Mo7 - Utilize and Maintain Organi. Inform.
Mo7 - Utilize and Maintain Organi. Inform.
Mo7 - Utilize and Maintain Organi. Inform.
Level-II
Based on March 2022, Curriculum Version 1
Ministry of Labor and Skills wish to extend thanks and appreciation to the many representatives of
TVET instructors and respective industry experts who donated their time and expertise to the
development of this Teaching, Training and Learning Materials (TTLM).
This learning guide is developed to provide you the necessary information regarding the
following content coverage and topics:
Checking and registering incoming mail
Identifying titles and locations
DISTRIBUTING urgent and confidential mail
Sorting and dispatching mail
Recording and reporting damaged items
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
check and register incoming mail
identify titles and locations
distribute urgent and confidential mail
sort and dispatch mail
record and report damaged items
Receiving mail
Some of the mail your firm receives will be delivered in the morning by Ethiopian Post. On occasions
documents will be delivered using an Ethiopian Post special delivery service, such as Registered Post.
You can look at the Ethiopian Post Internet Site to find out about other delivery services that you may
need to be aware of.
1.1.1 Checking incoming mail
As it is very easy to accidentally damage a letter or a document when you are opening an envelope it is
best to take your time and open each envelope with care.
Once you have opened an envelope ensure that you remove all the contents. Often an envelope will
include a covering letter and a number of attachments. You should check that all the attachments
indicated in the covering letter have in fact been included. See the 'Handling specific types of
incoming mail' section below to understand what to do if items are missing.
The followings are things that you should do if items are missing while handling mail:
Keeping items together
Ensure items that arrive in the same envelope are kept together. You can usually attach items with a
paper clip. For example, a cheque that arrives with a letter must be paper clipped to the letter
otherwise someone could receive the letter and assume that the sender has forgotten to send the
cheque.
Date stamping
After the mail has been opened you should ensure that, where appropriate, each item is date stamped.
Date stamping the incoming mail helps identify when your legal firm received the mail. Original
documents such as, birth certificates, qualifications, contracts and agreements should not be date
stamped. If a note of the date is required for original documents, then a colored sticky note can be date
stamped and stuck to the front of the document. For example, if a contract has been sent to your
For example, some organizations expect all incoming mail, other than original documents, to be date
stamped on the reverse top left hand corner. Ensure that you are clear on the date stamping procedure
at your workplace.
Enclosures
Mail marked confidential, personal or private should not be opened, unless you are authorized to
open it. If you open this mail by mistake, you should quickly re-seal the envelope with tape and
write on it' Opened by mistake and your initials. It is not possible to do this for faxes and emails.
If an email message is marked confidential and the addressees' name is written in the message
subject line, you can leave it unopened and forward it to the receiver or send a message to let
them know the mail has arrived.
Urgent mail
Some mail is marked urgent. If it is also marked confidential or personal, you should treat it as
confidential first and not open it. You can either deliver urgent mail immediately to the person it
is addressed to or you can make sure it goes to the top of the pile when you are prioritizing mail
for that person. Another form of urgent mail is Express Post. The sender pays extra postage for an
item to be priority processed for prompt delivery, usually the next working day. An organization
may have specific procedures in place for sorting and distributing urgent mail.
Mail should always be forwarded to the recipient within the organizations designated time lines so
business is conducted effectively. Speak to your supervisor if you ever have any problems with
For example, you may place mail for people in a separate e folder and deliver it to them in tray.
Some organizations may have an area where employees collect mail and you may be responsible
for depositing mail in the correct pigeonholes.
Large organizations may have mail collection points for each department. Organizations with
numerous offices in various locations may have an internal mail system, with specified collection
points and pick-up and drop-off times. There may be a number of different internal distribution
systems operatingat the same time.
Once the incoming mail has been opened, date stamped and registered it needs to be sorted and then
distributed to the appropriate personnel.
Depending on the size of your company and the processes in place you would normally sort the mail
by business section or by individual. Once the mail has been split in this manner you will be required
to sort the mail based on its importance. Urgent mail is usually at the top of the bundle, followed by
mail that has been sent by courier. Below this mail should be the private and confidential mail and
finally any general correspondence.
Note that your company may have specific rules regarding the handling of cheques and invoices.
