IRMT TERM Module 1 PDF
IRMT TERM Module 1 PDF
Module 1
MODULE 1
MODULE 1
UNDERSTANDING THE
CONTEXT OF ELECTRONIC
RECORDS MANAGEMENT
Additional Contributors
Christine Ardern
Andrew Griffin
Lekoko Kenosi
Reviewers
Andrew Griffin
Michael Hoyle
Jim Suderman
Setareki Tale
Anne Thurston
Richard Wato
Zawiyah Mohammed Yusef
The International Records Management Trust would like to acknowledge the support
and assistance of the Department for International Development (UK).
Contents
Preface ix
Introduction 1
Unit 1.1 The Opportunities and Challenges of Electronic Records 7
Unit 1.2 What Are Electronic Records? 15
Unit 1.3 The Technological Framework for Electronic Records Management 29
Unit 1.4 Legal and Organisational Environments 39
Unit 1.5 The Role of Standards and Guidelines 47
Unit 1.6 The Importance of Metadata 61
Study Questions 71
Figures
Figure 1 Route Map for Implementing Electronic Records Management 3
Figure 2 Simple Representation of a System 17
Figure 3 Characteristics of an Information System 18
Figure 4 Types of Information Systems 20
Figure 5 The Different Parts of Paper and Electronic Records 25
Figure 6 Data, Information and Records 27
Figure 7 Records-related Legislation 42
Figure 8 Records-related Regulatory and Policy Issues 43
Figure 9 Excerpt of MoReq2 Requirements for Auditing Electronic Records 50
Figure 10 Selected Functional Requirements in MoReq 53
Figure 11 Examples of Metadata 62
Figure 12 Dublin Core – Fifteen Core Elements 67
Figure 13 National Archives of Australia Metadata Standard 68–69
PREFACE
Contributors
A number of records and information professionals were asked to contribute to the
modules, including representatives from such countries as Australia, Botswana,
Canada, Kenya, Singapore, South Africa, the United Kingdom and the United States.
The following people have contributed to the project as contributors, editors,
reviewers and production assistants.
• Keith Bastin, United Kingdom, reviewer
• Adrian Brown, United Kingdom, contributor
• Luis Carvalho, United Kingdom, administrative coordinator
• Donald Force, United States, editor
• Elaine Goh, Singapore, contributor
• Andrew Griffin, United Kingdom, contributor
• Greg Holoboff, Canada, graphic artist
• Michael Hoyle, United States, contributor
• Shadrack Katuu, South Africa, contributor
• Segomotso Keakopa, Botswana, contributor
• Lekoko Kenosi, Kenya, contributor
• Charles Kinyeki, Kenya, reviewer
• Barbara Lange, Canada, desktop publisher
• Helena Leonce, Trinidad and Tobago, reviewer
• Mphalane Makhura, South Africa, reviewer
• Walter Mansfield, United Kingdom, contributor, editor
• Peter Mazikana, Zimbabwe, contributor
• John McDonald, Canada, contributor
• Laura Millar, Canada, contributor, editor
• April Miller, United States, contributor
• Patrick Ngulumbe, South Africa, reviewer
• Greg O’Shea, Australia, contributor
• Lori Podolsky Nordland, Canada, contributor
• Peter Sebina, Botswana, contributor
• Anthea Seles, Canada, contributor
• Elizabeth Shepherd, United Kingdom, reviewer
• Kelvin Smith, United Kingdom, contributor
• Jim Suderman, Canada, contributor, reviewer
• Setareki Tale, Fiji, reviewer
Educators’ Resources
26 Educators’ Resources
• Introduction to the Study Programme
• Glossary of Terms
• Additional Resources for Records and Archives Management
• Educators’ Resource Kit
• Writing Case Studies: A Manual.
Case Studies
27 Case Studies Volume 1
28 Case Studies Volume 2
29 Case Studies Volume 3
The introduction to each module in the TERM programme includes more specific
information about relevant MPSR resources that readers may wish to review in
association with the TERM module in question.
A Note on Terminology
As with any material related to computer technologies, these modules contain a great
deal of specialised terminology. Every attempt has been made to define key terms the
first time they are used. When important concepts are discussed cross-references are
included as appropriate to earlier references or to the glossary of terms. Readers are
also directed to the Additional Resources tool for more information on various topics,
and web addresses are included whenever detailed information is provided about
particular organisations or specific resource materials.
