Return to site

Gobdocuments 1 6 – Secure Document Archival

broken image


  • 1 Introduction 3 2 Purpose 4 3 Definitions 5 4 Preservation of documents 6 5 Archival of Documents mentioned in sub clause (A) and (B) of Clause 4 8 6 Destruction of documents mentioned in Sub Clause (A) and (B) of Clause 4 of this policy 9 7 Review and Amendments 11 8 Roles and Responsibilities 12 9 Communication and Dissemination 13.
  • Library & Archival Security 6:1 (1984): 49-57. The Causes, Measurements, and Prevention of Journal Mutilation in an Academic Library. ERIC Document Reproduction Service, ED 234817, 1983. Holdings, Maintenance, Security Procedures Wall, C. 'Inventory What You Might Expect to Be Missing' Library & Archival Security 7:2 (1985): 27.

GoBDocuments 1.6 – Secure document archival Think of GoBDocuments as a secure container for all your important documents. All actions are monitored. Unite 2 0 – turn websites into full featured apps.


Nicole Gordon
Office of Regional Records Services (NR)
6/27/02
General Security
Antwi, I. K.
'The Problem of Library Security: The Bauchi Experience.' International Library Review 21 (1989): 363-72.
Bass, Richard W.
'Collections Security.' Library Trends 33 (1984): 39-48.
Belanger, Terry.
'Oberlin Conference on Theft Calls for Action.' Library Journal 108 (November 1983): 2118.
Bello, M. A.
'Library Security, Materials Theft and Mutilation in Technological University Libraries in Nigeria.' Library Management 19:6 (1998): 379-83.
Bergerson, Jeanette.
Manual for South Carolina Religious Archives and Recordkeeping. Columbia, South Carolina: South Carolina State Historical Records Advisory Board, 1999.
Billington, James A.
'Here Today, Here Tomorrow: The Imperative of Collections Security' American Libraries 27 (August 1996): 40-41.
Brand, Marvine, ed.
Security for Libraries: People, Buildings, Collections. Chicago: American Library Association, 1984.
Burke, Robert S., and Sam A. Adeloye.
A Manual of Basic Security. Leicester, England: ICOM, 1986.
Canal, B.A.
'Libraries Attract More Readers: Investing in Library Safety'. Indiana Libraries 17:1 (1998): 15-17.
Christian, John F. and Shonnie Finnegan.
'On Planning an Archives.' American Archivist 2:4 (October 1974): 573-578.
Cox, Richard J.
'Collectors and Archival, Manuscript, Rare Book Security.' Focus on Security 26 (April 1995): 19-27.
Cummin, Wilbur B.
'Institutional, Personal Collection & Building Security Concerns.' Security for Libraries: People, Buildings, and Collections. Edited by Marvine Brand, 24-50. Chicago: The American Library Association, 1984.
Daniels, Maygene F. and Timothy Welch.
A Modern Archives Reader: Basic Reading on Archival Theory and Practice. Washington D.C.: National Archives Trust Fund Board, 1984.
Dow, C.
'Library Rules, Policies, and Library Security.' Nebraska Library Association Quarterly 30:1 (1999): 16-26.
Duggar, D. C.
'Security and Crime in Health Sciences Libraries in the Southern United States.' Medical Reference Services Quarterly 18:1 (1999): 37-48.
Ellis, Judith Ed.
Keeping Archives. Brunswick, Australia: D.W. Thorpe in Association with The Australian Society of Archivists Inc. Impact Printing, 1993.
Fennelly, Lawrence J.
Museum, Archive and Library Security. Boston: Butterworth Publishers, 1983.
Garnet, Slade Richard.
Protecting Your Collection: A Handbook, Survey, and Guide for the Security of Rare Books, Manuscripts, Archives, and Works of Art. New York: Haworth Press, 1982.
