CFTC 1.31(b) Compliance Assessment

Size: px
Start display at page:

Download "CFTC 1.31(b) Compliance Assessment"

Transcription

1 CFTC 1.31(b) Compliance Assessment Prepared by Cohasset Associates, Inc. Abstract Cohasset Associates, Inc. (Cohasset) prepared this technical report to provide an objective compliance assessment of the capabilities of the EMC Data Domain Retention Lock Compliance edition relative to the requirements and conditions of Commodity Futures Trading Commission ( CFTC or Commission ) Rule 1.31(b) (the Rule ). Cohasset s conclusion is that the EMC Data Domain Retention Lock Compliance edition, when installed, configured, and enabled on the EMC Data Domain system, meets the four storage-related requirements of CFTC Rule 1.31(b) addressed in this report. In summary, during the CFTC required retention period, it: Protects the records from being overwritten or erased for the required retention period through integrated records management controls and security protection; Provides for the initial and ongoing accuracy and quality of the records, as recorded, stored and retrieved; Cohasset Associates 7825 Washington Ave. South Suite 500 Minneapolis, MN Identifies each record and duplicate copy with a unique file name and date/time stamp; and Creates a duplicate copy of the record, which may be stored at a separate location and used for recovery, should the primary record be compromised May 2013 Guiding the Way to Successful Records & Information Management

2 Table of Contents 1. Introduction Electronic Storage Requirements of the CFTC Rule EMC Data Domain Retention Lock Compliance Edition Overview Assessment and Technical Report Compliance Assessment with SEC Rule 17a-4(f) Structure and Organization of Cohasset s Assessment Non-rewriteable, Non-erasable Format Verifies Automatically the Quality and Accuracy of the Recording Process Serializes the Original and Duplicate Units of Storage Media Store Separately a Duplicate Copy Conclusions...17 End Notes...18 About Cohasset Associates, Inc Table of Contents 2

3 1. Introduction This section sets the context for this technical assessment, which has been divided into two parts: Identification of the CFTC s regulatory foundation (as set forth in Rule 1.31(b)) for allowing digital records to be retained on electronic storage media and systems, and An introductory description of the storage system that is the subject of Cohasset s assessment against the above referenced CFTC electronic storage media and system regulation. 1.1 Electronic Storage Requirements of the CFTC Rule 1.31 On June 5, 1998, the Commission published a Federal Register Notice (63 FR 30668) proposing several amendments to the recordkeeping requirements of Commission Regulation 1.31, which would authorize a more generic, performance-based approach to the definition of permissible record storage technology, including both micrographic media and electronic storage media. In light of the significant number of Commission registrants that also are subject to the recordkeeping requirements of the Securities and Exchange Commission ( SEC ), the proposed amendments included many provisions similar to those adopted by the SEC in The Commission s final rule change for Regulation 1.31 was published in the Federal Register on May 27, 1999 and became effective on June 28, This Rule clearly states that entities under the regulatory jurisdiction of the CFTC are allowed to retain records on an electronic storage media or system subject to the requirements and conditions of the Rule. The following are relevant parts of the final regulation as published in the Federal Register: SUMMARY: The Commodity Futures Trading Commission is adopting amendments to the recordkeeping obligations established in Regulation Specifically, the amendments will allow recordkeepers to store most categories of required records on either micrographic or electronic storage media for the full five-year maintenance period, thereby harmonizing procedures for those firms regulated by both the Commission and the Securities and Exchange Commission. Introduction 3

4 Recordkeepers will have the flexibility necessary to maximize the cost reduction and time savings available from improved storage technology while continuing to provide Commission auditors and investigators with timely access to a reliable system of records. The Commission recognizes the important role improved technology can play in the continued development of the futures industry. Minimizing unnecessary regulatory obstacles to the adoption of improved technology is a goal of industry members, customers, and the Commission. Indeed, the pace of technological changes will require the Commission continually to review the standards articulated in this rule to ensure that the recordkeeping requirements reflect to the extent possible the reality of established technological innovation Books and records, keeping and inspection. * * * * * (b) Except as provided in paragraph (d) of this section, immediate reproductions on either micrographic media (as defined in paragraph (b)(1)(i) of this section) or electronic storage media (as defined in paragraph (b)(1)(ii) this section) may be kept in that form for the required time period under the conditions set forth in this paragraph (b). * * * * * (b)(1)(ii) The term electronic storage media means any digital storage medium or system that.... The detailed requirements of CFTC Rule 1.31(b) are very similar to, and in some cases essentially identical to, certain storage system related requirements as defined in SEC Rule 17a-4(f), including the requirement to Preserve the records exclusively in a non-rewritable, non-erasable format. Upon issuing the final Rule the Commission stated: In view of the significant number of firms subject to regulation under both the federal commodity and securities laws, the final regulations recognize the value of maintaining consistency, where possible, between the Commission s approach to recordkeeping and that of the SEC. The regulations do not reflect strict conformity with the regulations the SEC adopted in 1997, however, because the Commission concluded that there were significant differences between the commodities and securities industry that justified retaining certain of its current rules. Since issuing the Final Rule, the CFTC has not published any broad interpretation 1 or update. Introduction 4