Often this type of mail will be directed to the accounts department or to a nominated person. Often
more than one person needs to be present when opening mail that contains cash orders or cheques.
Your supervisor will indicate how to process this type of mail. Once the incoming mail has been
sorted it needs to be distributed to the appropriate personnel.
Each company will have its own set of requirements with regards to the distribution of incoming mail.
Often the mail will need to be distributed by a specific time each morning. If you have been given the
responsibility of distributing the mail, ensure that you are aware of the requirements in place.
In order to efficiently distribute the mail, you will need to identify and understand the structure of your
workplace and the titles and roles that each person has. This is especially important when you receive
a mail item that does not specifically indicate for whom it is intended. When this happens, you will
need to work out who the letter is for. This can be done by asking your supervisor, calling the sender
or reading the letter and then directing it to the appropriate person or business section.
Often a company will have a tree-structure or an employee list that will help you identify each of the
individuals and sections in your company.
1.5 Recording and reporting damaged items
1.5.1 Dealing with damaged, suspicious and missing items correctly
On occasions you will need to deal with mail that has been damaged, mail that appears suspicious and
lost mail items.
Damaged mail
Damaged mail should be sorted, date stamped and registered following the same process used for
other incoming mail. The damage should be recorded in the register.
This unit to provide you the necessary information regarding the following content coverage
and topics:
Evaluating and selecting best delivery options
Preparing items for urgent delivery
Collecting relevant and timely information
Using basic clerical support technology
Organizational requirements in handling information
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
evaluate and select best delivery options
prepare items for urgent delivery
collect relevant and timely information
use basic clerical support technology
apply Organizational requirements in handling information
Express Post
Express Post is a service offered by Ethiopia Post that guarantee delivery to capital cities by the
next business day. However, you should be aware that it generally takes two days if the recipient’s
address is beyond the metropolitan area. Prepaid envelopes in a range of sizes are available for
flat documentsas well as parcels. This service is an appropriate option for urgent deliveries.
DX mail
Using the DX Mail service is an efficient way of sending and receiving mail. However, organizations
have to be members of DX Mail and pay an annual membership fee to receive and send mail in this w
ay. If your organization is a member, find out if any of your customers are fellow members because
using this service may be appropriate for sending urgent mail.
Items are usually sent by courier when they are urgent and when other mail services cannot
deliver theitem within the necessary time frame. Couriers may also be used when items are fragile
or confidential and need to be delivered to a specific person.
door-to-door service
overnight express
international service
2.2 Preparing items for urgent delivery
To prepare items for urgent delivery perform the following: -
Print addresses and names as clearly as possible. Print in capital letters and check that all adder’s
details are correct.
Do not use post-office box numbers. Couriers and transport companies cannot deliver items topost-
office boxes, as there is no-one to sign for the item when it is delivered.
Make sure all consignment notes, invoices and/or address labels are stuck securely to the
document or parcel.
Make sure the address is the same on the item, the invoice and the consignment note.
2.2.1 Recording the dispatched items
You must register or make a record of every document or parcel sent by a courier or transport
company y (similar to the ordinary outgoing mail). There may be a different mail register for
urgent items sent with each separate carrier.
Always ask the appropriate person if you are unsure how to register these it ems. Careful
registration allows you to track the movements of documents and parcels easily and quickly.
Occasionally, a document or parcel may go missing. Most carriers have a free tracing service
(unlessthe item was sent more than six months earlier). You need to contact the service and make
a request for an item to be traced.
Records management
Records management, also known as the records and information management, is the professional
practice of managing the records of an organization throughout their life cycle, from the time they are
created to their eventual disposal. This includes creation, storing, retrieving and destroying or
permanently preserving records.
An organization's records preserve its corporate memory. In determining how long to retain records,
their capacity for re-use is important. Many are simply kept as evidence of a transaction. Others
document what happened and why.
Records are visually or mechanically or electronically readable materials regardless of their physical
form that are received or created in connection with the activities of individuals or organizations.
Records can be either tangible objects, such as paper documents like birth certificates, driver's
Not all documents are records. A record is a document consciously retained as evidence of an action.
Records management systems generally distinguish between records and non-records (convenience
copies, rough drafts, duplicates), which do not need formal management.
Many systems, especially for electronic records, require documents to be formally declared as a
record so they can be managed. Once declared, a record cannot be changed and can only be disposed
of within the rules of the system.
Just as the records of the organization come in a variety of formats, the storage of records can vary
throughout the organization. File maintenance may be carried out by the owner, designee, a records
repository, or clerk. Records may be managed in a centralized location, such as a records center
or repository, or the control of records may be decentralized across various departments and
locations within the entity. Records may be formally and discretely identified by coding and housed
in folders specifically designed for optimum protection and storage capacity, or they may be casually
identified and filed with no apparent indexing. Organizations that manage records casually find it
difficult to access and retrieve information when needed. The inefficiency of filing maintenance and
storage systems can prove to be costly in terms of wasted space and resources expended searching for
records
Data that is (1) accurate and timely, (2) specific and organized for a purpose, (3) presented within a
context that gives it meaning and relevance, and (4) can lead to an increase in understanding and
decrease in uncertainty. Information is valuable because it can affect behavior, a decision, or an
outcome. For example, if a manager is told his/her company's net profit decreased in the past month,
he/she may use this information as a reason to cut financial spending for the next month.
A piece of information is considered valueless if, after receiving it, things remain unchanged. For a
technical definition of information
Collect information in a timely manner and ensure that it is relevant to organizational needs
Computer Databases
A spreadsheet allows you to create a template that you can enter numbers in and other results can be
computed. You may occasionally go back and enter new data and new results calculated.
A computer database is, as the name implies, a collection of data stored within a computer. It is like
an electronic file cabinet full of documents. What makes computer databases useful is the ease with
which the data can be entered, stored and manipulated.
Computer Files
A computer file is a resource for storing information, which is available to a computer program and
is usually based on some kind of durable storage.
A file is "durable" in the sense that it remains available for other programs to use after the program
that created it has finished executing. Computer files can be considered as the modern counter part of
paper documents which traditionally are kept in office and library files, and this is the source of the
term
Correspondences
Correspondence consists of memos, letters, and electronic mail. In engineering and science,
correspondence is an effective way to make requests, submit changes to a job, and deliver specific
information. Unlike telephone conversations, correspondence presents the audience with a legal
contract that is dated and can support a claim in court. This section presents formats for memos and
letters. Because electronic mail usually has a built-in format, no format is assigned here for it. In
addition, this section provides helpful links for job letters and résumés.
In computing, a file system (or file system) is used to control how data is stored and retrieved.
Without a file system, information placed in a storage area would be one large body of data with no
way to tell where one piece of information stops and the next begins. By separating the data into
individual pieces, and giving each piece a name, the information is easily separated and identified.
Taking its name from the way paper-based information systems are named, each group of data is
called a "file". The structure and logic rules used to manage the groups of information and their names
are called a "file system".
All files, confidential or not, are the property of the organization. Employees must be careful not to
release information to the public, competitors or anyone else outside the workplace.
organizations that keep sensitive information about their customers such as insurance
companies, legal firms and government departments
Files that are confidential, or have restricted access, are generally kept separate from the main filing
system. Sometimes they are tagged to indicate their security rating (for example, general, personal,
restricted, confidential, secret and top secret).
Electronic files are more difficult to store separately, especially with a networked computer system,
so other measures are used such as password protection.
storing confidential computer files on a CD or other storage device rather than on the hard
drive (the CD can then be stored in a locked cupboard)
Using encryption, a method in which the computer file is coded and requires a
decoding key to open and translate the file.
If you require access to confidential or restricted files, you will need help to make sure you completely
understand the policies and procedures for accessing such files
It is particularly important that the movement of these files is accurately recorded to ensure they are
not accidentally released into the wrong hands or lost.
It is equally important to look after the organization’s files while you are using them.
When files are out of the filing system, they should be kept in a safe place and treated with care. Don’t
D. None
D. All
3. Mail should always be forwarded to the recipient within the organizations designated time lines
Answering machine
Answering machines are useful if the person you want to speak to is unavailable or if you are busy
when someone calls you. An answering service takes messages on behalf of the person you are
trying to contact and passes your message on to them. A message bank is a type of answering
machine. Make sure you record times when you have tried to contact someone and left a message
for them. You will need to follow it up if they don’t return your message
Fax machine
A fax machine converts paper-based information into electronic information for transmission. It is
useful for transmitting and receiving information that requires people to check data, read a report or
confirm information. Staff are usually shown how to use the fax
machine during their induction session, as different organizations have different sorts of machines.