The modules are written using British English (programme, organisation) though of
course many computer terms use American English: thus an organisation may run a
records management ‘programme’ but it uses a particular software ‘program.’
Abbreviations and acronyms are defined the first time they are used in each module
and are used as sparingly as possible.
One exception is ERM for ‘electronic records management’: this acronym is used
regularly throughout all the resources as appropriate when referring to the general
concept of managing computer-generated records. When referring to an electronic
1
See Route Maps developed by International Records Management Trust © 2009
Training Modules
• The Management of Public Sector Records: Principles and Context
• Developing the Infrastructure for Records and Archives Services
• Managing Resources for Records and Archives Services
• Understanding Computer Systems: An Overview for Records and Archives
Staff
• Automating Records Services
• Managing Electronic Records
Procedures Manuals
• Model Records and Archives Law
• Model Scheme of Service
Case Studies
• Chris Seifried, Canada, Management Decision Making and Teamwork Case
Study
• Greg O’Shea, Australia, The Transition to Electronic Government – The
Challenge for Records Management
• Terry Cook, Ed Dahl and Ann Pederson, Australia/Canada, Living with Your
Conscience at the End of the Day: Ethical Issues and Archives/Records
Managers
• Ann Pederson, Australia, Management Case Study: Revising the Record
Keeping Programme for the Widget Manufacturing Company
• Ann Pederson, Australia, Advocacy/Marketing for Record Keeping: A Case
Study
• Ann Pederson and Trudy Peterson, Australia/ USA, Archival Control: Case
Studies
• Margot Thomas, St Lucia, Reinvigorating the National Archives of Verdant
Isle
Widespread Access
Traditionally, records and archives have been created and maintained in paper form as
physical objects. Their physical composition limits access to a specific time and
place: only one person can use a record at one time and only in one physical location.
Producing multiple copies is expensive and time consuming, requiring access to
photocopiers or printers. Duplication also leads to confusion about which of many
versions of a document is the official record.
Electronic records, on the other hand, can be shared widely and they can be accessed
and used by several people at the same time, even if they are in different places. In
environments where resources are scarce or distances are great, the ability to provide
access to information without the boundaries of time or space can dramatically
improve service, increase information sharing and enhance operations.
In some countries, for example, the ability to share an electronic record among
government offices in different parts of the country saves money and time. Copying
Flexibility
Information technologies enhance flexibility in the creation, storage, use and
management of information and records. In a paper environment, records are created,
received and filed in one office, and they accumulate in one place. Electronic records
can be stored remotely or on compact disks (CDs) or tapes, allowing people to share
records and use their information resources more dynamically. Because so many
people in an organisation can have access to electronically stored records at the same
time, they can carry out their duties without being hindered by a lack of information.
They also have better access to more up-to-date information, since they can access
information technologies such as electronic records storage facilities or databases
directly and not have to wait for materials to be filed in a central registry and then
located and retrieved when needed.
Economic Benefits
In the paper environment where records are physical objects, their accumulation
requires ever-increasing amounts of space, including office space, shelves, filing
cabinets and storage boxes. Several staff members may be needed to carry out routine
procedural work such as filing documents and retrieving boxes.
Through the use of new technologies, organisations are able to economise in terms of
storage space, as computer systems can store large volumes of data and records in a
small physical space. Database management systems, electronic mail systems, web
Auditing Capabilities
Well-designed records and document management systems also allow an organisation
to regulate and oversee actions and decisions. Many electronic records management
software programs include mechanisms to maintain audit trails, encouraging more
accountable record keeping and promote compliance across the organisation. The
development of information technologies also usually involves the development of
records management legislation and regulations, which are designed to control the
process of creating, maintaining and using records. As a result, public accountability
and transparency are enhanced.
Technological Obsolescence
Rapid changes in software applications and computer hardware have led to what is
commonly referred to as technological obsolescence. As new innovations in computer
Technological Dependence
Electronic records depend on technology. They are created and managed by computer
hardware and software. Therefore, electronic records require mediation in order to be
accessed. It is not possible to hold a computer disk up to the light and read it, as one
can read a paper document or even, with the aid of a magnifying glass, a frame of
microfilm.