Goldberg, M.
'The Never-ending Saga of Library Theft.' Library & Archival Security 12:1 (1993): 87-100.
Jackson, Marie.
'Library Security: Facts and Figures,' Library Association Record 93 (June 1991): 384.
Jenkins, John H.
Rare Books and Manuscripts Thefts: A Security System for Librarians, Booksellers, and Collectors. New York: Antiquarian Booksellers' Association of America, 1982.
Keller, Steven R.
The Most Common Security Mistakes that Most Museums Make. Deltona, FL: Steven R. Keller and Associates, 1988.
Kinney, John M.
'Archival Security and Insecurity.' American Archivist 38 (1975): 493-497.
Lincoln, A. J.
Crime in the Library: A Study of Patterns, Impact, and Security. New York: Bowker, 1984.
Lincoln, A. J., and C. Z. Lincoln.
'Library Crime and Security: An International Perspective.' Library & Archival Security 8:1/2 (June 1987): 14-7.
Lorenzen, M.
Security Problems of Ohio Academic Libraries. ERIC Document Reproduction Service, ED 367341, 1993.
Lorenzen, M.
'Security in the Public Libraries of Missouri.' Missouri Library World 1:3/ 4 (1996): 15-7.
Lorenzen, M.
Security Issues of Academic Libraries. ERIC Document Reproduction Service, ED 396765, 1996.
Lorenzen, M.
'Security in the Public Libraries of Illinois.' Illinois Libraries 79:1 (1997): 21- 22.
Lorenzen, M.
'Security Issues in the Public Libraries of Three Midwestern States.' Public Libraries 37:2 (1998): 2-4.
Lorenzen, M.
Security Issues of Ohio Public Libraries. ERIC Document Reproduction Service, ED 416907, 1998.
Mason, Philip P.
'Library and Archival Security: New Solutions to an Old Problem.' American Archivist 38:4 (October 1975): 477-492.
Patkus, Beth L.
'Collection Security: The Preservation Perspective.' Journal of Library Administration (1998): 67-89.
Rude, Renee, and Robert Hauptman.
'Theft, Dissimulation and Trespass: Some Observations on Security' Library and Archival Security 12:1 (1989): 17-22.
Rendell, K.W.
'Problems of Archival Security.' AB Bookman's Weekly 59 (June 1977): 3719-3723.
Smith, F. E.
'Questionable Strategies in Library Security Studies.' Library & Archival Security 6:3 (1984): 43-53.
Stielow, Frederick J.
'Archival Security.' Managing Archives and Archival Institutions, James Gregory Bradsher, ed. (Chicago: University of Chicago Press, 1989), 207-217.
Storey, Richard, A.M. Wherry, and J.F. Wilson.
'Three Views on Security' Journal of the Society of Archivists 10 (July 1989) 108-14.
Taylor, D.
'Enemies of Books.' College & Research Libraries News 42:9 (1981): 317-9.
Thomas, D.L.
Study on Control of Security and Storage of Holdings: A RAMP Study with Guidelines. Paris: General Information Program and UNISIST, United Nations Education, Scientific, and Cultural Organization, Feb. 1987. PGI-86/WS/23.
Trinkaus-Randall, G.
'Preserving Special Collections through Internal Security. College & Research Libraries 50:7 (1989): 448-54.
Trinkaus-Randall, G.
Protecting Your Collections: A Manual of Archival Security. Chicago: Society of American Archivists, 1995.
Van Nort, S.
'Archival and Library Theft: The Problem That Will Not Go Away.' Library & Archival Security 12:2 (1994): 25-49.
Walch, Timothy.
Archives and Manuscript: Security. Chicago: Society of American Archivists, 1977.
Welch, Edwin.
'Security in an English Archive.' Archivaria 1:2 (Summer 1976): 49-54.
Wyly, Mary.
