EMail Management ’06 : Best Practice & Compliance in the Public Sector Controlling the Inbox Dr Keith Nicholson Alfred McAlpine Business Services Information.

Slides:



Advertisements
Similar presentations
Records Management and the NHS Code of Practice (Foundation) Information Governance Policy Team NHS Connecting for Health.
Advertisements

Corporate Records Management (Practitioner) Information Governance Policy Team NHS Connecting for Health.
Health Records Management Practitioner
CREATING CHILD SAFE ENVIRONMENTS IN SPORT A national approach to defining, developing and implementing child safe environments throughout an organisation.
Improving outcomes for older people: Monitoring and regulating standards Ann Close 8 th June 2011.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Turning Policy Into Reality Tony S Krzyżewski Director, Chief Technical Officer Protocol Policy Systems.
Enterprise CAL Overview. Different Types of CALs Standard CAL base A component Standard CAL is a base CAL that provides access rights to basic features.
11© 2011 Hitachi Data Systems. All rights reserved. HITACHI DATA DISCOVERY FOR MICROSOFT® SHAREPOINT ® SOLUTION SCALING YOUR SHAREPOINT ENVIRONMENT PRESENTER.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
E-business Infrastructure
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
ELECTRONIC MEDICAL RECORDS By Group 5 members: Kinal Patel David A. Ronca Tolulope Oke.
Business Continuity Check List PageOne. - Why Does Your Business Need A Continuity Checklist? Should the unexpected occur, your business will be able.
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Human Resources. To understand what are meant by effective communication and feedback Analyse the advantages and disadvantages of different communication.
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Control environment and control activities. Day II Session III and IV.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
New Data Regulation Law 201 CMR TJX Video.
Communication. Contents Methods Motivation and communication Effective communication Barriers to effective communication How to improve communication.
SRA Enabling Programme SRA Board Meeting – Public Session Carey Street, London 26 th February 2009.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
RULES OF ENGAGEMENT Engage if client expresses an interest in data preservation Engage if the client is experiencing one or more “pains” (see “customer.
Dell Connected Security Solutions Simplify & unify.
Data Protection, Freedom of Information and Information/Records Management.
The way Archiving should be!.  Many organisations have either no archiving policy or is severely fragmented.  Archiving is considered as just another.
BRING YOUR OWN DEVICE. BYOD AND THE IMPACT ON IT SECURITY BYOD and pressure employees put on IT organization to supply or allow consumer mobility devices.
Management How hard can it be? Mark Rogers, Enterprise Architecture Team, IP Australia
CLOUD COMPUTING Internet And Online Community Week 6.
fact sheet (07/03/2007) 1 ARE ARCHIVING SOLUTIONS RECORDKEEPING SOLUTIONS? 7 th March 2007 Stephen Clarke Government Recordkeeping Programme.
V 1.0 May 16,2011 Audience: Staff Outlook Agent For the latest version of this document please go to:
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Software Project Management
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
SPAM Settings. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from the.
Efficiency and Compliance Voice Documentation for Financial Services.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Whitelist Management. The ExchangeDefender Admin Site is a powerful tool that gives you access to all of the benefits ExchangeDefender has to offer, from.
Module 7 Planning and Deploying Messaging Compliance.
Integration of General Practice in Health services Doris Young Professor of General Practice.
Implementing an Effective Global Anti-Bribery Program Implementing an Effective Global Anti-Bribery Program Elaine Murphy, MBA Director Health Care Compliance.
1 Records Management Organization The Committee provides guidance on operating the company’s records management program.
805- Introduction to Management Chapter 4: The internal environment Page 38.
S3: Understanding the Business. Session objective To explain why understanding of the business of the entity is important for the auditor To explain why.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
The Claromentis Digital Workplace An Introduction
DATA MANAGEMENT AND IT IN BA/BE STUDIES DR. SHIVPRAKASH MANAGING DIRECTOR SYNCHRON RESEARCH SERVICES PVT. LTD., INDIA.
INTRODUCTION  netCORE offers 360 degree digital communication solutions Messaging and Mobility  Pioneers in Linux based mailing solution and catering.
What ICT specialists need to know about information and records Christine Johnston.
ValGenesis Closed Loop Change Management ValGenesis, Inc Christy Street, Fremont, CA Ph:
Moving to BYOD Gary Audin 1.
Welcome Esuring Your File Sharing Solution is Secure and Compliant Hosts: Josh Bopp Rebekah Stevens Paisley Coxsey President Account Manager Relationship.
- Company Confidential - Corporate Overview March 2015.
CLOUD VIRTUALIZATION MLArchiver for vCloud Air Archiving | eDiscovery | Records Management | Analytics Stephen Catanzano August.
or M Alan Cameron Records Management Consultant JiscinfoNet.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XI)
Records Management with MOSS, K2, & PsiGen Deepa Patadia
Data Protection Regulation
What Does GDPR mean for you
92% of the world’s data was created in the past 2 years
Records Management New policies and procedures
General Data Protection Regulation
Presentation transcript:

Management ’06 : Best Practice & Compliance in the Public Sector Controlling the Inbox Dr Keith Nicholson Alfred McAlpine Business Services Information Systems

Management ’06 : Best Practice & Compliance in the Public Sector Challenges Overwhelming volumes Overuse destroying effectiveness of Negative impacts on staff productivity Negative impacts on staff morale / health 10% companies experienced abuse by staff Compliance issues yet over 90% of organisations provide little/no training in management

Management ’06 : Best Practice & Compliance in the Public Sector PEOPLE POLICIES TECHNOLOGY 360  © Keith Nicholson 2006

Management ’06 : Best Practice & Compliance in the Public Sector Inbox Control : Reclaiming the desktop Organise & filter s Mute audible alert Set specific times to respond to s Enable spam filtering Housekeeping & archiving routine Technology + Behaviour + Policies

Management ’06 : Best Practice & Compliance in the Public Sector Behavioural Changes Use “Reply to All” appropriately Do not “CC” widely is CONTENT – write appropriately Exploit the strengths of Use alternative channels to eg. SharePoint Talk – verbal briefings most effective Allows effective Q&A Quicker, easier explanations Team dynamic

Management ’06 : Best Practice & Compliance in the Public Sector e.g. SharePoint

Management ’06 : Best Practice & Compliance in the Public Sector The 3 Steps to Success 1. 1.Good Practice – in writing and managing s; using alternative solutions Enforced Policies – ensuring effective lifecycle management Effective Technology – in screening, securing and storing s. © Keith Nicholson 2005

Management ’06 : Best Practice & Compliance in the Public Sector Acceptable use, content, disclaimers Audit & Monitoring, Privacy Enforcement Segregation of roles and responsibilities Storage, Archiving, Retention and Deletion Access control, DR, BC Encryption, mobile, remote communication Staff induction & training Policies

Management ’06 : Best Practice & Compliance in the Public Sector Policies – Key issues s are organisational information Manage as formal documents/records Apply information lifecycle management policy – including destruction and archiving The system (Inbox) is not a storage facility Use strengths – recognise weaknesses Use alternatives to

Management ’06 : Best Practice & Compliance in the Public Sector Business Benefits Improved systems management Adoption of alternatives to Improved productivity Compliance across multiple regulations Addresses common problem areas of risk as content – attitude change

Management ’06 : Best Practice & Compliance in the Public Sector Supporting Paper Business Card Complete Request List Send your request to: PLC.com