Because information technologies keep changing, and because electronic records
cannot be used without the necessary technologies, individuals and organisations can
quickly become dependent on technologies for their essential information. Hardware
and software have to be upgraded regularly to ensure continuing access to information
and records. As technology changes, records need to be moved to new systems –
migrated – so that they can be used. Otherwise, the formats in which records exist are
incompatible and the records are increasingly inaccessible. An electronic document
cannot be placed on a shelf, like a bound ledger or folder of documents, with any
guarantee that it will remain usable in ten, five or even one year into the future.
Decentralisation of Information
The decentralisation of information and records management has shifted the
responsibility for managing records from records professionals to the people who
create and use records on a daily basis. Unfortunately, users are not trained to know
what documentation to keep for evidential purposes or how to describe, file or
maintain records. Without centralised oversight of the records management process, it
can be more and more difficult to ensure that essential evidence has been protected
adequately. Thus, even though the computer systems allow for widespread access to
information, there is no guarantee that the information needed will be available or that
it will be easily retrieved by anyone other than the individual who created and used it.
Careful monitoring of the way in which electronic records are created and used is
essential to developing an effective work environment.
The next units in this module explain the nature of electronic records and examine the
technological, legislative and organisational contexts in which electronic records
management takes place.
A Note on Terminology
As computer technologies have developed, information technology experts, computer
programmers, records managers, archivists and others involved with information and
records have developed different interpretations for terminology related to electronic
technologies. For example, one of the most common miscommunications between
information professionals and computer professionals arises from the different uses of
the terms ‘archiving’ and ‘archives.’ From an archivist’s and a records manager’s
perspective, these terms refer to the actions taken by an archives to preserve a
document that needs to be kept permanently and to the institution that houses records
with historical value.
On the other hand, computer programmers and information technology professionals
– often including electronic management software vendors – use the terms ‘archiving’
and ‘archives’ to mean very different activities. To them, ‘archiving’ is the process of
putting an electronic record into a computer storage environment, no matter whether
the record will or should be kept for the long term. In their eyes, ‘archives’ are the
digital repositories in which records are kept until they are no longer needed by the
organisation; any permanent preservation of the record is not included in this
interpretation of ‘archives.’
What Is a Computer?
A computer can be defined as
any programmable machine or other device that can process information
to produce a result.
Regardless of the size or complexity of computers, they all perform three basic steps.
They accept input; they process the input according to specific rules (as defined by
computer programs); and they produce output. These steps are detailed below.
• The computer accepts input. Computer input is whatever is entered or fed
into a computer system. Input can be supplied by a person (such as by using a
keyboard) or by another computer or device (such as a USB device or
CD-ROM). Some examples of input include the words and symbols in a
document, numbers for a calculation, instructions for completing a process,
pictures, video and so on.
• The computer processes the input, manipulating the data in many ways.
Examples of processing include performing calculations, sorting lists of words
or numbers, modifying documents and pictures according to user instructions
and drawing graphs.
• The computer produces output. Computer output is information that has
been produced by a computer. Some examples of computer output include
reports, documents, music, graphs, videos or pictures. Output can be in
generated in different formats, such as paper, CD-ROM, DVD or on screen.
During each function the computer must store data. Most computers have more than
one location for storing data (the hard drive or C:\, for instance, or a remote storage
device such as magnetic tape). The place where the computer stores the data depends
on how the data are being used.
The four rows on the table also illustrate the layered nature of digital information
systems: each layer can and should be considered independently of each other layer.
For example, data can be changed without necessarily changing the hardware or
software. Similarly, computer software can be upgraded without changing hardware,
and the installation of new networks does not necessarily result in a change in the
data.
It is true that several years ago, in the early years of the development of digital
information systems, hardware, software and data were effectively inseparable: that
is, programs were written for specific hardware and only the program that created a
piece of data could access and use that data. Today, the layers are somewhat more
independent of changes in the other layers. Of course, significant changes to any layer
will frequently require some kind of remedial work in one or more of the other layers.
2
For more information on these characteristics, see the description in Keri E. Pearlson, Managing and
Using Information Systems: A Strategic Approach (Toronto: John Wiley & Sons, Inc., 2001), pp.
27-28.
3
Illustration based on information provided in Kenneth C. Laudon and Jane P. Laudon, Management
Information Systems: Organization and Technology in the Networked Enterprise, 6th ed. (Upper
Saddle River: Prentice Hall, 2000), p. 39.
photographs in
TIFF format
financial tables
created with storage media (floppy
MS Excell 2007 disk, USB drive , CD)
Whereas records derive meaning from their context and structure as well as their
content, data lack context and structure and therefore are meaningless on their own. In
an archival context, the authenticity of a record is paramount to its acceptance as
evidence, so that it is not simply considered information or data. The authenticity of
an electronic record derives from three essential characteristics: reliability, integrity
and usability.