5 On May 7, 2003, the SEC promulgated an Interpretive Release (No , Electronic Storage of Broker-Dealer Records) clarifying its requirements for the retention of records and explicitly allowing the use of erasable and rewriteable media, such as magnetic tape or magnetic disk, if control codes are employed as an integral part of such storage media and systems to ensure that records are protected from erasure or overwrite for the required retention period. Specifically, the 2003 SEC Interpretive Release states: A broker-dealer would not violate the requirement in paragraph (f)(2)(ii)(a) of the rule if it used an electronic storage system that prevents the overwriting, erasing or otherwise altering of a record during its required retention period through the use of integrated hardware and software control codes. To determine whether or not the SEC s interpretive release, including authorized use of erasable and rewritable media, may be applicable to the recordkeeping requirements of the CFTC, Cohasset reviewed the information published in the Federal Register for the CFTC s adoption of the amendments to the recordkeeping obligations established in Rule 1.3 in The following statements were incorporated in the Supplementary Information related to changes of the Rule: III. FINAL RULES F. Other Issues 5. Adjusting Requirements in Response to Technological Change The Commission has adequate tools to address short-term inefficiencies in the regulatory process. On several occasions during the past two years, the Commission has provided interim relief from the current requirements of Rule 1.31 to Commission registrants using advanced technology (44). In footnote (44), the Commission states: The Commission has permitted these registrants to substitute compliance with the SEC s recordkeeping requirements for compliance with the current requirements of Rule This footnote describes the CFTC s willingness to rely, where appropriate, on the SEC s rules and its history of granting permission to substitute compliance with the SEC s recordkeeping requirements for compliance with the requirements of Rule This suggests that it is reasonable to conclude that the CFTC would accept compliance with the SEC 2003 Interpretive Release to act as a complement to the Commission s rulemaking related to Rule 1.31(b). Introduction 5

6 As added credence to the acceptability of electronic storage media and systems that utilize integrated controls, but do not equate to a specific form of media, the following is stated in the Supplementary Information in the Federal Register for the CFTC s adoption of the amendments to Rule 1.3: II. NATURE OF THE PROPOSAL B. Proposed Rules Moreover, the Proposal gave recordkeepers increased flexibility in selecting the advanced technology best suited to their business requirements by substituting the less restrictive category electronic storage media for optical disk in describing the storage media recordkeepers could employ (7). As a result, recordkeepers may now take advantage of electronic storage technologies such as digital tape (8). In Footnote (8) the Commission clarifies that: The Proposal did not require Commission approval of plans to convert to a system that maintains records on electronic storage media. Recordkeepers, however, must submit a representation to the Commission that the selected electronic storage system meets the four generic requirements. As described in B. Proposed Rules (above), the Commission gives recordkeepers broader flexibility in selecting the electronic storage media or system and identifies a digital media, i.e., digital tape as an example, at that point in time, of a potentially acceptable technology. As expressed by Footnote (8) and paragraph (c) of Rule 1.31 (which follows), the registrant must provide a representation to the Commission prior to its initial use of an electronic storage media or system. When making this required representation to the Commission regarding the intent to use an electronic storage media or system, the registrant need only state when a storage media or system other than optical disk or CD-ROM technology is being used. There is no pre-deployment waiting period if non-optical media is used, such as that required by the SEC. 2 Specifically, paragraph (c) of Rule 1.31 states: Persons employing an electronic storage system shall provide a representation to the Commission prior to the initial use of the system. The representation shall be made by the person required to maintain the records, the storage system vendor, or another third party with appropriate expertise and shall state that the selected electronic storage system meets the requirements set forth in paragraph (b)(1)(ii) of this section. Persons employing an electronic storage system using media other than optical disk or CD-ROM technology shall so state. The representation shall be accompanied by the type of oath or affirmation described in 1.10(d)(4). Introduction 6

