Electronic Public Record What is it, and Where Can Agency Lawyers Find It?

Slides:



Advertisements
Similar presentations
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Advertisements

Electronic Evidence Joe Kashi. Todays Program Types of Electronically stored information Types of Electronically stored information Accessibility and.
Basic Computer Vocabulary
CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
HIPAA Security.
Chapter 1:Introduction to the world of computers
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
ClearCube Data Failover 3.0 Overview and Demonstration Rev
MANAGING YOUR BUSINESS JUST GOT EASIER WITH.... A WORKFLOW AND DOCUMENT MANAGEMENT SOFTWARE.
Computer Basics I Course Outline 1: What is a computer? 2: What is an operating system? Using a Desktop Computer 3: What are the basic parts of a desktop.
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
Electronic Records Management Kevin Callaghan, Director Division of Records Management Tre Hargett, Secretary of State.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
1 ELECTRONIC DATA & DISCRIMINATION INVESTIGATIONS Peter J. Constantine U.S. Department of Labor Office of the Solicitor.
LBSC 708X The Record Nature of Electronic Records College of Information Studies.
Developing a Records & Information Retention & Disposition Program:
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
Preservasi Informasi Digital.  It will never happen here!  Common Causes of Loss of Data  Accidental Erasure (delete, power, backup)  Viruses and.
Back Up and Recovery Sue Kayton February 2013.
Hardware of Personal Computers
Introduction to Computers Section 1A. home Definition of a Computer A computer is an electronic device used to process data, converting the data into.
College Collaboration System User Office Desktop USC Mail Server College Mail Server User Home Desktop Net USC College.
New Data Regulation Law 201 CMR TJX Video.
1.00 Describe the purpose, components, and use of a computer system.
November 2009 Network Disaster Recovery October 2014.
IMonitor Software About IMonitorSoft Since the year of 2002, coming with EAM Security Series born, IMonitor Security Company stepped into the field of.
Avoiding the Iceberg Sean Regan October 2008.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
Bellringer Do you think students should study computers? Why or why not?
The Office Procedures and Technology
Records Management: It’s Not Just Paper
Policies and Procedures Deb Bartlett Joy Faerber Office of Procedures, Records, and Forms Revised May 2015.
Essential Computer Concepts
Secondary Storage Chapter 7.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
BASIC COMPUTER CONCEPTS What is a computer? An electronic device, operating under the control of instructions stored in its own memory unit, that can.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
THE CVR NETWORK. The CVR Local Area Network (LAN)  The purpose of the network is to enhance productivity, provide users with access to resources, and.
Administrative Policies and Procedures Deb Bartlett Joy Faerber Office of Procedures, Records, and Forms.
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
Preventing Common Causes of loss. Common Causes of Loss of Data Accidental Erasure – close a file and don’t save it, – write over the original file when.
Rewriting the Law in the Digital Age
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
A Document Management Solution Joe Axne IT-GURU LLC
IPortal Bringing your company and your business partners together through customized WEB-based portal software. SanSueB Software Presents iPortal.
Computer Basics & Keyboarding. What Is A Computer? An electronic device operating under the control of instructions stored in its own memory unit An electronic.
Computer Systems Mrs. Butera. Computer Systems Hardware Software.
Digital Government Summit
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
Record Retention to Manage Risk F. Jay Meyer Vice President & Senior Attorney TD Banknorth, N.A. Portland, Maine.
CAIU Technology Essentials All Staff Day, 2016 Instructor: Stefan Moyer.
By Jason Swoyer.  Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums.  Computer.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
Records Management Reality
KEEPS – a system for UELMA preservation and security
Wright State University
Peer 2 Peer & Client Server
Section 2 terms -Savannah Gray.
TYPES OF SERVER. TYPES OF SERVER What is a server.
Back Up and Recovery Sue Kayton October 2015.
Presentation transcript:

Electronic Public Record What is it, and Where Can Agency Lawyers Find It?

