Thanks to all those who responded to my original query. Here is a summary of the many ways IM is currently being used.
Access
1. restricted to certain users but determined users could probably bypass the formal messenging application
Capture
1. all conversations are captured therefore subject to FOI/DP and added costs
2. user decides what is saved
3. no conversations captured (potential for information loss)
One is encouraging the users to use if for quick chats only whilst others expect business information to be discussed.
Several would not consider the implemention of messenging applications without an EDRMs/ECM system. One was using sharepoint to capture the information.
Regards,
Dawn
To view the list archives go to: https://www.jiscmail.ac.uk/cgi-bin/webadmin?A0=RECORDS-MANAGEMENT-UK
To unsubscribe from this list, send an email to [log in to unmask] with the words UNSUBSCRIBE RECORDS-MANAGEMENT-UK
For any technical queries re JISC please email [log in to unmask]
For any content based queries, please email [log in to unmask]
|