Asking people to send information by fax rather than by post can save valuable time.
Organizations usually have some of the following protocols in place for the processing of
information:
Authority - limiting the number of people who have authority to access sensitive,
confidential or personal information.
Page Ministry of Labor and Utilize and Maintain Organizational Version -1
Skills
28 of 62 Author/Copyright Information
November, 2022
Security/access - files are protected with passwords for security and employees are given a
level of security that enables them to access only the information which is relevant to their job.
Naming standards - both paper and electronic files need to be well organized and labeled
correctly and consistently so they are identifiable and easily accessed by employees.
Indexing is the process of deciding where the document is to be stored – the
indexing unit may be the keyword, customer number, business name, individual’s
surname, geographic location etc.
Coding makes it clear where the document is to be stored – either by highlighting the
keyword or the name under which it is to be filed, or writing the file number or a
subject or code on the document.
Version control - making sure any new or updated information is correctly identified as
being the most recent by making an incremental change to its associated letter or numerical
code.
Tracking processes - most organizations have filing practices in place which allow the
movement of files to be monitored at all times.
a. File movement register; a book, binder or electronic file, recording the file name, number,
date borrowed, borrower, and date returned etc. Entering details into the register allows
others to know the whereabouts of the file and saves valuable time in tracking the file.
b.File movement marker; an „out card‟ which is placed in the hard copy filing system where
the file came from, or a note in an electronic system showing the borrower’s details and
date borrowed.
c. Barcode borrowing system for files (similar to borrowing a library book) or passing slips‟
(similar to circulation slips or envelopes) recording the movement of files.
d.Cross referencing – if a file could be located in more than one location it may be necessary
to cross reference, the file. A marker is inserted in the filing system in the alternate location,
directing you to the actual location of the file.
Requests for information should be dealt with in accordance with the instructions received. Circulation
of some materials may involve photocopying, collating (or bringing together) a variety of materials or
pages of information, binding these pages together or inserting into a folder, marking the information
Updated e.g. adding a new customer to the database, changing the answering machine
message over a holiday period, altering the prices on a price list.
Modified e.g. changing a customer’s phone number on the database, using the
newsletter template but changing the contents.
These changes should be done in a timely manner and in accordance with organizational requirements
– updating an address after the monthly statements are sent would be ineffective;
regularly updating the message on the answering machine makes a positive impact on callers.
This guide will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
maintain information and filing systems
Files, records and information are in daily use throughout the office. New files are being created and
old files removed from both the system and file index, and information is modified and updated
within files.
Paying attention to Occupational Health and Safety issues, e.g. closing filing cabinet
drawers when not in use, using a trolley when heavy or bulky items need to be moved, using a
ladder when retrieving files from a high location, not storing files where they could
overbalance or be tripped over.
It is essential that computer operators understand the electronic file management procedures of the
organization, such as how files are named and how folders (directories) are used.
Page Ministry of Labor and Utilize and Maintain Organizational Version -1
Skills
33 of 62 Author/Copyright Information
November, 2022
How workplace information is stored depends on the following:
The amount of information to be stored - it is easier to store large amounts of information on
a computer database rather than a paper-based storage system. This also enables many people
to easily access the information, particularly if the organization is spread over a number of
workplace
The size of the workplace/organization - relates to both the physical size and the number of
employees.
A large workplace area has the potential for an adequate area being available for filing cabinets or
compacts units to store paper-based information, whereas a small workplace area would tend to store
more information electronically or digitally.
If the organization has a large number of employees, the method of storing information would depend
on how many people need access to the information and where these people were located in the
workplace.
How work is conducted - some business organizations are more electronically up-to-date
than others and have embraced the digital age, ensuring that more information would be
stored electronically rather than paper-based. If more employees operate outside of the
office, electronic storage of information and digital communication would be preferred.
The amount of storage space available - if storage space is limited, less paper files can be
stored. Inactive or dead files would need to be identified and disposed of in a shorter period
of time so storage space is used most effectively.