7 Cohasset believes that, based on these associated statements, the CFTC Rule manifests a similar, if not greater, level of comfort as the SEC (in its 2003 Interpretive Release) regarding the storage, retention and protection of records using all types of electronic storage technology as long as the technology meets the requirements and conditions of the Rule. The Rule also documents the CFTC s recognition that registrants would benefit from the use of evolving storage media and technology: The CFTC... recognizes the important role improved technology can play in the continued development of the futures industry. Minimizing unnecessary regulatory obstacles to the adoption of improved technology is a goal of industry members, customers, and the Commission. It is therefore Cohasset s belief that the CFTC would interpret the use of advances in digital storage media and systems technology (such as erasable magnetic storage using the integrated controls stipulated in the 2003 SEC Interpretive Release) as being compatible with the Commission s vision and intentions for Rule 1.31(b). 1.2 EMC Data Domain Retention Lock Compliance Edition Overview EMC offers EMC Data Domain Retention Lock software that can be applied to any Data Domain MTree (a logical volume in a virtual file system). When an MTree is enabled to support DD Retention Lock, a retention period can be set for individual record files that prevent the record file from being erased or overwritten before the retention period has expired. The DD Retention Lock software capability can be configured for only one of two possible retention management environments: Compliance Environment designed to meet the requirements of SEC Rule 17a-4(f), and thereby meet the requirements of CFTC Rule 1.31(b), and Governance Environment where certain administrative functions can be performed that are not CFTC-compliant. This assessment report focuses only on the Compliance edition of DD Retention Lock software. 1.3 Assessment and Technical Report To obtain an independent and objective assessment of the EMC Data Domain Retention Lock Compliance edition ( DD Retention Lock Compliance ) capabilities relative to meeting the requirements set forth in CFTC Rule 1.31(b), EMC ( EMC ) engaged Cohasset Associates, Inc. ( Cohasset ), a highly respected consulting firm with specific knowledge, recognized expertise, and Introduction 7

8 more than 40 years of experience regarding the legal, technical, and operational issues associated with the records management practices of registrants regulated by the CFTC. Additional information about Cohasset Associates is provided at the end of this report. Cohasset s assignment was to: Assess the ability of DD Retention Lock Compliance capabilities to meet the requirements of all the relevant conditions of CFTC Rule 1.31(b), and Prepare this technical report regarding that assessment. This assessment represents the professional opinion of Cohasset Associates and should not be construed as an endorsement or rejection by Cohasset of the DD Retention Lock Compliance and its capabilities or other EMC products. To conduct its assessment, Cohasset utilized four types of information provided by EMC relating to EMC Data Domain Retention Lock Compliance edition: 1) oral discussions, 2) system requirements documents, 3) user and administration guides, and 4) other directly related materials. This assessment covers only the four requirements stated in CFTC Rule 1.31(b) that relate directly to electronic storage media or system and the associated recording and retention management of regulated record files. Each registrant utilizing an electronic storage system must ensure that a combination of procedures, controls and client application capabilities (operating in conjunction with the storage management capabilities addressed in this assessment) meet all of the requirements of the Rule. The content and conclusions of this assessment are not intended and should not be construed as legal advice. Relevant laws and regulations are constantly evolving and legal advice must be tailored to the specific circumstances of the laws and regulations for each organization. Therefore, nothing stated herein should be substituted for the advice of competent legal counsel. Introduction 8

9 2. Compliance Assessment with SEC Rule 17a-4(f) This section presents Cohasset s assessment of the capabilities of the EMC Data Domain Retention Lock Compliance edition relative to meeting the requirements of the Rule that pertain to or are supported by the storage media or system. 2.1 Structure and Organization of Cohasset s Assessment Each assessment of the four relevant requirements of CFTC Rule 1.31(b) addressed in this report is structured into four parts: Compliance Requirement A citation and discussion of the requirement of the Rule that relates to the utilization of electronic storage media or systems; Compliance Assessment Cohasset s assessment of the degree to which EMC Data Domain Retention Lock Compliance edition capabilities (when installed, configured, and enabled on the Data Domain system) comply with the requirement of the Rule; DD Retention Lock Compliance Capabilities A description of the specific capabilities of DD Retention Lock Compliance that enables it to meet the requirement of the Rule; and Other Considerations Identification of actions (should there be any) that may need to be performed in order to support meeting the requirements of the Rule. Note: The term record is utilized in CFTC Rule 1.31 to describe all information content that must be retained under the Rule. Since this assessment deals with the capabilities of the DD Retention Lock Compliance relative to the Rule, Cohasset Associates has chosen to use the term record or record file (versus file ) in order to be consistent with CFTC terminology. Compliance Assessment 9

10 2.2 Non-rewriteable, Non-erasable Format Compliance Requirement 1.31(b)(1)(ii)(A) Preserves the records exclusively in a non-rewriteable, non-erasable format. This requirement is designed to ensure that the integrity of records stored on an electronic storage media or system are protected against erasure or overwrite for the required retention period, thereby allowing the records to be accurately retrieved and viewed or reproduced Compliance Assessment It is Cohasset Associates opinion that EMC Data Domain Retention Lock Compliance edition (when installed, configured, and enabled on a Data Domain system) provides strong capabilities for meeting this requirement of the Rule, provided certain capabilities discussed below are properly configured and applied by the registrant and that any conditions stated in subsection 2.2.4, Other Considerations, are met DD Retention Lock Compliance Capabilities The main features of DD Retention Lock Compliance that support meeting the non-rewritable and non-erasable requirement of the Rule are: The registrant must purchase and configure (on a Data Domain system) a unique DD Retention Lock Compliance software license which ensures that the compliance features of DD Retention Lock are activated. During administrative setup of the DD Retention Lock Compliance, one or more MTrees must be defined as being under Compliance control, thereby allowing retention management to be applied to recorded files. After an MTree has been configured with DD Retention Lock Compliance, it cannot be disabled or overridden. For a Managed Tree (MTree) that is Retention Lock Compliance software enabled, a record file can be placed under retention management control by setting a time-based 1 retention period (in the form of a retention expiration date). The retention period is set when the client application, e.g., an archiving application or file archiving application a) issues a file protocol instruction with an atime 2 attribute retention value that is set into the future (beyond current date/time) and b) where the retention period is greater than the Minimum defined retention period per MTree and less than the Maximum defined retention period per MTree. Compliance Assessment 10

