JiscMail Logo
Email discussion lists for the UK Education and Research communities

Help for ARCHIVES-NRA Archives


ARCHIVES-NRA Archives

ARCHIVES-NRA Archives


ARCHIVES-NRA@JISCMAIL.AC.UK


View:

Message:

[

First

|

Previous

|

Next

|

Last

]

By Topic:

[

First

|

Previous

|

Next

|

Last

]

By Author:

[

First

|

Previous

|

Next

|

Last

]

Font:

Proportional Font

LISTSERV Archives

LISTSERV Archives

ARCHIVES-NRA Home

ARCHIVES-NRA Home

ARCHIVES-NRA  2004

ARCHIVES-NRA 2004

Options

Subscribe or Unsubscribe

Subscribe or Unsubscribe

Log In

Log In

Get Password

Get Password

Subject:

rain 428 e-storage, Ransom, contempt of court

From:

Peter Kurilecz <[log in to unmask]>

Reply-To:

[log in to unmask]

Date:

Wed, 28 Apr 2004 21:23:57 -0400

Content-Type:

text/plain

Parts/Attachments:

Parts/Attachments

text/plain (239 lines)

Louisville Courier Journal
Archivist also fond of what's useless
By day, Mary Margaret Bell is a mild-mannered archivist with the Jefferson
County Public Schools. By night, she is a trivia virtuoso.
"She is a franchise player — just phenomenal," said Keith "Cloudy" MacLeod, a
stockbroker by day and player-coach of the satellite TV trivia team at Louisville's
Linn Station Road TGI Friday's on Tuesday nights.
http://www.courier-journal.com/localnews/2004/04/28ky/B1-byron0428-5376.html (



The Daily Texan
Ransom Center gets acting
coach's work
Collection includes teaching notes, video,
audio tapes, scripts
By Zein Basravi
Forty years of the work of Stella Adler, who greatly influenced the way American
theater actors are trained, now resides in the Harry Ransom Humanities Research
Center.
The Ransom Center recently acquired teaching notes, marked-up copies of plays, notes
on characters and more than 700 hours of audio and video tapes of Adler's classes,
beginning in the early 1940's. The collection will be made available to students within
the year and will be located at the Ransom Center reading room once the tapes have
been processed and preserved, said collection curator Helen Adair.
http://www.dailytexanonline.com/news/2004/04/28/University/Ransom.Center.Gets.Acting.Coachs.Work-673120.shtml



Daily Yomiuri
Kanagawa cops shredded documents
Yomiuri Shimbun
The Kanagawa prefectural police disposed of accounting documents it had been
ordered to keep, police officials said Wednesday.
According to an internal investigation, about 10 sections, including the general
affairs section of the criminal investigation department at the prefectural police
headquarters and several police stations, destroyed documents on investigation
costs and rewards paid out that they had been ordered to keep by the National
Police Agency in March.
http://www.yomiuri.co.jp/newse/20040429wo22.htm



The Wagin Argus
Help rescue Wa's
historical records
Wednesday, 28 April 2004
THE JS Battye Library of West Australian
History (part of the State Library of WA)
collects, preserves and makes available to
the community material on Western
Australia's heritage.
These priceless historical records include
books, newspapers, photographs, private
papers, films and oral histories, some dating
from before white settlement.
http://wagin.yourguide.com.au/detail.asp?class=news&subclass=local&category=general%20news&story_id=302863&y=2004&m=4



The Post and Courier
Employees of bankrupt firm found in
contempt for destroying records
Associated Press
ANDERSON--Calling one of them "arrogant" and saying he didn't trust much of
what the other one said, a federal judge found two former HomeGold employees
contempt of court Tuesday for destroying documents relating to the bankrupt Upstate
financial company.
U.S. District Judge Ross Anderson ticked off about two dozen reasons why he didn't
believe explanations by Tony Park and one-time HomeGold Chief Executive Ronnie
Sheppard on how tons of documents ended up at a recycling center.
http://www.charleston.net/stories/042804/sta_28carolina.shtml



ctv.ca
Air India judge slams destruction of records
Canadian Press
VANCOUVER — CSIS's destruction of tapes and transcripts from conversations with an Air India
bombing source is "unacceptable negligence," a B.C. Supreme Court judge ruled Tuesday.
And, said Judge Ian Josephson, the action constitutes a violation of the Charter rights of co-accused
Ajaib Singh Bagri. "It is clear that a procedure should have been in place for the preservation of this
clearly relevant evidence," Josephson said.
http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/1083108813004_78518013/?hub=TopStories