'Special Collections Security: Problems, Trends, and Consciousness.' Library Trends 36 (1987): 241-256.
Zeidberg, David.
Collection Security in ARL Libraries. Washington, D.C.: Association of Research Libraries, 1984.
Zika, J.
'Library Security = Eyes Wide Open.' North Carolina Libraries 57:3 (1999): 118.
Security Bibliographies
Brady, Eileen E.
Library/Archive/Museum Security: A Bibliography. 5th Edition. Moscow, ID: Catula Pringuis Press, 1995.
Sable, Martin H., Ed.
The Protection of the Library and Archives: An International Bibliography. New York, Haworth Press, 1983.
Researcher Monitoring Procedures
Allen, Susan M.
'Preventing Theft in Academic Libraries and Special Collections' Library and Archival Security 14:1 (1997): 29-43.
Allen, Susan M.
'Theft in Libraries or Archives.' College & Research Libraries 50:10 (1990): 939-43.
Anderson, A. J.
'The Trouble with Larry.' Library Journal 111:11 (1986): 45-7.
Berkley, Edmund Jr.
'Archival Security: A Personal and Circumstantial View' Georgia Archive 4:1 (Winter 1976): 3-9.
Brashear, J. K., J.J. Malone, and J. Thorton-Jaringe.
'Problem Patrons: The Other Kind of Library Security.' Illinois Libraries 63:4 (1981): 343-51.
Brown, Marion.
Problem Patron Manual. Schenectady, New York: Schenectady Public Library, 1981.
DeRosa, F. J.
'The Disruptive Patron.' Library & Archival Security 3:3/ 4 (1980): 29-37.
Dizard, R.
'Safe and Sound: Protecting the Collections of the Library of Congress.' Library of Congress Information Bulletin, 57:6 (1998): 144-5.
Dunlap, Ellen S. and Kathleen Reed.
'Borrowing of Special Collections Materials for Exhibition: a Draft.' Rare Books and Manuscripts Librarianship 2:1 (May 1984): 17-23.
Elliott, J.
'Disturbed Clients.' Unabashed Librarian 44 (1982): 16-7.
Fennelly, Lawrence J., ed.
Handbook of Lose Prevention and Crime Prevention. 2nd ed. Boston: Butterworths, 1988.
Gothberg, H. M.
'Managing Difficult People: Patrons (and Others).' The Reference Librarian 19 (1987): 269-84.
Keating O'Neil, Robert, ed.
Management of Library and Archival Security: From the Outside Looking In. Hayworth Press, n.d.
Lincoln, Alan Jay.
'Reducing Personal Crimes' Library & Archival Security 10:1 (1990).
Sampson, K. J.
'Disturbed and Disturbing Patrons: Handling the Problem Patron.' Nebraska Library Association Quarterly 13:1 (1982): 9-11.
Totka, Vincent A., Jr.
'Preventing Patron Theft in the Archives: Legal Perspectives and Problems.' The American Archivist 56 (1983): 664-672.
Winter, K.
'Entrance/Exit Design of Australian Academic Libraries Since 1959.' Australian College Libraries 3:4 (1985): 167-75.
Security Incident Management Procedures
Allan, Susan M.
'Theft in Libraries and Archives: What to Do during the Aftermath of a Theft.' Journal of Library Administration 25: 1 (November 1998): 3-13.
Bahr, A.H.
'The Thief in Our Midst' Library & Archival Security 9:3/ 4 (1989): 77-81.
Barton, John P., and Joanna G. Wellheiser, eds.
An Ounce of Prevention: A Handbook on Disaster Contingency Planning for Archives, Libraries and Record Centers. Toronto, ON: Toronto Area Archivists Group Education Foundation, 1985.
Bello, M. A.
'Library Security, Materials Theft and Mutilation in Technological University Libraries in Nigeria.' Library Management 19:6 (1998): 379-83.
Brown-Syed, C.
'Some Observations on Systematic Book Theft.' Library ∓ Archival Security 15:1 (1999): 83-9.
Bryan, Alice.
