Question

In: Computer Science

What is Document Life cycle Security? How does this integrate into EDMS? How does the data...

What is Document Life cycle Security? How does this integrate into EDMS?

How does the data elements fit into the overall document life cycle.

What are metadata and document storage requirements and recommended document life cycle.

Solutions

Expert Solution

The step by step construction and destruction of documents is called as document life cycle. The procedures document life-cycle serves as and important part of an Enterprise Content Management(ECM). ECM is specification for obtaining, storing and delivering information that are important for its operation in an effective manner.

Enterprise Document Management(EDM) is the plan of action designed for supervising electronic document and organisation's paper for easy and quick retrieval. The key points included in EDM are retention of document, storage of document, tracing changes in document and recovery of documents in case of disaster.

Document Life-Cycle Stages
Document Life-Cycle Stages Definition Supporting Technologies and Applications
Create Analog or digital document construction

Application Development Tools

Authoring Software

Web Authoring

Electronics Form Processing

E-mail

Voice Mail

Instant Messaging

Data Capture

Hand Writing Recognition

Capture Analog or physical document transformation into digital format
Index Using manual or automatic techniques for cataloging process or creating metadata
Manage Documents managing and storing for quick access

Data Warehousing

Archiving/Preservation

Electronic Workflow Processing

Access Classification, metadata, full text or other search technologies for searching processes to find document

Portals

Search Engine

Knowledge Management

Web Caching

Public Key Infrastructure

Data Mining

Retrieve Sighting documents from search result
Administer Controlling users resources, content types and structures

Document Management

Categorization

Media Management

Repurpose Reutilization and re-versioning of documents for new products

Digital Preservation

Workgroup Application

Electronic Flow Processing

E-mail

Voice Mail

Instant Messaging

Share and Collaborate Real time and non-real time methods for sharing, cooperating and modification
Distribute Transferring, circulating and scattering with security

EDI

Report Generation

Digital Media Publication

Retain Low usage or idle documents kept till their predetermined retention period

Digital Records Management

Hierarchical Storage Technologies

Data Warehousing

Dispose Damaging documents which have completed their retention period  
Preserve Long term access to documents with enduring value

Related Solutions

What are the phases in a traditional project life cycle? How does a project life cycle...
What are the phases in a traditional project life cycle? How does a project life cycle differ from a product life cycle? Why does a project manager need to understand both?
How does the Life-Cycle Hypothesis resolve the puzzle of the Kuznet data? By assuming that income...
How does the Life-Cycle Hypothesis resolve the puzzle of the Kuznet data? By assuming that income shows a life-cycle variation, the Life-Cycle Hypothesis is able to explain why short term MPC falls with income, but long-term APC is constant. By assuming that income is low in the early years and reaches a peak in late middle age and declines on retirement. By smoothing consumption over a lifetime. All of the above None of the above
How does the Life-Cycle Hypothesis resolve the puzzle of the Kuznet data? By assuming that income...
How does the Life-Cycle Hypothesis resolve the puzzle of the Kuznet data? By assuming that income shows a life-cycle variation, the Life-Cycle Hypothesis is able to explain why short term MPC falls with income, but long-term APC is constant. By assuming that income is low in the early years and reaches a peak in late middle age and declines on retirement. By smoothing consumption over a lifetime. All of the above None of the above
What is life cycle assessment and how does it relate to managerial decision making?
What is life cycle assessment and how does it relate to managerial decision making?
What are the stages of a Microsoft's life cycle? How can a Microsoft's life cycle be...
What are the stages of a Microsoft's life cycle? How can a Microsoft's life cycle be extended? What stage is your company in?
What are the necessary requirements for an Electronic document Management System (EDMS) that will integrate five...
What are the necessary requirements for an Electronic document Management System (EDMS) that will integrate five stores and consistently retain and securely manage critical business documents in the following areas • Major components that must be included in a document retention policy • Policies standards, and procedures that will govern the secure management of the organization’s critical business documents • Regulatory requirements and generally accepted practices that are applicable to the organization to safeguard its data • A list of...
a. How is a security interest created in personal property? What is the key legal document...
a. How is a security interest created in personal property? What is the key legal document in creating a security interest in personal property? How is a security interest perfected in personal property? What is the key legal document when it comes to perfecting a security interest in personal property by filing?
Explain the Security Systems Development Life Cycle methodology from the perspective of the Chief Information Security...
Explain the Security Systems Development Life Cycle methodology from the perspective of the Chief Information Security Officer (CISO). How does each phase, its deliverables and the personnel involved relate to the requirements of the CISO? PLEASE DO NOT PROVIDE ANSWERS ALREADY GIVEN. NO PLAGIARISM, PLEASE!
1. What is the purpose of source encoding? How does source encoding integrate in modulating and...
1. What is the purpose of source encoding? How does source encoding integrate in modulating and demodulating (MODEM) technology? How can you improve source encoding strategies?
How is a security interest perfected in personal property? What is the key legal document when...
How is a security interest perfected in personal property? What is the key legal document when it comes to perfecting a security interest in personal property by filing?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT