Records Retention & Management

The University of Alaska Fairbanks maintains a wide variety of records in both paper and electronic forms. These records are essential to the mission of UAF and must be created, maintained and destroyed according to the policies established by the UA Board of Regents. These policies and regulations are available on the UA Records and Information Management (RIM) website.

Not all documents received, utilized or distributed by UAF are considered university records. Most records considered official university records are listed on the Retention and Disposition Schedules distributed by UA RIM. The schedules outline the types of documents considered university records along with the overall life cycle for each. Retention schedules are available for several functional areas including

  • Admissions & Registration
  • Finance
  • Financial Aid
  • Human Resources

University records are part of the overall Information Management (IM) process at UAF. In the IM life cycle (as shown in this info graphic), attention is paid to tracking and taking care of document records during the time of creation or reception by UAF, usage to support the UAF mission, storage and destruction (if appropriate).

UA uses the OnBase Enterprise Content Management (ECM) System from Hyland Software as the official repository for all UAF records along with many other UAF documents that need tracking and maintaining. Each UAF functional area (HR, Finance, Student Services, etc.) uses OnBase for at least some of their records. There are also ongoing projects to increase the types of document records migrated to the OnBase system.

In areas where OnBase is not used, take care throughout the IM process to ensure the handling of documents meets UA requirements for the confidentiality, integrity and availability of those documents. Visit the UA RIM website for more information.

Please contact the UAF OnBase Administrator to discuss using OnBase to help maintain department documents and records.

Access Method

There are several ways to access OnBase. Please use the descriptions below to determine the method that will best meet your needs.

  1. Unity Client - Our recommended client for Windows users. It is installed separately for each user on a Windows system and does not need administrator privileges to install.
    Unity looks and behaves much like other Office applications and should have better performance for users on slower network connections.
  2. Web (Thin) Client - A web application usable on Macintosh and Windows systems. It supports several current browsers including IE, Edge, Chrome, Firefox and Safari. We recommend the web client if occasionally looking up documents in OnBase and do not need to do much importing or workflow.
    Note: You may need to change the Safari User-Agent on newer OS X versions. Contact the UAF OnBase Administrator if you need help with this.
  3. OnBase (Thick) Client - For power users on Windows who do a lot of batch processing or auto-indexing. We do not recommend the install/use of Thick Client when working remotely.
    Most UAF users should use either Unity or Web. If neither of these meet your needs, please contact the UAF OnBase Administrator for further information regarding Thick Client use (installed on request).

Visit the OnBase Landing Page to access the Web Client or install the Unity Client. You must use either Internet Explorer or a current version of Edge to install the Unity Client. No other browser will work for this type of installation.


Access Approval

Access to functional areas in OnBase is granted upon the request of the appropriate security coordinator. Normally, the procedure is for the coordinator to go to the OIT Service Catalog and click on the "OnBase Access Request" button. This will bring up a page that lists all of the combinations of permission groups. There is an OnBase Security Group Help Page available. While we cannot take applications from users for their own access, supervisors are welcome to request access for their employees. Some accesses require validating the request with a coordinator before granting access.

UAF Security Coordinators as of 25 January 2017
Functional Area Security Coordinator Email (+ @alaska.edu) Notes
 Student Services  Mary Buchanan  mkbuchanan  
 Student Services  Mike Earnest  wmearnest  UAF Type 1 Approver   
 Student Services  Lisa Foster  ldfoster  
 Student Services  Donavan Kienenberger uaf-registrar-access-request  
 Finance/HR  Belinda Norris brnorris  
 Finance/HR  Lynn Wrightsman  lawrightsman  UAF Type 1 Approver   
 Finance/AR  Amanda Wall  aiwall  
 Financial Aid  Deanna Dieringer  dldieringer  
 OnBase  Derek Bastille  dlbastille  UAF Level 1 Approver  

 

It is important to note that UAF does not normally keep records indefinitely. Every document has a defined life cycle and is eventually eligible for destruction. Documents under audit or otherwise subject to legal review are not destroyed until such time as the review or audit is completed and the document is at the end of its life cycle.


There are many different ways to destroy documents. It is important to track when, how and by whom this destruction was accomplished. Tracking for UAF documents is done with the Certificate of Destruction (COD) and (if needed) COD Continuation Sheets. The COD forms are intended for use as collections of documents are destroyed. It is up to each department to determine what defines a "collection" of documents and how these collections are tracked.  Some departments will track individual personnel folders while others might have a shared volume that has scanned receipts in it and all receipts are purged monthly. Your department should document what constitutes a collection for the records it maintains.  

Even though the department has copies of records, it might not be the home for those records. For example, grant documentation belongs to OGCA. The official copies are maintained by OGCA even if a PI has a copy of their own grant documentation. Copies of records given to departments for reference do not need to be included in the COD. Only the official copies are required on the COD. 


Departments that have records requiring tracking on a COD should keep a running copy of that COD and fill it in as collections are destroyed. Enter the following information each time:

  • The date a collection was destroyed
  • The type(s) of records in the collection
  • How the collection was destroyed
  • Any identification (UAID, series #, month, etc) for the collection destroyed
  • The initials of the person doing the destruction

At the end of the fiscal year, the designated records person at the department should sign and date any completed or in-progress CODs and then file them for future review.