'Loss Control: The Museum and Its Collection.' Insurance and Risk Management for Museums and Historical Societies. Hamilton, NY: Gallery Association of New York State In Cooperation with the Division of Educational Services of the Metropolitan Museum of Art, 1985.
Dienstein, William.
Techniques for the Crime Investigation. Springfield, IL: Charles C. Thomas, 1952.
Galvin, Theresa.
'The Boston Case of Charles Merrill Mount: The Archivist's Arch Enemy.' The American Archivist 53 (1990): 442-450.
Greenwood, L., and H. McKean.
'Effective Measurement and Reduction of Book Loss in an Academic Library.' Journal of Academic Librarianship 11:5 (1985): 275-83.
Jackanicz, Donald.
'Theft at the National Archives: The Murphy Case, 1962-1975.' Library & Archival Security 10: 2 (1990): 23-50.
Land, Robert H.
'Defense of Archives against Human Foes.' American Archivist 19 (1956): 121-138.
Lazo, Douglas T.
'Videotaping for Security Investigation.' Security Management 22:5 (May 1978): 20-22.
O'Neil, James E.
'Replevin: A Public Archivist's Perspective.' College and Research Libraries 40 (January 1979): 26-30.
Purcell, A. D.
'Abstractions of Justice: The Library of Congress's Great Manuscripts Robbery 1896-1897.' American Archivist 62:2 (1999): 325-45.
Rhodes, James B.
'Alienation and Thievery: Archival Problems.' American Archivist 29:2 (April 1966): 197-208.
Richards, J. H.
'Missing in Action.' Journal of Academic Librarianship 5:5 (1979): 266-9.
Samuel, E.
'Protection of Library and Archival Materials: A Case Study-New York Institute of Fine Arts.' Library & Archival Security 2:3/4 (1978): 1.
Scham, A.M.
'Appraisals, Insurance, And Security.' In Managing Archives and Archival Institution. New York: Neal Schuman, 1987.
Sennewald, Charles A.
The Process of Investigation: Concepts and Strategies for the Security Professional. Woburn, MA: Butterwoth Publishers. 1981.
Smith, F. E.
'Supplementary Deterrents in Library Security.' Library & Archival Security 6:1 (1984): 49-57.
Varner, C.
The Causes, Measurements, and Prevention of Journal Mutilation in an Academic Library. ERIC Document Reproduction Service, ED 234817, 1983.
Holdings, Maintenance, Security Procedures
Wall, C.
'Inventory What You Might Expect to Be Missing' Library & Archival Security 7:2 (1985): 27.
Staff Security Training Procedures
Bennis, Warren.
Leaders: The Strategies of Taking Charge. New York: Harper & Row, 1985.
Bornhofen, Frederick A.
'Where Security Firs In: Behavioral Guideline on What Is- and Is Not- Expected From a Security Department.' Security World 15:8 (August 1978): 92-93.
Braaksma, Betty.
'Zero Tolerance at the Library: The Work of the Thunder Bay Public Library's Security Task Force.' Library & Archival Security 14:2 (1998): 43-49.
Campbell, A.M.
'Archival Security Program of the Society of American Archivists.' American Archivists 38 (October 1975): 499-500.
Keller, Steven R.
Security Training-Why We Have Failed. Deltona, FL: Steven R. Keller and Associates, 1990.
Post, Richard.
Security Manager's Desk Reference. London: Butterworths, 1986.
Sheridan, L. W.
'People in Libraries as Security Agents.' Library & Archival Security 3:1 (1980): 57-61.
Trinkaus-Randall, G.
'Library and Archival Security: Policies and Procedures to Protect Holdings from Theft and Damage.' Journal of Library Administration 25:1 (1989): 91-112.
Trinkus-Randall, Gregor.
'Preserving Special Collections through Internal Security.' College & Research Libraries 50 (1989): 448-454.