How often records need to be accessed - those records used frequently would need to be
easily accessed, so would tend to be either centrally filed if paper-based if the workplace
area is relatively small or non-centrally to give access to the relevant department; or digitally
filed to enable all employees access whenever necessary.
Security required - confidential or sensitive paper-based information would need to be
filed in a secure area, either in locked filing cabinets or a locked room that few people can
access. Keys for both would be given only to those who have authority to access the
information. Electronic files would require passwords to restrict access and regular backing-
up of the information would be required in case of power failure or computer viruses.
Cost of storage equipment - computer equipment is expensive and has to be updated and
Alphabetical
The most commonly used method of filing, the alphabetical system places files in alphabetical order
according to the customer or business name, e.g. the telephone book. There are a number of rules to
remember when using the alphabetic system.
Disregard „joining‟ words and titles such as “and”, “the”, “&”, “Mr”, “Sir”, “Dr”, “Miss” etc
E.g. Jones-Smith and van der Lynden are both indexed as one word.
Initials come before names (in filing „nothing comes before something‟). E.g. B Thompson
would be filed ahead of Brian Thompson.
Company names are treated in the order they are written, except if they contain a family name.
E.g. Both Grace Bros and Robert E Grace & Sons are filed under „Grace‟, but Robert would be
filed under „Robert‟.
Numerical
Each file or piece of information is filed in number order from lowest to highest and according to:
the number on the document e.g. Tax Invoice number
the customer number, account number or membership number
another numbering system e.g. Dewy decimal system used in libraries
Numerical systems are usually an indirect method of filing and need to be cross-referenced to an
alphabetical index. E.g. an alphabetical list of customer names showing their account number.
Alpha-numeric systems combine both letters and numbers in a file reference number.
before letters and would file 24-7 before the „A‟ entries in a database listing.
Filing rules can vary between organizations so staff should always check the procedures and rules at a
workplace
Geographical
Subject
Records are sorted according to the subject matter and filed alphabetically. This allows information on
the one topic or subject to be easily located
Key word
A particular word is used as the subject classification and specific descriptors are also allocated to
further classify the information. Keyword systems are usually used in large organizations where the
keywords are specifically designated.
Chronological
Filing is used in conjunction with other filing methods and involves sorting records according to their
date. In a client file for example, correspondence would be filed with the most recent on top. Copies
of purchase orders would be filed with the most recently sent order on top.
Rotary storage Double sided sections of shelving on a rotating base inside a cabinet,
to enable access to both sides of that section of shelving by rotating it
180 degrees.
New files
Steps in establishing a new file:
identify the need to create a new file
prepare a hanging file or folder for paper based files or a sub directory or folder on the
computer for electronic files
enter the new file in the file register or database
store as appropriate
transferring files at regular intervals or routinely checking for dead or inactive files
Once the analysis is complete, a filing system can be developed. A filing system should be
developed on paper before it is physically implemented. Folders should be sorted, on paper,
into the appropriate primary classification. Within each primary classification folders are
sorted, on paper, into record series.
There are always some records that don't fit neatly into a record series. In many cases they
are really either "Material That May Be Disposed of without a Specific Retention Period"
or unsolicited material. Neither should be included in the filing system. Materials without a
specific retention period can be destroyed or should be managed separately. Unsolicited
material can be destroyed.
Arrangement
Within each individual record series, files are arranged in an order best suited for rapid
retrieval and disposition. A feature or characteristic of the record series is chosen as the basis
for the arrangement.
This feature is most easily identified by determining how various types of records are
requested. Features may include subject, a name associated with the record, a number which
identifies the record, a title.
prepare a hanging file or folder for paper based files or a sub directory or folder on
the computer for electronic files
enter the new file in the file register or database
store as appropriate
1. Organizations establish filing systems to accommodate the type of records they need to
keep
2. Staff needs to know about the types of technology and equipment used in the organization
and how it is used to organize information
Part II. Choose the correct answer from the given alternatives.
4. The most common types of classification for records and information are;-
risk mitigation, by managing the risks associated with illegal loss or destruction of
records, and from inappropriate or unauthorized access to records.