Reliability
To be reliable, a record must be a full and accurate representation of the business
activity to which it attests. This requires the establishment of trust in the record
Integrity
The record must be maintained to ensure that it is complete, and it must be protected
against unauthorised or accidental alteration. Integrity is the quality of confirming that
the record has not been altered and that all authorised actions undertaken with the
record – such as opening it electronically, reading it and filing it – have been managed
and documented in accordance with established business requirements.
Usability
The record must remain usable: authorised users must be able to access it across time
and in changing technical environments. To achieve usability, the record must be
locatable and retrievable by users and the technology needed to open, read and
understand the record must be available.
An electronic record can be considered authentic if it retains all the significant proper-
ties upon which its authenticity depends, including reliability, integrity and usability,
and if the actions taken to preserve the record over time can be demonstrated.
In order to determine how best to manage electronic records so that they are reliable,
authentic and usable, records professionals next need to understand some important
technological issues associated with the creation and management of digital
information. The technological framework for electronic records management is the
subject of the next unit.
Bandwidth
Bandwidth is the capacity of the wire (‘pipe’) or wireless connection in a computer
network to carry information. Bandwidth is usually expressed in kilobytes or
megabytes per second. A dial up modem usually transmits data at 56 kilobytes per
second (kbs), whereas a more powerful Ethernet cable transmits data at 10 megabytes
per second (MBS). Clearly, the Ethernet cable is dramatically faster than the dial up
modem. The difference is like comparing a two-lane road with a four-lane highway;
the latter can move traffic much faster than the former.
Generally, the people who use computers do not think about bandwidth as such.
Instead, they focus on the response time of their computers. But the length of time it
takes to complete a task, such as downloading a document from a central server or
accessing information from the Internet, will depend on the bandwidth available in the
information system. The more bandwidth, the quicker the process.
The time needed to access digital information also depends on what is being accessed,
however. Accessing a text document requires less bandwidth than accessing a
photograph or a video. Of particular importance to records professionals is the fact
that electronic record-keeping systems, which are discussed in later modules in this
training programme, can be difficult to use in environments with low bandwidth. The
software is so complex that it runs best on larger, more sophisticated computer
systems that have been equipped with powerful networks and adequate bandwidth.
The records professional can play an important part in ensuring electronic information
systems operate effectively by working with IT professionals to estimate user needs
and thus determine the possible demands for bandwidth throughout the organisation.
Technical Support
‘Technical support’ is one of the most-used phrases in IT management. Unfortunately,
despite the popularity of the expression, the concept is not well understood. Every
software application and every piece of hardware acquired by an organisation should
come with a technical support component. For example, whenever commercial
software is purchased, a licence fee is paid allowing the purchaser to use the software
legitimately. This licence fee then entitles the user to a level of service and support
from the company that created the software. The software usually comes with a time-
limited warranty: a guarantee that the company will address any errors or faults in the
software for a certain period, such as one, two or five years.
Depending on the level of support and maintenance provided, the purchaser of that
software is able to access certain services, like ‘help desk’ support to get answers to
questions immediately. The purchaser can also access various updates and ‘fixes’ in
the event that changes have been made to or problems occur with the software. War-
ranties on hardware operate in generally the same fashion: the purchaser has the right,
for a certain amount of time, to ask the manufacturer for help if something goes wrong.
Backup Systems
Information and communications technologies can fail, whether because the storage
device ‘crashes’ or because the computer becomes ‘infected’ with a computer virus or
other malicious code. Such failures can result in lost or corrupted data. People can
also accidentally delete files from their computers, or auditors can ask to see records
that are no longer in current use. To protect valuable data, special backup applications
are usually run, ideally every day, to allow an organisation to re-establish a system to
its last known ‘good’ configuration and providing access to copies of records that may
not be available otherwise.
Backups are usually copies of data stored on low-cost storage media, such as
magnetic tapes. Magnetic tape technology has a long and reliable history, at least in
computer terms. However, just as with any other recorded medium, tape is prone to
deterioration over time. And if the storage conditions in which the tapes are kept are
substandard, that speed of deterioration may increase.