Forbes
Quattrone's Two-Minute Warning
Dan Ackman, 04.28.04, 8:33 AM ET
NEW YORK - Frank Quattrone could always tell where he was and what
he was doing by checking his old e-mail.
If he was in the office, his e-mail was in all lower case letters, because he
was too busy to capitalize. If he was on the road, the first letter of his
e-mail was in upper case, because his Research In Motion (nasdaq: RIMM
- news - people ) BlackBerry device, which he used on the road, capped
first letters automatically. And if he wasn't e-mailing he was likely in his
car on his cell phone. Or maybe he was in court, which is where he was
yesterday, no BlackBerry, no cell phone, testifying in his own defense
against federal obstruction of justice charges. If he beats the rap, which
seems likely, his e-mail records will be credited with an assist.
http://www.forbes.com/business/2004/04/28/cx_da_0428topnews.html (



Forbes
The Insider
Chana R. Schoenberger, 05.10.04
When a top employee is suspected of stealing data, things can
get messy.
The ring of the phone at her Laguna Beach house, near Los Angeles, woke
Denise DeMan-Williams at 7:30 on the Saturday of the July 4th long
weekend in 2003. It was her lawyer, telling her that five policemen from
East Whiteland Township, Pa. had just raided the home of one of her
employees, Dr. John Goldener. The cops searched for four hours and left
with armfuls of documents, electronic equipment and CDs.
http://www.forbes.com/home/free_forbes/2004/0510/082.html (



Forbes
Data of Reckoning
Quentin Hardy, 05.10.04
Business gets more information than ever. This is just the start.
How to survive?
We, or rather the electronic devices we employ, are data pack rats,
accumulating e-mails, Web pages, credit card swipes, phone messages,
stock trades, memos, address books and radiology scans. It's impossible to
count all these bits, but people make good guesses, and they have come up
with one for 2002. During that year the world created 5 exabytes of
information. An exabyte is the digital equivalent of a trillion novels. The
yearly total amounts to somewhat more than all the words ever spoken by
human beings--and it was up 68% from two years earlier.
http://www.forbes.com/home/free_forbes/2004/0510/151.html



Computerworld
COMPUTERWORLD TECHGUIDE STORAGE PART 2
Legal lottery
Organisations are taking chances on compliance and penalties when they delegate the responsibility of
retention and management of email messages to their employees.
By Melanie Liew
Be aware of the risks, liability and exposure associated with corporate information. The retention
and management of email messages is a corporate responsibility. Today, many companies have
relegated this responsibility to users and this has long term implications for organisations when it
comes to compliance and general best business practice.
http://www.computerworld.com.sg/pcwsg.nsf/0/FE2F7F02D371905048256E840023FF55?OpenDocument (



Computerworld
COMPUTERWORLD TECHGUIDE STORAGE PART 2
Outsourcing email storage
The basic premise of outsourcing is that, for business components that do not offer a strategic advantage to the
company, cost savings can be achieved by outsourcing these business components to a professional third party
that can offer cheaper cost structure by leveraging on the economy of scale. And email storage archiving is
approaching the level of maturity for outsourcing to make sense.
By Lucas Mearian and Louis Chua
The basic premise of outsourcing is that, for business components that do not offer a strategic
advantage to the company, cost savings can be achieved by outsourcing these business
components to a professional third party that can offer cheaper cost structure by leveraging on the
economy of scale. And email storage archiving is approaching the level of maturity for outsourcing
to make sense.
Many international telecommunications companies are entering the email archiving service market
and are trying to persuade their corporate users to add outsourcing and managed storage service to
their voice and data contracts.
http://www.computerworld.com.sg/pcwsg.nsf/unidlookup/2184D09EB756C29848256E840026A407?OpenDocument



Computerworld
COMPUTERWORLD TECHGUIDE STORAGE PART 2
Engineering ILM
Data classification aligns data value according to business drivers such as performance and availability,
regulatory compliance, information protection, budgets, and new directions for business growth.
By Melanie Liew
As information becomes an ever-more important aspect in the enterprise, it becomes subject to
changing business, legal, and regulatory requirements that make its value fluctuate throughout its
life.
Organisations have to look into all aspects _ hardware, data protection software and data
management software to ensure that their data are preserved according to the requirements or risk
running foul of the law when they are required to produce the data.
This is where the concept of information lifecycle management (ILM) comes in. ILM is a model for
managing information throughout its life, from creation and use to archival and disposal. The goal of
ILM is to help obtain the maximum value at the lowest total cost of ownership at every stage in the
life of information.
http://www.computerworld.com.sg/pcwsg.nsf/unidlookup/88C2AEC37971ECB548256E840027AC0F?OpenDocument



