We were able to confirm that over 50% of the content was overdue for disposition, and had no continuing value, saving significant effort by reducing the migration scope. We also identified multiple records that were sensitive, allowing the records team to liaise with the current business owners (who Castlepoint also identified) on their target security.We used the Castlepoint system to migrate the records compliantly, extracting, transforming, and loading it into the target environment with all of its content, metadata, audit trail and security context.The unsupported legacy system was able to be officially decommissioned, and the data with continuing value was properly preserved (without causing any data spill).
We were able to confirm that over 50% of the content was overdue for disposition, and had no continuing value, saving significant effort by reducing the migration scope. We also identified multiple records that were sensitive, allowing the records team to liaise with the current business owners (who Castlepoint also identified) on their target security.We used the Castlepoint system to migrate the records compliantly, extracting, transforming, and loading it into the target environment with all of its content, metadata, audit trail and security context.The unsupported legacy system was able to be officially decommissioned, and the data with continuing value was properly preserved (without causing any data spill).