Wurzburger, M.
'Current Security Practices in College and University Special Collections.' Rare Books & Manuscript Librarianship 3 (1988): 43-57.
Building Physical Security Procedures
Bahr, Alice Harrison.
Book Theft and Library Security Systems 1981-1982. White Plains, NJ: Knowledge Industry Publications, 1981.
Boss R. W.
'Security Technologies for Libraries: Policy Concerns and a Survey of Available Products.' Library Technology Reports 35:3 (1999): 271-356.
Brand, M.
'Security of Academic Library Buildings.' Library & Archival Security 3:1 (1980): 39-47.
Harris, Carolyn.
'The Preservation Considerations in Electronic Security Systems' Library & Archival Security 11:1 (1991): 35-42.
Hopf, Peter S.
Handbook of Building Security Planning and Design. New York: McGraw-Hill, 1979.
Keller, Steven R.
An Architect's Prize Building May Be Security's Nightmare. Deltona, FL: Steven R. Keller and Associates, 1988.
Ling, Ted.
Solid, Safe, Secure: Building Archives Repositories in Australia. Australia: Australian Archives, 1998.
Mandelbaum, Albert J.
Fundamentals of Protective Systems: Planning, Evaluation, Selection. Springfield, IL: Charles C. Thomas, 1973.
Olsen, R. J. and L.J. Ostler.
'Get Tough on Theft: Electronic Theft Detection.' Library & Archival Security 7:3/4 (1985): 67-77.
Post, Deborah Cromer.
'Specifying a Security System.' Security World 18:2 (February 1981): 29-31.
Roberts, M.
'Guards, Turnstiles, Electronic Devices and the Illusion of Security.' College & Research Libraries 29:4 (July 1968): 259-275.
Schneider, K. G.
'Safe from Prying Eyes: Protecting Library Systems.' American Libraries 30:1 (1999): 98.
Stack, M. J.
'Library Theft Detection Systems--Future Trends and Present Strategies.' Library & Archival Security 14:2 (1998): 25-37.
Stack, Michael J.
'Frequently Asked Questions (FAQ's) About Electronic Security Systems.' Library & Archival Security 14:2 (1998): 39-41.
Stack, Michael J.
'Library Theft Detection Systems-Future Trends and Present Strategies' Library & Archival Security 14:2 (1998): 25-37.
Strassberg, Richard.
Conservation, Safety, Security and Disaster Considerations in Design. Ithica, New York: Cornell University Press, 1984.
Walsh, R.R.
'Rare Book and Security System Confidentiality.' Library & Archival Security 2:23 (1978): 71-73.
Watstein, S. B.
Book Mutilation: An Unwelcome By-product of Electronic Security Systems. Library & Archival Security 5:1 (1983): 11-33.
Security Assessment Procedures
Bahr, A.H.
'The Thief in Our Midst' Library & Archival Security 9:3/4 (1989): 77-81.
Bradsher, James Gregory ed.
Managing Archives and Archival Institutions. Chicago: University of Chicago Press Chicago, 1989.
Chadwick, William E.
'Special Collections Library Security: An Internal Audit Perspective.' Journal of Library Administration. 25:1 (November 1998): 15-31.
Hoff-Wilson, Joan.
'Access to Restricted Collections: The Responsibility of Professional Historical Organizations.' American Archivist 46:4 (Fall 1983): 441-447.
Keller, Steven R.
Conducting the Physical Security Survey. Deltona, FL: Steven R. Keller and Associates, n.d.
Lincoln, Alan Jay.
'Low Cost Security Options: Background Checks' Library & Archival Security 9:3/4 (1989): 107-113.
Newman. John and Chris Wolf.
'The Security Audit'. Colorado Libraries. (Spring 1997): 19-21.
Rosenbaum, Richard W.
'Can We Predict Employee Theft?' Security World (October 1975): 26-27, 106-108.

