Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.

Slides:



Advertisements
Similar presentations
Saving Your Documents Can Save You Anne D. Harman, Esq. Bethany B. Swaton, Esq. Dinsmore & Shohl LLP 2100 Market Street, Wheeling (304)
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Information & Compliance UL University of Limerick & UL employees obliged to comply with certain legislation, including: Freedom of Information.
E-Discovery New Rules of Civil Procedure Presented by Lucy Isaki January 23, 2007.
Guide to Massachusetts Data Privacy Laws & Steps you can take towards Compliance.
E-Discovery LIMITS ON E-DISCOVERY. No New Preservation Rule When does duty to preserve attach? Reasonably anticipated litigation. Audio sanctions.
MINNESOTA GOVERNMENT DATA PRACTICES ACT How the law affects University employees and recordkeeping Susan McKinney Records & Information Management.
1 ELECTRONIC DATA & DISCRIMINATION INVESTIGATIONS Peter J. Constantine U.S. Department of Labor Office of the Solicitor.
Developing a Records & Information Retention & Disposition Program:
1 E-Discovery Changes to Federal Rules of Civil Procedure Concerning Discovery of Electronically Stored Information (ESI) Effective Date: 12/01/2006 October,
1 FERPA and Student Privacy in Records of University Research ECURE March 1, 2005 Richard Rainsberger, Ph.D. Consultant, Education Records Law and Privacy.
1 From Filing Cabinet to Desktop and Network: Records Management in N.C. State Government Ed Southern Government Records Branch N.C. Office of Archives.
Record management Responsibilities for departing senior officials
RECORDS MANAGEMENT City of Oregon City “ That was then… this is now!”
ICPL Institute for Computer Policy & Law H. David Lambert Vice President for Information Services and Chief Information Officer Georgetown University e-Discovery:
What Will My Records Retention Schedule Look Like ?
Collecting and Preserving Records of A&I Occupants Presented by Tammy Peters Smithsonian Institution Archives Records Management Team February/March 2005.
New Data Regulation Law 201 CMR TJX Video.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Grant S. Cowan Information Management & eDiscovery Practice Group.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Employee Privacy & Monitoring Technologies November 16, 2006 TBTLA Andy Swenson Len Chiacchia Chris Favaloro Mark Wright.
Records Management Overview. Why? It’s the Law It’s the Law It’s University Policy It’s University Policy Fiscal and Legal Compliance Fiscal and Legal.
Electronic Public Record What is it, and Where Can Agency Lawyers Find It?
Electronic Communications State Owned System Mandates Presented by: Eileen Goldgeier.
Essential Computer Concepts
Do you Know Where your Data is? Gregory P. Silberman, CISSP Technology Intellectual Property & Outsourcing Group Kaye Scholer LLP May 10, 2005.
Electronic Records Management: What Management Needs to Know May 2009.
Archiving Records Offsite Using the State Records Center (SRC)
Security and Privacy Strategic Global Partners, LLC.
Copyright© 2010 WeComply, Inc. All rights reserved. 9/19/2015 Record Management.
The Sedona Principles 1-7
Visual Evidence / E-Discovery LLC Visual Evidence / E-Discovery LLC 60th Annual Meeting of the Ohio Regional Association of Law Libraries E-Discovery &
MANAGING PUBLIC WWU: Tony Kurtz WWU Archives & Records Center x3124.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Part 6 – Special Legal Rights and Relationships Chapter 35 – Privacy Law Prepared by Michael Bozzo, Mohawk College © 2015 McGraw-Hill Ryerson Limited 34-1.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Drowning in a Sea of Paper Document Archiving With Technology Presented by Arthur J. Staerk AccuScan
Records Management Is Not an Option Anymore
Against: The Liberal Definition and use of Litigation Holds Team 9.
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
ITCC / IT Retreat Data Access Procedure December 10, 2009 Karl F. Lutzen Information Security Officer.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Surveying and Scheduling Records of OCIO Presented by Jennifer Wright Smithsonian Institution Archives Records Management Team February 16, 2005.
Surveying and Scheduling Records of SCEMS Presented by Ginger Yowell & Mitch Toda Smithsonian Institution Archives Records Management Team October 2, 2007.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
CITY OF PHOENIX RECORDS MANAGEMENT AND E-PRIVACY Margie Pleggenkuhle City Clerk Department March 18, 2004.
Records Management and You!. Your responsibilities as a Government of Canada employee.
Information Technology Acceptable Use An Overview CSTMC All Staff Meeting February 10, 2014.
Ron Enger Southern Oregon Educational Service District Medford, Oregon Cliff Ehlinger Grant Wood Area Education Agency Cedar Rapids, Iowa December, 2006.
Electronic Records Management Alan Cameron Records Management Consultant.
Welcome! The Topic For Today Is…. Sample CRM Questions The RM Program & Management Principles Records Creation & Use Records Systems, Storage, & Retrieval.
Records Management Reality
UW-Madison Guidelines for Managing the Records of Departing Employees*
Leveraging the Data Map – A Case Study November 15, 2016
Controlling Computer-Based Information Systems, Part II
Red Flags Rule An Introduction County College of Morris
What is a "Public Record" under the Local Records Act?
Health Care: Privacy in a Digital Age
The Office Procedures and Technology
Government Data Practices & Open Meeting Law Overview
Good Spirit School Division
Government Data Practices & Open Meeting Law Overview
Presentation transcript:

Dangerous Documents

Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain records for specified periods of time

It’s Not Just Paper Anymore Approximately 30% of all data make it to paper Most all documents are computer-based Information is being stored digitally CD = 700 MB = 5 boxes of paper Hard drive = 30 GB = 214 boxes of paper Multiple copies and variations exist in multiple locations

Where are dangerous documents found? Mainfram Server ( )File server Computer hard drive Disks, CD ROMs, DVDs, Zip drives, etc. Tape backups, including offsite storage Cell phonesPalm pilotsBlackberry Voice mailVirtual Workrooms (bulletin boards, chat rooms) Digital cameras

MS Word – A Dangerous Document? Embedded information in documents Comments Redlines Metadata Data, filename, file type, author Drafts Keep only the final copy Destroy draft versions

Who has these dangerous documents? Sources Internal External Internet People Employees Consultants Clients Experts Suppliers

Electronic dangers Viruses and Trojans Increased use of in litigation Instant Messaging (IM) can allow users to “go under the radar” if IT does not track Spyware can be deployed on user’s computer w/o their knowledge to track people’s computer movements

Sarbanes Oxley Act (Jan 2002) Purpose: to assure accountability and accurate reporting of financial data and significant events Requires internal controls and information management Must document to demonstrate compliance

Document Retention Prevent violations of state & federal laws Provide standard procedures Protect organization during litigation, investigations & audits Reduce costs of discovery Protect officers & directors from liability Preserve organization’s reputation

Company Retention Policy Must be reasonable & not in bad faith Must cover… Responsible individual(s) Procedure for storing, indexing & destroying documents Identify documents (consistently not selectively) Identify physical location of paper & media Indicate retention schedule

Acceptable Use of Policies Legitimate business purpose No reasonable expectation of privacy Inform employees that institution retains the right to review s & web browsing activities

HR Issue Documents contain social security numbers Identity theft Electronically collected information must be secured As it is collected & stored

Sources Guide, Advise, Protect Brian H. Nelson, Esq. (Edwards & Angell) Hidden Liabilities: What is Lurking in Your Files Elizabeth Bates (Consultrex USA) Controlled & Uncontrolled Records: Management & Discovery David Whetmore (Ernst & Young)