Even before the medium deteriorates, however, the actual hardware used – the tape
drive – that reads the data on the tape may become obsolete. Technological change
happens very quickly and can render older equipment effectively unusable. In an
electronic environment, the concept of ‘old’ might apply to equipment that is only one
or two years of age. Some manufacturers support a certain amount of ‘backward
compatibility’ – where a newer computer product can operate with data or software
programs designed for use with an older computer product. Still, an organisation’s
data are at risk if the information is not copied forward onto newer media as soon as
possible after any technological change, so if backups are made onto, say, magnetic
tape, the organisation needs either to keep that tape drive operational or move the
backup data to newer tape technology when new equipment is acquired.
The challenge to accessing data in backup files is compounded because the software
used to create the records in the first place may also have changed over time. The
magnetic tape drives may still be usable, but without access to the original software
programs the records may be inaccessible. This problem is particularly pronounced
Audit Requirements
An audit is a formal process intended to review the work of an agency and confirm it
has complied with any legal, regulatory or other obligations. The audit also serves to
identify the effectiveness of the agency’s operations. Most people think of audits as
focusing only on financial accounts, but in fact auditors also review a wide spectrum
of programmes and services. Other types of audits might focus on computer security,
information technology, environmental conditions, the application of standards or
guidelines, performance measures, telecommunications systems or health and safety
issues.
Typically, governments undertake two levels of audit: a large-scale government audit
of a wide range of operations, which reports back to the highest levels of government;
and an internal audit, usually conducted on a smaller scale and designed to address
more specific issues or concerns. In the private sector, auditors are often called upon
to certify an organisation’s financial accounts, but audits can also be conducted to
ensure compliance with regulations or requirements such as workplace safety laws or
environmental controls.
External auditors are required to work outside the control of the agency they are
auditing, or they must at least be independent of the specific programme within their
organisation that is under review. Internal auditors may be used to help an
organisation assess and improve its own performance, whether or not it must comply
with any external requirements. Most governments follow generally accepted
accounting principles and audit standards for their work, whether those audits are
conducted internally or externally. In the United States, for example, the national
government adheres to the auditing requirements set out by the Government
Accountability Office (GAO). (See, for example, the guidance offered on the GAO’s
official web page at http://www.gao.gov/govaud/ybk01.htm.)
Records, both paper and electronic, are essential for the conduct of any audit. The
inability to produce appropriate records hinders the audit process and can reflect
poorly on the organisation or area being audited. It is common for auditors to
comment on the quality of, or problems with, record keeping, as they review the
effectiveness and success of the programmes under review. Therefore, records
professionals need to understand the importance of auditing and, more specifically,
they need to identify and adhere to the specific requirements and standards in place
for auditing in their own jurisdictions. More importantly, they need to have the
4
Excerpt from MoReq2, Version 1.04, 8 Sept 2008, p. 48; available at http://www.moreq2.eu/downloadsa.htm.
Note that the creation and preservation of metadata – data about data – is an essential
part of the effective management of electronic records. A detailed discussion of
metadata is included in the next unit.
ICA ISAD(G)
In 2000, the International Council on Archives issued ISAD(G) or the General
International Standard Archival Description. The standard is intended to provide
general guidance for the preparation of archival descriptions. ISAD(G) may be used
alone or in conjunction with other national standards, or it may form the basis for the
development of regional, local or institutional standards.
ICA ISAAR(CPF)
In 2004, the ICA issued ISAAR(CPF) or the International Standard Archival
Authority Record for Corporate Bodies, Persons, and Families, Second Edition. This
standard offers guidance for the preparation of authority records, in order to provide
consistency in the identification of corporate bodies, individuals and families, when
describing archival materials.
ICA ISDIAH
In 2008, the ICA issued the first edition of ISDIAH or the International Standard for
Describing Institutions with Archival Holdings. This standard, which is intended to
work in conjunction with ISAD(G) and ISAAR(CPF), is intended to capture and
standardise information about the institution that holds archival materials, in order to
support user access to archival holdings.
Several of the principles articulated in ethics codes are of particular importance for
archivists dealing with electronic records. For instance, of the ten requirements
outlined in the ICA code of ethics, seven take on heightened meaning in the digital
environment, where the authenticity and integrity of electronic records can be so
easily impaired. These seven are duplicated below, with a commentary following in
italic about the importance of the requirement in an electronic environment.
1 Archivists should protect the integrity of archival material and thus guarantee that
it continues to be reliable evidence of the past. Protecting integrity in the
electronic environment requires effective management of records and the
technology used to create them.