Gobdocuments 1 6 – Secure Document Archival Folders

by securedatamgt | 24 Sep 2013

Archiving your documents can be daunting, especially as it can often be difficult to establish an accurate starting point. If you have been neglecting your document archiving then the papers can pile up quickly. Teacode 1 0 download free. Before you know it, whether you work in a large or small organisation, you can have a mammoth task on your hands.

Performing frequent audits means that you are fully aware of the location of your records. The most effective way of achieving this is by logging all new documents prior to placing them into storage. That said, if you do have a sudden necessity to index and archive a backlog of important files, read our 10 top tips to successful archiving below.

1. Audit Your Documents

Before you can start boxing your documents, you should organise which ones you need to keep, which ones can be scanned and which ones need to be thrown away. You will waste valuable storage space by simply depositing all documents into a box without any consideration to whether the file is redundant. Be ruthless and decide which ones you need to discard, whilst also taking into account minimum retention periods advised by record type.

You should recycle the documents that you do not need to retain – keeping your carbon footprint minimal. Most quality document storage providers offer secure destruction as a standard service and if they do, make sure that the pricing for secure shredding is competitive.

2. Digitise Certain Documents

You may want to keep some documents but do not have to by law. It is best to digitise these so that they are taking up less storage space and you always have access as and when you need them. If you don't have a high quality scanner then it may be best to consider a file storage provider who can perform this service for you. Redbox spin to win.

At SDM, we offer an Electronic Document Management System, whereby your documents can be scanned and stored on the cloud with password protection and can be accessed anywhere within your company. Security permissions are robust and prevent access to confidential records, unless clearance is given.

Archival

3. Boxes And Your Documents

First of all, you should make sure that your boxes are durable. Weak boxes with heavy files and documents in will obviously not last long. You should also label your files and boxes. If you wish to be file managed, you should create a records database and each file that goes into each box should have a unique number (preferably in the form of a barcode). Each box should have a different number (also a barcode) and the database will show you what box a particular file is in. This way, should you need to find a file again it is simple process locating it.

4. Location

You should keep your files in a handy location, one close to your office so that if they are needed you can get them quickly. When starting up as a small business, an onsite storage room is often suitable for your initial needs. However, as your business grows so do your records – and they do so at a cumulative rate!

Considering an offsite solution is often wise if you think you will quickly outgrow onsite space, or even if you think the prime real estate could be used more effectively. SDM owns and manages archive storage facilities in London Bridge and within 2-hours drive of the city – so it is very easy to deliver boxes from either of our storage centres in minimal time.

5. Accessibility

Be sure that, wherever you choose to store your archives, they are easily accessible. The box labelling system should make them easy to find if stored onsite. Alternatively, if you outsource your document archiving solutions ensure that you can view your record details on an online platform and request rapid retrievals with this company.

SDM promises to have your files delivered to you the next morning at a time of your choosing (if ordered by 5:30pm the previous day), or if you order by 11:30 am your records will arrive the same afternoon. If you do choose to outsource your document storage, make sure that the provider can offer similar SLAs.

6. Store Similar Documents Together

Store all the documents that are related in the same boxes. Doing so will ensure that if you need a particular set of files, such as accounting records, you can gain quick access to them by looking up this index field and retrieving only what is necessary.

7. Know The Retention Dates

It is useful to know how long you should keep your documents in storage so that you can set retention dates to have them destroyed when you have held them for long enough. This is an essential best practice to avoid data protection breaches and to reduce archive inflation over time.

8. Safety – Trust Where You Are Sending Your Documents

You must be safe in the knowledge that your documents are being stored in a highly secure record storage facility, especially if you are sending private and important documents to a third party storage provider.

SDM's main storage facility, just outside of London, is an ex-MOD bunker. It is bomb-proof, weather and fire proof. SDM also ensure 24/7 CCTV surveillance with alarms connected to external emergency services. If you are outsourcing your archiving, make sure to check the security of the premises.

9. Not Outsourcing Your Document Storage?

https://bestfload870.weebly.com/irish-casino-online.html. If you have decided to store your documents internally, make sure that your records are not stored on the floor, preventing unnecessary damage in case of flooding or pest infestation.

Gobdocuments 1 6 – Secure Document Archival Paper

10. Recyclable Boxes

Cardboard is the most cost-effective type of container, however it can damage easily. To help sustain a low carbon footprint, be sure to use boxes that are 100% recyclable so that re-boxing items poses a minimal environmental impact.

