Browse Definitions :
Definition

document lifecycle

The document lifecycle is the sequence of stages that a document goes through from its creation to its eventual archival or destruction.

Proper procedures throughout the document’s lifecycle are an important part of enterprise content management (ECM), a set of defined processes that help an organization obtain, organize, store and deliver information crucial to its operation in the most effective manner possible. 

The document lifecycle is also important for enterprise document management (EDM), a strategy for overseeing an organization's paper and electronic documents so they are easily retrieved in the event of a compliance audit or subpoena. Considerations for EDM include how long documents should be retained, where they should be stored, how changes can be traced and how they can be recovered in the event of a disaster.

The stages of a document’s lifecycle include: creation, storage, categorizing, metadata tagging, delivery or sharing, repurposing, review and reporting, archiving and / or destruction.

This was last updated in August 2014

Continue Reading About document lifecycle

Join the conversation

1 comment

Send me notifications when other members comment.

Please create a username to comment.

Are you serious? Someone has had the mind to come up with this garbage....I feel truly sorry for them
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close