Margaret Rouse is an award-winning technical writer and teacher known for her ability to explain complex technical subjects simply to a non-technical, business audience. Over…
Information Life Cycle Management (ILM) is a complex Data Life Management Cycle (DLM) subset and Records and Information Management (RIM) practice used for data storage, system administration and management. The strategic ILM approach is used to determine how data is moved, deleted, destroyed or archived and is based on automated storage procedures, manual data organization formats (paper, microfilm, photographs, negatives and audio/video recordings) and early data storage management, like hierarchical storage management (HSM).
ILM is effective in modern computing where data management is critical, due to compliance issues from legislation like the Health Insurance Portability and Accountability Act (HIPAA) and the Sarbanes-Oxley Act. Both are used to regulate particular types of data management.
ILM uses more complex criteria than data file type, age and access frequency. ILM products automate data management by organizing data and automating data migration into tiers categorized by policy criteria.
ILM is based on three storage strategies, as follows:
ILM’s path management feature is used facilitate stored application data retrieval and allow user specification of policies that define data values according to different times, rates and lifespan. For example, ILM systems allow users to search for various types of stored data file instances, such as customer IDs.
Unforeseen circumstances occur outside of normal business operations and cannot be automated. An example is a legal hold, also known as a litigation hold or legal freeze, which requires data administrators to cease normal ILM data flow continuation.
Techopedia’s editorial policy is centered on delivering thoroughly researched, accurate, and unbiased content. We uphold strict sourcing standards, and each page undergoes diligent review by our team of top technology experts and seasoned editors. This process ensures the integrity, relevance, and value of our content for our readers.
Margaret is an award-winning technical writer and teacher known for her ability to explain complex technical subjects to a non-technical business audience. Over the past twenty years, her IT definitions have been published by Que in an encyclopedia of technology terms and cited in articles by the New York Times, Time Magazine, USA Today, ZDNet, PC Magazine, and Discovery Magazine. She joined Techopedia in 2011. Margaret's idea of a fun day is helping IT and business professionals learn to speak each other’s highly specialized languages.
What is Differential Privacy? Differential privacy is a mathematical framework for determining a quantifiable and adjustable level of privacy protection....
Margaret RouseTechnology Expert
What is cPanel Used For? cPanel is a crucial tool to help you access hosting features via a simple, non-technical...
Ilijia MiljkovacTechnology Writer
What is Operational Technology? Operational Technology, or OT, refers to the hardware and software systems that are used to control...
Marshall GunnellIT & Cybersecurity Expert
Trending NewsLatest GuidesReviewsTerm of the Day