11 The initial retention period value and any valid retention period extension value thereafter is extracted from the atime attribute and stored as a protected file directory entry that is retained for the same period of time as the associated record file. A Minimum and Maximum retention period for each MTree must be established during the administrative setup of the Retention Lock Compliance software on EMC Data Domain systems. This ensures that the initial retention period for a record file and any subsequent retention period extension is not set below the Minimum or above the Maximum. Once set, the Minimum and Maximum retention periods can only be extended (such as increasing the Maximum to accommodate a legal hold) but they cannot be reduced. The retention period is then managed as follows: Any retention period atime value that is less than or equal to current time and therefore not a valid retention period is ignored since it is assumed to be an update to the time last accessed value. Any retention period value that is less than the Minimum retention period or greater than the Maximum retention period per Managed Tree will result in an error condition being returned to the client application. The retention period for any record file may be extended by recording a new atime retention value for a record file that is later in time than the current retention period but not later in time than the Maximum retention period. If an attempt is made to delete a record file before the retention period has expired, the delete command is rejected and results in an error condition. If an attempt is made to delete an MTree that is Retention Lock Compliance software enabled and currently contains record files, then the delete command is rejected and results in an error condition. Once the retention period has expired, deletion of the record file may be performed by an authorized client application or administrator. The accuracy of the system clock on the Data Domain system configured and enabled with DD Retention Lock Compliance edition is critical for determining whether the retention expiration date of a record file has expired. Situations can occur, such as a power outage, maintenance downtime, etc., which may affect the accuracy of the system clock and require it to be adjusted or reset. Additional statistics are gathered, analyses are performed, and Compliance Assessment 11

12 certain restrictions are placed on ensuring the accuracy of the system clock to meet retention compliance requirements. The accuracy of the system clock and variations of the system clock with current actual time is regularly monitored. The system clock is only allowed to vary by a maximum of two weeks in a year. Should the system clock vary beyond the two-week maximum during a year, then the administrative Security Officer dual sign-on is required to reset the clock to current time. No logical access (via a software user interface) without a Security Officer s dual sign-on is allowed for maintenance or troubleshooting purposes, such as the scenario where the DD Retention Lock Compliance enabled Data Domain system experiences a system error or corruption. For the extreme scenario where the full Data Domain Operating System will not start up, the only means to start or restart the system is through single user access to the system, via a physical USB drive, which must be protected and available only with a Security Officer s authorization. An MTree that is configured with DD Retention Lock Compliance can store files that are not regulated as records under the Rule. Accordingly, no retention period is required to be set. Record files required to be compliant with the Rule as well as non-regulated files can be intermixed on the same DD Retention Lock Compliance enabled MTree on the Data Domain system Other Considerations The following actions should be undertaken to ensure the compliance features of the DD Retention Lock Compliance software are activated and configured to meet the requirements of the Rule: The registrant must purchase and configure the EMC Data Domain Retention Lock Compliance edition license on the EMC Data Domain system so that the features necessary to meet the requirements of the Rule will be applied. Where administrative functions require a dual or second sign-on, Cohasset Associates strongly recommends that the authorized second sign-on person be the equivalent of either a Chief Compliance Officer or a Chief Security Officer or their representative as designated in writing. Compliance Assessment 12

13 It is imperative that the registrant ensure that the client application (which is writing record files regulated under the Rule) sends the appropriate retention period for each regulated record file to ensure that the DD Retention Lock Compliance protection features are appropriately applied. 2.3 Verifies Automatically the Quality and Accuracy of the Recording Process Compliance Requirement 1.31(b)(1)(ii)(B) Verifies automatically the quality and accuracy of the storage media recording process. The intent of CFTC Rule 1.31(b)(1)(ii)(B) is to ensure the media recording process is accurate to a very high degree and, therefore, the recorded information is of the highest quality. The objective of this requirement of the Rule is to provide the utmost confidence that all records read from the storage media are precisely the same as those recorded Compliance Assessment Cohasset believes that DD Retention Lock Compliance when installed and configured on the Data Domain system provides exceptional capabilities for meeting the CFTC requirement to verify the accuracy and completeness of the recording process DD Retention Lock Compliance Capabilities The DD Retention Lock Compliance enabled Data Domain system employs a comprehensive Data Domain Data Invulnerability Architecture for enhanced data integrity and recoverability. The Data Invulnerability Architecture provides for end-to-end verification using the following capabilities: Immediate verification at the time of recording, Fault avoidance and containment, Continuous fault detection and correction, and File system and MTree recoverability. The capabilities of DD Retention Lock Compliance that directly support the verification of the quality and accuracy of the recording process are: Initial Recording Process DD Retention Lock Compliance provides an exceptionally strong capability for verifying quality and accuracy for each container of record file data that is written. As part of the recording process, an immediate read-back is performed and the accuracy of the recording Compliance Assessment 13

