Using IRM to Protect Duplicate Copies of Records
This paper is intended for those technical staff or project team members responsible for architecting and implementing
Enterprise 2.0 systems and interested Records Managers and Custodians. This paper includes a use case example that
specifically addresses duplicate records outside the records management repository. It could be extrapolated to include non-records
and other documents within corporate data maps and Records & Information Management strategies, but that
extension of that coverage is not directly addressed with the defined use case contained herein.