only be deemed reliable with record integrity if it is performed immediately, in real time.
ARMA
Association for Records Management and Administrators, the U.S.-based non-profit organization for records managers with a network of international chapters.
authentication, authorization, and audit (or accounting) (AAA)
A network management and security framework that controls computer system log-ons and access to applications that enforce IG policies and audits usage.
authenticity of records
Verified content and author information as original for the purposes of electronic records management (ERM); in a legal context, proof that the e-document is what it purports to be when electronically stored information (ESI) is submitted during the e-discovery process.
auto-classification
Setting pre-defined indices to classify documents and records and having the process performed automatically by using software, rather than human intervention. A strong trend toward auto-classification is emerging due to the impact of “big Data” and rapidly increasing volumes of documents and records.
backup
A complete spare copy of data for purposes of disaster recovery. Backups are non-indexed mass storage and cannot substitute for indexed, archived information that can be quickly searched and retrieved (as in archiving).
bidders conference
A formal meeting where vendors bidding in a request for proposal (RFP) can ask questions and raise issues about the RFP, proposal requirements, and the procurement process.
data loss prevention (DLP)
Data loss prevention is a computer security term referring to systems that identify, monitor, and protect data in use (e.g., endpoint actions), data in motion (e.g., network actions), and data at rest (e.g., data storage) through deep content inspection, contextual security analysis of transaction (attributes of originator, data object, medium, timing, recipient/destination, and so on) and with a centralized management framework. Systems are design to detect and prevent unauthorized use and transmission of confidential information.
declaration
Assignment of metadata elements to associate the attributes of one or more record folder(s) to a record, or for categories to be managed at the record level, providing the capability to associate a record category to a specific record.
designing and implementing recordkeeping systems (DIRKS)
An Australian framework or methodology consisting of 8 steps
destruction
the process of eliminating or deleting records, beyond any possible reconstruction
destruction certificate
issued once the destruction of a record is complete, which verifies it has taken place, who authorized the destruction, and who carried it out. May include some metadata about the record.