14 is verified before being accepted as error-free. This method goes beyond the minimum acceptable reliance on state-of-the-art magnetic disk recording error checking and detection/ correction capabilities. Post Recording Process Record file data is packaged and written in containers (multi-megabyte units). A strong checksum value is calculated from the data in each container and stored with that container. The write verification process involves reading back the data in the stored containers and verifying that the checksums are accurate. After the containers are verified, the files contained in them are verified by reading the metadata of the files and verifying that each segment of a file exists in the container identified by the metadata. During verification, if the checksum does not match for any container, RAID 6 5 is used to correct the errors and recover the container. If the container cannot be recovered using RAID 6, an alert is raised to the client application whereupon the administrative support personnel can recover the data from a replicated or duplicate copy. During read-back of a record file, whether by the client archiving application or by the Data Domain file system, the checksums are verified and, when errors are encountered, RAID 6 error correction is applied as required, thereby ensuring that the record remains complete and accurate. Periodic scrubbing of the record file data on the DD Retention Lock Compliance enabled Data Domain system is performed to find and correct any defects that may occur. This is particularly important for those record files that have not been read back for an extended period of time Other Considerations There are no other considerations related to this requirement. 2.4 Serializes the Original and Duplicate Units of Storage Media Compliance Requirement 1.31(b)(1)(ii)(C) Serializes the original and, if applicable, duplicate units of storage media and creates a time-date record for the required period of retention for the information placed on such electronic storage media. The intention of this requirement is to identify each record with a unique file name and to place it chronological in time with a time/date stamp, thereby making it easier to locate and download. Compliance Assessment 14

15 2.4.2 Compliance Assessment Cohasset believes that a DD Retention Lock Compliance enabled Data Domain system meets the CFTC requirement to serialize both the original record and each duplicate copy stored DD Retention Lock Compliance Capabilities The following capabilities of DD Retention Lock Compliance are designed to meet the requirement of the Rule. DD Retention Lock Compliance provides each record file with a unique identification which contains an exclusive file name and date/time stamp, thereby uniquely identifying each record file logically and chronologically. When record files (on the source EMC Data Domain system) managed under DD Retention Lock Compliance are replicated to another Data Domain system configured with DD Retention Lock Compliance, the unique file name and data/time stamp as well as all retention metadata attributes are duplicated Other Considerations There are no other considerations related to this requirement. 2.5 Store Separately a Duplicate Copy Compliance Requirement 1.31(b)(2)(iv) Store a duplicate of the record, in any medium acceptable under this regulation, at a location separate from the original for the period of time required for the maintenance of the original. The intent of this requirement is to create a duplicate copy of the records that will be stored in a meaningfully separate location thereby making the records accessible should the primary location or storage source be compromised, i.e., lost, damaged, or destroyed Compliance Assessment It is Cohasset s opinion that DD Retention Lock Compliance enabled EMC Data Domain system complies with this SEC requirement DD Retention Lock Compliance Capabilities DD Retention Lock Compliance provides for an MTree to be replicated to a second Data Domain MTree (that is configured and enabled with DD Retention Lock Compliance) at Compliance Assessment 15

16 a separate location, either locally or remotely. During replication, all record file data and integrated control code metadata, including the retention period and read-only attribute, are replicated to the second MTree. Should a major error occur that makes the original records or MTree inaccessible, then the record files can be recovered from the replicated record and MTree copy Other Considerations There are no other considerations related to this requirement. Compliance Assessment 16

17 3. Conclusions This technical assessment has addressed whether the capabilities of DD Retention Lock Compliance (enabled on an EMC Data Domain system) meet the four relevant requirements of CFTC Rule 1.31(b). Cohasset s opinion is that the EMC Data Domain Retention Lock Compliance edition: Meets the requirements of the Rule for preserving the records in a non-erasable, nonrewriteable format through the use of integrated control codes, retention management controls, and security capabilities. Meets the requirements of the Rule related to the automatic verification of the accuracy and quality of the recording process in that it employs a comprehensive Data Invulnerability Architecture that provides in-line verification for each container of record file data stored, and utilizes state-of-the-art error detection and RAID 6 technology to correct any errors detected during read-back and periodic scrubbing. Uniquely identifies and serializes each record and duplicate copy that is stored. Supports the storage of a compliant duplicate copy of each record at a separate location and provides the means to recover records from the duplicate copy. Cohasset Associates conclusion: EMC Data Domain Retention Lock Compliance edition, when configured and enabled on a Data Domain system, meets the four requirements of the CFTC Rule addressed in this report the requirements that are the system s direct responsibility for retaining and storing records in digital form pursuant to the conditions set forth in Rule 1.31(b), which expressly allows records to be retained on an electronic storage media or system. Conclusions 17