What and Where Form, media and formats of the electronic record Location and control

What: Form, Media and Formats of Electronic Record Any and all forms of electronic records created or received by Commonwealth employees, contractors and agents.

What: Examples – s and their attachments – Web pages, old and new – System data (data in the IT system) – System data (data about the system) – Word processed documents

What: Examples – Electronic calendars and to do lists generated by MS Outlook and other desktop software – Videos – Floppy disks – CDs

What: Examples – Audiotape – Microfilm/Fiche – Data storage Tapes – The once and future Forms, Media and Formats

Where: Form, Media and Formats of Electronic Public Record Electronic spreadsheets Voic Deleted material still stored on backup tapes

Where: Form, Media and Formats of Electronic Public Record Records associated with systems – User documentation – Technical documentation – Web site logs (except for security logs) – Information routing and tracking – Maintenance, monitoring, and testing – Security

What: RIC 04/04 See list of documents in RIC 04/04, Section F, Information and Records Management. Go to dx.htm, click on “Statewide Records Retention Schedule 04/04 Has Been Approved..” dx.htm

What: Form, Media and Formats, (cont.) – Development – Conversion, enhancement and upgrade – Data deletion – Job runs – Audit trails – Event logs and – Backup

Where: Location and Control The “copy” problem: – Most electronic records are easily copied – Many are used in contexts in which they are automatically copied: (example: , text messages). – It is highly likely that there is more than one copy of every electronic record in the Commonwealth’s possession.

Where: Location and Control? The Commonwealth’s Electronic Records are Widely Disbursed on state and privately owned systems and hardware

Where Individual employee or contractor: – Hard drive of PC or laptop Central office, remote location, or home for telecommuters – CDs in any location where employee/contractor works – Diskettes in any location where employee/contractor works – Files stored on individual or network drives – PDAs Cell phones (text messages) Blackberry devices Palm Pilots

Where? Location and Control Your CIO or Systems Administrator, Backup tapes – System output – System-related documents – Local area network shared and restricted drives – Remnants: Currently unused equipment containing data Example: Governor Swift’s server

Where? Location and Control Centrically administered systems – HRCMS – NewMMARS – MMIS/NewMMIS – MassMail – Virtual Law Office

Where? Third Party Data Holders ITD: MITC Chelsea Another part of your agency Commercial data center host (Genuity, CSC) Long term storage – State archives (no digital archive yet) Disaster Recovery Contractor – Tapes shipped out periodically for storage

Where? Rules re: Third Party Data Holders Web site or application host: Agency responding to PRR must make the request themselves to the third party, not make the requestor do so. SPR 3-96.

How to Begin Step 1: Freeze the Documents. – Contact key document holders (employees, contractors, agents, CIO, third party data hosts) informing them of the request and requiring them to cease deleting responsive documents Interview your CIO, Systems Administrators and Third Party Data Holders

How to Begin Step 2: Research The Information Architecture of your Agency The electronic storage methods used by your agency Disaster Recovery procedures Backup procedures Orphan systems from the past that still hold agency data

How to Begin Rule 3: Work Closely with Your CIO – He knows the technology – You will have to help him with the scope of the request – Ask him questions about the list of documents that may be involved; he won’t necessarily point out the obscure ones to you.

How to Begin Rule 4: Draft a Discovery Plan and Follow It – The plan: a roadmap for making a good faith effort to locate and copy electronic documents responsive to the public records request – Plan should include tracking cost of labor involved in searching for electronic documents and cost of media used to make copies (CD ROM, etc.)

How to Begin Rule 5 Collect Documents based on your plan

How to Begin SPR 3-96: Some costs can be recouped, some cannot. Track costs for: – Search – Media on which record is copied – But not segregation – Media on which record is copied.

How to Begin Sources of Help: – Public Records Law Practice Group – Techlaw Practice Group – ITD’s General Counsel

Linda Hamel General Counsel ITD (617)