Once records have been created, they must be managed and maintained for as long as required
to ensure they have the following characteristics:
Authenticity – the record can be proven to be what it purports to be, to have been
created or sent by the person that created or sent it, and to have been created or sent at
the time it is purported to have occurred.
Reliability – the record can be trusted as a full and accurate representation of the
transaction(s) to which they attest, and can be depended on in the course of subsequent
transactions.
Typically, electronic records management systems have the following attributes that seek to
ensure these characteristics are maintained:
Maintaining records for as long as they are required – records must be retained for a
period of time that is in accordance with authorized legislative and jurisdictional
requirements.
5.1.2 Sentencing
Sentencing is the process of implementing appraisal decisions with respect to your
organization’s identified records retention requirements. Sentencing will generally be done in
accordance with a retention and disposal authority approved by NSW State Archives and
Records. Sentencing entails identifying and classifying records according to a retention and
disposal authority and applying the retention period and disposal action specified in the
authority.
Appraisal activities are often carried out as part of the design and implementation of
recordkeeping systems, business systems and processes to ensure that recordkeeping is built
into the systems.
This is increasingly important where records are either 'born digital' or digitized and need to be
managed appropriately within business systems. The process of actually implementing
appraisal decisions is known as sentencing and disposal.
The disposal of digital data that would otherwise require migration and further
management, saving time and expense. The notion that storage of data is cheap is now
being challenged.
Saving money by not storing paper records in offsite and onsite locations for longer
than necessary
Easier retrieval of information as records of continuing value have been identified and
the rest are legally disposed of.
By sentencing your organization’s records with the approved retention and disposal
authorities, and documenting the process, your public office can demonstrate that it has
disposed of records legally under the State Records Act
The simplest way to generate identifiers is by a serial number. A steadily increasing number
that is assigned to whatever you need to identify next. This is the approached used in most
internal databases as well as some commonly encountered public identifiers.
Serial numbers work well when you have a single organization and/or system generating the
identifiers. They’re simple to implement, but can have their downsides, especially when they’re
shared with others.
Some serial numbering systems include built in error-checking to deal with copying errors,
using a check digit. Examples include the CAS registry number for identifying chemicals, and
the basic form of the ISSN for identifying academic journals.
The second way of providing unique identifiers is using a name or code. These are typically
still assigned by a central authority, sometimes known as a registration agency, but they are
constructed in different ways. Identifiers for geographic locations typically rely on
administrative regions or other areas to help structure identifiers. For example the statistics
community in the EU created the NUTS codes to help identify country sub-divisions in
statistical datasets. These are assigned based on hierarchy beginning with the country and then
smaller geographic regions
Postal codes are another geographically based set of codes. Both the UK and US postal codes
use a geographical hierarchy. Only here the regions are those meaningful to how the Royal
Mail and USPS manages its delivery operations, rather than being administratively defined by
the government
Hierarchies that are based on geography and/or organizational structures are common patterns
in identifiers. Existing hierarchies provide a handy way to partition up sets of things for
identification purposes.
The SWIFT code used in banking has a mixture of organizational and geographic hierarchies.
It also means you can also manipulate them, e.g. by truncation, to find the identifiers for
broader regions. But encoding lots of information in identifiers also has its downsides. The
main one being dealing with changes to administrative areas that mean the hierarchy has
changed. Do you reassign all the identifiers?
Assigning identifiers from a single, central authority isn’t always ideal. It can add coordination
overhead which can be particularly problematic if you need to assign lots of identifiers quickly.
So some identifier systems look at reducing the burden on that central authority.
A solution to this is to delegate identifier assignment to other organizations. There are two
ways this is done in practice.
The first is what we might call federated assignment. This is where the registration agency
shares the work of assigning identifiers with other organizations’. A typical approach is to
delegate the work of registration and assignment to national organizations. Although other
approaches are possible.
The delegation of work might be handled entirely “behind the scenes” as an operational
approach. But sometimes it ends up being a feature of the identifier system.
For example the (LEI) uses federated assignment where “Local Operating Units” do the work
of assigning identifiers with. As you can see below, the identifiers for the LOUs become part of
the identifiers they assign.
The International Standard Recording Code uses a similar approach with national agencies
assigning identifiers.