18 End Notes 1. While not having issued any broad interpretive releases or updates to the Rule, the CFTC has issued three interpretation letters related to the Rule based on specific requests from registrants planning to store records electronically. The letter, numbers and subject matters are: No , PDF Image; No , Storage of records as PDF files, and No , Maintaining required records in PDF format. The focus of these three requests and CFTC interpretation letters was the use of PDF format for retained records. None of the interpretation letters specifically addressed the electronic storage media or system. 2. The SEC Rule 17a-4(f) requires a 90-day notification (waiting) period prior to deploying technology other than optical media. 3. The atime attribute in standard file protocol instructions represents the time last accessed for a file. For DD Retention Lock Compliance enabled MTrees, this attribute is utilized to establish the retention expiration date for a record file. 4. DD Retention Lock software currently supports only time-based retention (i.e., retain for a specified period from the time after the file is recorded). Event-based retention (i.e., indefinite retention once the file is recorded until a specified event occurs, followed by a fixed, final retention period) is not currently supported. 5. Redundant Array of Independent Disks (RAID): A method for recording data to magnetic disk devices that provides for various levels of error correction and read or write performance improvements. RAID 6 employs striped disks with dual parity and combines four or more disks in a way that provides for correction of detected errors for up to as many as two full disk units of data during read-back. End Notes 18

19 About Cohasset Associates, Inc. Cohasset Associates, Inc. ( is one of the nation s foremost consulting firms specializing in records and information management. Now in its fourth decade of serving clients throughout the United States, Cohasset Associates provides award-winning professional services in three areas: management consulting, education and legal research. Management Consulting: The focus of Cohasset Associates consulting practice is improving the programs, processes and systems that manage document-based information. Cohasset works to provide its clients with cost-effective solutions that will both achieve their business objectives and meet their legal/regulatory responsibilities. This ranges from establishing effective corporate records management programs to planning state-of-the-art electronic records systems. Education: Cohasset Associates is renowned for its longstanding leadership in records management education. Today, Cohasset s educational work is centered on its annual National Conference for Managing Electronic Records (MER), which addresses the operational, technical and legal issues associated with managing the complete life cycle of electronic records ( The MER sessions also are available to anyone, anytime, anywhere via streaming video through RIM on Demand. ( Legal Research: Cohasset Associates is nationally respected for its leadership on records management legal issues from retention schedules to the use of alternative media to paper for storing document-based information. For more than twenty years, Cohasset Associates has been a thought leader in records and information management. Cohasset has been described as the only management consulting firm in its field with its feet in the trenches and its eye on the horizon. It is this blend of practical experience and a clear vision of the future that, combined with Cohasset Associates commitment to excellence, has resulted in Cohasset Associates extraordinary record of accomplishments and innovation. This technical assessment and the information contained in it are copyrighted and are the sole property of Cohasset Associates, Inc. Selective references to the information and text of this technical assessment are welcome, provided such references have appropriate attributions and citations. Permission is granted for in-office reproduction so long as the contents are not edited and the look and feel of the reproduction is retained. About Cohasset 19

Abstract. SEC 17a-4(f) Compliance Assessment. Technical Report. Prepared by Cohasset Associates, Inc.

Abstract. SEC 17a-4(f) Compliance Assessment. Technical Report. Prepared by Cohasset Associates, Inc. SEC 17a-4(f) Compliance Assessment Prepared by Cohasset Associates, Inc. Abstract This technical report is a compliance assessment of the EMC Data Domain Retention Lock Compliance software product capabilities

More information

Sarbanes-Oxley Assessment

Sarbanes-Oxley Assessment Sarbanes-Oxley Assessment Prepared by Cohasset Associates, Inc. Abstract This technical report is an assessment of the EMC Data Domain Retention Lock Compliance edition capabilities relative to the areas

More information

iternity icas Solution

iternity icas Solution SEC 17a-4(f) & CFTC 1.31(b)-(c) Compliance Assessment iternity icas Solution Prepared by: Cohasset Associates Inc. Abstract The iternity Compliant Archive Solution (icas) is an object-based storage system

More information

HP StorageWorks Reference Information Storage System Designed to Assist Financial Services Organizations Comply with Email Retention Requirements

HP StorageWorks Reference Information Storage System Designed to Assist Financial Services Organizations Comply with Email Retention Requirements HP StorageWorks Reference Information Storage System Designed to Assist Financial Services Organizations Comply with Email Retention Requirements SEC 17a-4, NASD 3010, and NASD 3110 Regulations Target

More information

orldox GX3 Cloud for Financial Services Worldox GX3 Cloud Compliance Outline The Best of both Worlds. / Whenever. Wherever.

orldox GX3 Cloud for Financial Services Worldox GX3 Cloud Compliance Outline The Best of both Worlds. / Whenever. Wherever. Award-winning Document Management / Whenever. Wherever. orldox GX3 Cloud The Best of both Worlds. Worldox GX3 Cloud Compliance Outline for Financial Services May 2013 Table of Contents Table of Contents...