Related Articles

By securedatamgt | 18 Aug 2016

This August Google celebrated the 147th birthday of Mundaneum co-creator Paul Otlet with one of their signatory Google Doodles, designed by Leon Hong. So why did Google decide to.

Gobdocuments 1 6 – Secure Document Archival Storage Boxes

Folders

3. Boxes And Your Documents

First of all, you should make sure that your boxes are durable. Weak boxes with heavy files and documents in will obviously not last long. You should also label your files and boxes. If you wish to be file managed, you should create a records database and each file that goes into each box should have a unique number (preferably in the form of a barcode). Each box should have a different number (also a barcode) and the database will show you what box a particular file is in. This way, should you need to find a file again it is simple process locating it.

4. Location

You should keep your files in a handy location, one close to your office so that if they are needed you can get them quickly. When starting up as a small business, an onsite storage room is often suitable for your initial needs. However, as your business grows so do your records – and they do so at a cumulative rate!

Considering an offsite solution is often wise if you think you will quickly outgrow onsite space, or even if you think the prime real estate could be used more effectively. SDM owns and manages archive storage facilities in London Bridge and within 2-hours drive of the city – so it is very easy to deliver boxes from either of our storage centres in minimal time.

5. Accessibility

Be sure that, wherever you choose to store your archives, they are easily accessible. The box labelling system should make them easy to find if stored onsite. Alternatively, if you outsource your document archiving solutions ensure that you can view your record details on an online platform and request rapid retrievals with this company.

SDM promises to have your files delivered to you the next morning at a time of your choosing (if ordered by 5:30pm the previous day), or if you order by 11:30 am your records will arrive the same afternoon. If you do choose to outsource your document storage, make sure that the provider can offer similar SLAs.

6. Store Similar Documents Together

Store all the documents that are related in the same boxes. Doing so will ensure that if you need a particular set of files, such as accounting records, you can gain quick access to them by looking up this index field and retrieving only what is necessary.

7. Know The Retention Dates

It is useful to know how long you should keep your documents in storage so that you can set retention dates to have them destroyed when you have held them for long enough. This is an essential best practice to avoid data protection breaches and to reduce archive inflation over time.

8. Safety – Trust Where You Are Sending Your Documents

You must be safe in the knowledge that your documents are being stored in a highly secure record storage facility, especially if you are sending private and important documents to a third party storage provider.

SDM's main storage facility, just outside of London, is an ex-MOD bunker. It is bomb-proof, weather and fire proof. SDM also ensure 24/7 CCTV surveillance with alarms connected to external emergency services. If you are outsourcing your archiving, make sure to check the security of the premises.

9. Not Outsourcing Your Document Storage?

https://bestfload870.weebly.com/irish-casino-online.html. If you have decided to store your documents internally, make sure that your records are not stored on the floor, preventing unnecessary damage in case of flooding or pest infestation.

Gobdocuments 1 6 – Secure Document Archival Paper

10. Recyclable Boxes

Cardboard is the most cost-effective type of container, however it can damage easily. To help sustain a low carbon footprint, be sure to use boxes that are 100% recyclable so that re-boxing items poses a minimal environmental impact.

Related Articles

By securedatamgt | 18 Aug 2016

This August Google celebrated the 147th birthday of Mundaneum co-creator Paul Otlet with one of their signatory Google Doodles, designed by Leon Hong. So why did Google decide to.

Gobdocuments 1 6 – Secure Document Archival Storage Boxes

By securedatamgt | 15 Mar 2016

In every office there will be an individual, or perhaps individuals, who will be responsible for record keeping and management. This role is not limited to only the.

Gobdocuments 1 6 – Secure Document Archival Organizer

By securedatamgt | 07 Mar 2016

Filing documents can be mundane and quite frankly rather dull but unfortunately filing is a necessary, and very important part, of any record management and storage routine. It.





broken image