What is decommissioning?
Decommissioning is the process of removing a business system, such as a database, shared drive, email application or other business information system, from use in an organisation.
When should systems be decommissioned?
Systems should be removed from use when they are upgraded or replaced by new products that provide similar functionality, when the technology is performing poorly or when the technology is no longer supported.
Drivers for system decommissioning include:
- system replacement
- physical asset replacement
- project completion
- organisational restructure
- business functions moving to a different public office
- business processes are no longer required.
Systems must be regularly audited and reviewed for their suitability in meeting the recordkeeping requirements and obligations of the organisation.
What happens to records when a system is decommissioned?
Most business systems will contain records that need to be captured and retained. Preparations for decommissioning must ensure that records and their metadata remain complete, accessible and properly managed until they are able to be lawfully disposed of. This can be achieved through migration into another system or transfer of permanent records to PROV.
Systems should not be decommissioned without considering how the records they hold might be needed in the future.
Risk management during decommissioning
Engaging with stakeholders is an essential step in identifying and managing potential threats to records during the decommissioning process. Public offices should conduct a risk assessment involving:
- business owners who can provide context and identify records that are in current use
- records managers who understand the business and legal requirements for records and relevant organisational processes and systems
- system administrators who understand the functions and limitations of the systems in use.
Preservation and risk mitigation strategies should be developed and implemented to ensure that records maintain their completeness and integrity. Risks to consider include loss, corruption, degradation or breach of data and metadata. High value and high risk records should be prioritised.