More information

The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements

The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements The ComplianceVault Email Archiving & Retrieval Appliance and the SEC 240.17a-4 Requirements Part 1: Regulatory Overview (document updated 1/05) SEC RULE 240.17a-4 ELECTRONIC RECORDS AND RECORDKEEPING

More information

White Paper: Financial Services Compliance

White Paper: Financial Services Compliance www. e g n y t e. c o m White Paper: Financial Services Compliance SEC Rule 17a for Broker-Dealers SEC Rule 31a-2 and 204-2 for Investment Advisors www.egnyte.com 2011 Egnyte Inc. All rights reserved.

More information

EMC DATA DOMAIN RETENTION LOCK SOFTWARE

EMC DATA DOMAIN RETENTION LOCK SOFTWARE White Paper EMC DATA DOMAIN RETENTION LOCK SOFTWARE A DETAILED REVIEW Abstract Enterprises continue to see an exponential growth in the unstructured data that is proliferating across their primary storage

More information

ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN)

ELECTRONIC RECORD AND SIGNATURE COMPLIANCE. NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) C O M P L I A N C E G U I D E ELECTRONIC RECORD AND SIGNATURE COMPLIANCE NASD Rules 3010(d) and 3110(c)(1)(C) SEC Rule 17a-4 15 USC 7001 et. seq. (E-SIGN) ALPHATRUST PRONTO ENTERPRISE PLATFORM This compliance

More information

MICROSOFT EXCHANGE ONLINE ARCHIVING, DATA RETENTION AND RULE 17A-4 COMPLIANCE DATE: SEPTEMBER 22, 2015

MICROSOFT EXCHANGE ONLINE ARCHIVING, DATA RETENTION AND RULE 17A-4 COMPLIANCE DATE: SEPTEMBER 22, 2015 MICROSOFT EXCHANGE ONLINE ARCHIVING, DATA RETENTION AND RULE 17A-4 COMPLIANCE DATE: SEPTEMBER 22, 2015 Executive Summary The Securities and Exchange Commission (the SEC ) requires broker-dealers and other

More information

Financial Services Compliance

Financial Services Compliance Financial Services Compliance WHITEPAPER SEC RULE 17A FOR BROKER-DEALERS SEC RULE 31A-2 AND 204-2 FOR INVESTMENT ADVISORS. Financial Services Compliance Whitepaper 2 U.S. Security Exchange Commission -

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM ESSENTIALS HIGH-SPEED, SCALABLE DEDUPLICATION Up to 58.7 TB/hr performance Reduces protection storage requirements by 10 to 30x CPU-centric scalability DATA INVULNERABILITY ARCHITECTURE Inline write/read

More information

Record Keeping and Call Recording for Dodd-Frank. A guide to regulatory compliance

Record Keeping and Call Recording for Dodd-Frank. A guide to regulatory compliance Record Keeping and Call Recording for Dodd-Frank A guide to regulatory compliance What is the Dodd-Frank Act? It s the most significant financial services regulatory legislation in the US since the Securities

More information

Assessment of Hitachi Data Systems (HDS) Hitachi Content Platform (HCP) For Dodd-Frank Compliance

Assessment of Hitachi Data Systems (HDS) Hitachi Content Platform (HCP) For Dodd-Frank Compliance Assessment of Hitachi Data Systems (HDS) Hitachi Content Platform (HCP) For Dodd-Frank Compliance 1. Executive Summary Assessment Goal LiquidHub Consulting was engaged by Hitachi Data Systems ( HDS ) to

More information

RECORDS TO BE PRESERVED BY CERTAIN EXCHANGE MEMBERS, BROKERS AND DEALERS SEA Rule 17a-4

RECORDS TO BE PRESERVED BY CERTAIN EXCHANGE MEMBERS, BROKERS AND DEALERS SEA Rule 17a-4 3101 RECORDS TO BE PRESERVED BY CERTAIN EXCHANGE MEMBERS, BROKERS AND DEALERS SEA Rule 17a-4 (a) Every member, broker and dealer subject to 240.17a-3 shall preserve for a period of not less than six years,

More information

REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the

REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the REVENUE REGULATIONS NO. 9-2009 issued on December 29, 2009 defines the requirements, obligations and responsibilities imposed on taxpayers for the maintenance, retention and submission of electronic records.