2 Archivists should appraise, select and maintain archival material in its historical,
legal and administrative context, thus retaining the principle of provenance,
preserving and making evident the original relationships of documents.
What Is Metadata?
Consider for a moment the following set of data:
100965 020359 031265 300989 060297
Is there any way to know what these numbers mean? They could refer to populations,
budget estimates, or bank account numbers. They could even represent lottery ticket
numbers. The only way to assign any meaning to the data is by linking the content to
its structure and context, which means providing metadata.
Figure 11 provides some general examples of metadata as applied to pieces of
information we see in the world every day.
Context
Contextual metadata identifies the provenance of the record (such as the person or
system responsible for creating the record) and provides information that supports the
use of the record as evidence of a transaction. Examples of contextual metadata
include: the organisation, unit or other entity responsible for authorising or requiring
the transaction; the name of the person or system responsible for actually initiating the
Content
Content metadata identifies the actual information within the record. Keywords may
be captured to identify the names of subjects or events or people involved with or
mentioned in the record and other information about the actual substance of the
record.
Use
Metadata about use is captured in order to document any significant ways in which
the record was used following its creation. Typically, use metadata identifies how the
record was used once it was created: how was it viewed, copied, edited, filed,
indexed, classified and sent. The metadata also identifies when these actions took
place and who carried them out. This type of metadata can often be gleaned from the
computer system’s audit trail, which is the computer record showing who has
accessed the system and what operations were performed in a given period of time.
Audit trails are useful for maintaining security and for recovering lost information.
Most accounting systems and database management systems include an audit trail
feature. In addition, a range of audit trail software products are available to help
administrators in an organisation monitor the use of network resources.
Structure
Structural metadata consists of information about the design of the data or record. For
example, structural metadata maintains information about the different components of
a report, such as the title, section headings, subsection headings, text, annexes and so
on. If structural information about the design of the report is lost, the logical flow of
ideas in the report could be destroyed. Further, the table of contents and index to the
report could be incorrect, thus making information difficult to locate.
Some examples of structural metadata include the following.
• File identification, indicating which parts of the computer file are the text of
the report itself (‘report.doc’), a graphic image (‘image.gif’) and a spreadsheet
(spreadsheet.xls). Metadata should capture each file name and the file location
where it is stored.
• File encoding, indicating whether and how files have been coded: specific
information would relate to modality (eg text, numeric, graphic, sound, video,
etc); data encoding standards (ASCII, EBCDIC); method of compression
(JPEG, MPEG); and method of encryption (the algorithms used to encrypt the
record’s content).
• File rendering, identifying how the record was created, including information
about software applications, operating systems, the hardware used and any
standards used. This information is essential to reconstituting a file later, since
The capture of metadata about electronic records is one of the most important tasks
involved with preserving digital information as reliable and authentic evidence. This
unit has examined some of the metadata standards in place for use by records
professionals; readers are encouraged to review these different standards closely
before deciding how to adapt them for use in their own organisations.
The following questions are designed to encourage readers of this module to examine
some of the issues raised in more detail and to consider how the general information
presented here applies to the specific environment in which these records
professionals are working.
1 Name at least three benefits and three drawbacks to the use of electronic
information technologies. Are any of these benefits or drawbacks relevant in the
context of your specific organisation? How?
3 Give at least two examples of how technology in your organisation has become
obsolete.
7 Define the concept of digital security and explain why it is important for the
protection of records as evidence.
9 Describe the relationship of these systems to the mandates of the business units
that use them.
10 What record metadata are collected in these two systems in your organisation? Do
you believe the metadata collected provide sufficient information about the
content, structure and context of records to make sure the records are
understandable now and in the future?
12 Identify at least three different formats in which electronic records are created.
17 Identify at least three laws or regulations that affect record keeping in your
organisation. When is the last time those laws were reviewed or revised?
21 What does the phrase ‘functional requirements for record keeping’ mean?
24 What is the role of archival codes of ethics in protecting electronic records? Are
there archival codes of ethics in place in your jurisdiction (country or region)?
28 Define the five entities identified by the National Archives of Australia about
which metadata can be captured.
30 Does your organisation capture metadata? For what types of information objects
(books, artifacts, archival materials, current records)? How?
31 Based on the information provided in this module, what actions would you take
next to improve the electronic record-keeping environment in your organisation?