FCW
GAO finds holes in HUD records
BY Dibya Sarkar
April 26, 2004
The Department of Housing and Urban Development did a poor job of managing and
accounting for purchases of computers and related equipment over a three-year period,
according to congressional auditors.
In reviewing HUD's internal accountability systems and controls during fiscal years 2001,
2002 and 2003, the General Accounting Office found that department officials consistently
failed to record computer equipment purchases in its asset management system, adequately
maintain or reconcile records, and conduct regular inventory checks of the locations and
quantities of the equipment.
http://www.fcw.com/fcw/articles/2004/0426/web-hud-04-26-04.asp



Press Release
Mobius Acquires E-mail Archiving and Records Management Technology from
eManage Inc.
http://biz.yahoo.com/prnews/040427/cgtu099_1.html



Computerworld
Opinion by Kelly Martin, Symantec
Corp.
APRIL 22, 2004
(COMPUTERWORLD) - In a perfect
world, corporate laptops and desktops
would be outfitted with only authorized
software that was appropriately
configured, always up to date and
patched, and protected by layers of
security. Corporate information security
policies would be painstakingly followed
by professionals who never failed to
employ best practices. IT audits, in turn,
would be a formality -- a regular activity
that simply confirmed a flawless IT
environment.
http://www.computerworld.com/securitytopics/security/story/0,10801,92554,00.html



Peter A. Kurilecz CRM, CA
Richmond, Va
[log in to unmask]

Top of Message | Previous Page | Permalink

JiscMail Tools


RSS Feeds and Sharing


Advanced Options


Archives

May 2024
April 2024
March 2024
February 2024
January 2024
December 2023
November 2023
October 2023
September 2023
August 2023
July 2023
June 2023
May 2023
April 2023
March 2023
February 2023
January 2023
December 2022
November 2022
October 2022
September 2022
August 2022
July 2022
June 2022
May 2022
April 2022
March 2022
February 2022
January 2022
December 2021
November 2021
October 2021
September 2021
August 2021
July 2021
June 2021
May 2021
April 2021
March 2021
February 2021
January 2021
December 2020
November 2020
October 2020
September 2020
August 2020
July 2020
June 2020
May 2020
April 2020
March 2020
February 2020
January 2020
December 2019
November 2019
October 2019
September 2019
August 2019
July 2019
June 2019
May 2019
April 2019
March 2019
February 2019
January 2019
December 2018
November 2018
October 2018
September 2018
August 2018
July 2018
June 2018
May 2018
April 2018
March 2018
February 2018
January 2018
December 2017
November 2017
October 2017
September 2017
August 2017
July 2017
June 2017
May 2017
April 2017
March 2017
February 2017
January 2017
December 2016
November 2016
October 2016
September 2016
August 2016
July 2016
June 2016
May 2016
April 2016
March 2016
February 2016
January 2016
December 2015
November 2015
October 2015
September 2015
August 2015
July 2015
June 2015
May 2015
April 2015
March 2015
February 2015
January 2015
December 2014
November 2014
October 2014
September 2014
August 2014
July 2014
June 2014
May 2014
April 2014
March 2014
February 2014
January 2014
December 2013
November 2013
October 2013
September 2013
August 2013
July 2013
June 2013
May 2013
April 2013
March 2013
February 2013
January 2013
December 2012
November 2012
October 2012
September 2012
August 2012
July 2012
June 2012
May 2012
April 2012
March 2012
February 2012
January 2012
December 2011
November 2011
October 2011
September 2011
August 2011
July 2011
June 2011
May 2011
April 2011
March 2011
February 2011
January 2011
December 2010
November 2010
October 2010
September 2010
August 2010
July 2010
June 2010
May 2010
April 2010
March 2010
February 2010
January 2010
December 2009
November 2009
October 2009
September 2009
August 2009
July 2009
June 2009
May 2009
April 2009
March 2009
February 2009
January 2009
December 2008
November 2008
October 2008
September 2008
August 2008
July 2008
June 2008
May 2008
April 2008
March 2008
February 2008
January 2008
December 2007
November 2007
October 2007
September 2007
August 2007
July 2007
June 2007
May 2007
April 2007
March 2007
February 2007
January 2007
2006
2005
2004
2003
2002
2001
2000
1999
1998


JiscMail is a Jisc service.

View our service policies at https://www.jiscmail.ac.uk/policyandsecurity/ and Jisc's privacy policy at https://www.jisc.ac.uk/website/privacy-notice

For help and support help@jisc.ac.uk

Secured by F-Secure Anti-Virus CataList Email List Search Powered by the LISTSERV Email List Manager