Another approach to reducing dependence on, and coordination with a single registration
agency, is to use what I’ll call “local assignment “. In this approach individual organizations
are empowered to assign identifiers as they need them.
A more common approach is to use “prefix allocation “. In this approach the registration
agency assigns individual organization’s a prefix within the identifier system. The organization
then generates new unique identifiers by combining their prefix with a locally generated suffix.
A suffix might be generated by adding a local serial number to the prefix. Or by some other
approach. Again, after generating and assigning an identifier they are commonly still centrally
registered
It should be noted that records that are more than 25 years old are regarded as no longer in use
for official purposes in a public office unless the public office has made a 'still in use
determination' covering them. A public office should therefore transfer records required as
State archives to NSW State Archives and Records' control once they are 25 years old. The
records should be transferred earlier if they cease to be in use for official purposes earlier
Normal Administrative Practice (NAP)
Some records may be disposed of in accordance with Normal Administrative Practice (NAP).
NAP allows you to destroy records that do not document your organization’s business
decisions or are not significant to your organization’s activities.
NSW State Archives and Records has guidance on the types of records that can be destroyed
under the NAP provisions of the Act (Normal Administrative Practice) however it should be
noted that care should be taken. Public offices should develop internal policies and procedures
to define and authorize what is meant by normal administrative practice for their organization
and document the type of documents and records that can be appropriately disposed of by
individual staff under this provision of the Act.
The following are some common scenarios that require data migration:
There are six types of data migration. A single data migration process can involve different
types, including:
1. Storage Migration
Storage migration is where a business migrates data from one storage location to another. It
means moving data from one physical medium to another. A common reason for storage
migration is the upgrading of storage equipment to more sophisticated modern storage
equipment. Hence, it encompasses movement from paper to digital, tapes to hard disk drives
(HDD), HDD to solid-state drives, and hardware-based storage to virtual (cloud) based storage.
The movement is not driven by a lack of space but rather a desire to upgrade storage
technology. It normally does not alter the content or format of data.
2. Database Migration
Databases are data storage media where data is structured in an organized way. Databases are
managed through database management systems (DBMS).
Hence, database migration involves moving from one DBMS to another or upgrading from the
current version of a DBMS to the latest version of the same DBMS. The former is more
challenging especially if the source system and the target system use different data structures.
3. Application Migration
The major challenge comes from the old and target infrastructures having distinctive data
models and using different data formats.
4. Cloud Migration
Cloud migration concerns the movement of data or applications from an on-premises location
to the cloud or from one cloud environment to another. It is, in essence, a specific storage
migration. IT experts continue to witness an increase in cloud migration and forecast that the
majority of major corporations will be operating on the cloud before the end of the decade
ending 2030.
Business Process Migration
Data center migration relates to the migration of data center infrastructure to a new physical
location or the movement of data from the old data center infrastructure to new infrastructure
equipment at the same physical location. A data center houses the data storage infrastructure,
which maintains the organization’s critical applications. It consists of servers, network routers,
The data migration process should be well planned, seamless, and efficient to ensure it does not
go over budget or result in a protracted process. It involves the following steps in the planning,
migration, and post-migration phases:
The data migration process can also follow the ETL process:
Extraction of data
Transformation of data
ETL tools can manage the complexities of the data migration process from processing huge
datasets, profiling, and integration of multiple application platforms.
Read the introduction to the authority and any associated guidelines for specific advice
and guidance on the application and implementation of the authority
Be aware that some authorities only cover records for specific periods
Be aware that some authorities are only approved for use by specific public sector
agencies or jurisdictions, for example the general authorities for universities, the public
health sector and local government.
The disposal authority to be used must be currently authorized by NSW State Archives and
Records. If your public office does not have a functional retention and disposal authority or is
using an authority approved over 10 years ago, please contact NSW State Archives and
Records.
NSW State Archives and Records may not accept the transfer of State archives under an
authority approved more than 10 years ago
5.7 Maintaining records in a usable and accessible form
To maintain easy accessibility and facilitate the retrieval of digital records, it is important that
digital records are sentenced routinely and disposal is implemented. This will prevent an
accumulation of digital records that are no longer required for business cluttering the system. A
cluttered system can also make the maintenance of hybrid files difficult.