More information

EMC DATA DOMAIN OPERATING SYSTEM

EMC DATA DOMAIN OPERATING SYSTEM EMC DATA DOMAIN OPERATING SYSTEM Powering EMC Protection Storage ESSENTIALS High-Speed, Scalable Deduplication Up to 58.7 TB/hr performance Reduces requirements for backup storage by 10 to 30x and archive

More information

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT

GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why Data Domain Series GIVE YOUR ORACLE DBAs THE BACKUPS THEY REALLY WANT Why you should take the time to read this paper Speed up backups (Up to 58.7 TB/hr, Data Domain systems are about 1.5 times faster

More information

Regulatory Notice 2014-19

Regulatory Notice 2014-19 Regulatory Notice MSRB Regulatory Notice 2014-19 0 2014-19 Publication Date October 24, 2014 Stakeholders Municipal Advisors, Issuers, General Public Notice Type Regulatory Announcement Effective Dates

More information

Backup and Redundancy

Backup and Redundancy Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down

More information

Top Technology Challenges Thursday, May 28 3:00 p.m. 4:00 p.m.

Top Technology Challenges Thursday, May 28 3:00 p.m. 4:00 p.m. Top Technology Challenges Thursday, May 28 3:00 p.m. 4:00 p.m. Topics: Discuss technology-related challenges in communications and collaboration. Explain current views on technology-related challenges

More information

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009 State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers

More information

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

EMC Data Domain Boost for Oracle Recovery Manager (RMAN) White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with

More information

EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide

EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide Backup Recovery Systems Division Data Domain LLC 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800

More information

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE

IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE White Paper IBM TSM DISASTER RECOVERY BEST PRACTICES WITH EMC DATA DOMAIN DEDUPLICATION STORAGE Abstract This white paper focuses on recovery of an IBM Tivoli Storage Manager (TSM) server and explores

More information

EMC White Paper EMC EmailXtender Provides E-mail Records Management for Microsoft Exchange Server 2003

EMC White Paper EMC EmailXtender Provides E-mail Records Management for Microsoft Exchange Server 2003 EMC White Paper EMC EmailXtender Provides E-mail Records Management for Microsoft Exchange Server 2003 Abstract: This white paper describes how Microsoft Exchange Server 2003 and EMC EmailXtender work

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

TPM Key Backup and Recovery. For Trusted Platforms

TPM Key Backup and Recovery. For Trusted Platforms TPM Key Backup and Recovery For Trusted Platforms White paper for understanding and support proper use of backup and recovery procedures for Trusted Computing Platforms. 2006-09-21 V0.95 Page 1 / 17 Contents

More information

How To Protect Data On Network Attached Storage (Nas) From Disaster

How To Protect Data On Network Attached Storage (Nas) From Disaster White Paper EMC FOR NETWORK ATTACHED STORAGE (NAS) BACKUP AND RECOVERY Abstract This white paper provides an overview of EMC s industry leading backup and recovery solutions for NAS systems. It also explains

More information

Metadata, Electronic File Management and File Destruction

Metadata, Electronic File Management and File Destruction Metadata, Electronic File Management and File Destruction By David Outerbridge, Torys LLP A. Metadata What is Metadata? Metadata is usually defined as data about data. It is a level of extra information

More information

Online Backup Solution with Disaster Recovery

Online Backup Solution with Disaster Recovery Online Backup Solution with Disaster Recovery Backup Replacement - Online For Businesses looking for Consistent, Reliable and Offsite Backup, with Minimal Data loss, Generational Management and Disaster

More information

VMware vsphere Data Protection 6.1

VMware vsphere Data Protection 6.1 VMware vsphere Data Protection 6.1 Technical Overview Revised August 10, 2015 Contents Introduction... 3 Architecture... 3 Deployment and Configuration... 5 Backup... 6 Application Backup... 6 Backup Data

More information

Information Management Advice 18 - Managing records in business systems: Overview

Information Management Advice 18 - Managing records in business systems: Overview Information Management Advice 18 - Managing records in business systems: Overview Introduction The purpose of this Advice is to assist agencies to identify and manage State records in business systems,

More information

COUNCIL POLICY R180 RECORDS MANAGEMENT

COUNCIL POLICY R180 RECORDS MANAGEMENT 1. Scope The City of Mount Gambier Records Management Policy provides the policy framework for Council to effectively fulfil its obligations and statutory requirements under the State Records Act 1997.

More information

Regulatory Notice 15-05

Regulatory Notice 15-05 Regulatory Notice 15-05 Background Checks SEC Approves Consolidated FINRA Rule Regarding Background Checks on Registration Applicants Effective Date of FINRA Rule 3110(e): July 1, 2015 Effective Date of

More information

39C-1 Records Management Program 39C-3

39C-1 Records Management Program 39C-3 39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.

More information

Request for Information on Evolving Treasury Market Structure (Docket No. TREAS-DO-2015-0013)

Request for Information on Evolving Treasury Market Structure (Docket No. TREAS-DO-2015-0013) , 2016 VIA ONLINE SUBMISSION (http://regulations.gov) David R. Pearl Office of the Executive Secretary U.S. Department of the Treasury 1500 Pennsylvania Avenue, NW Washington, DC 20220 Re: Request for

More information

NSS Volume Data Recovery

NSS Volume Data Recovery NSS Volume Data Recovery Preliminary Document September 8, 2010 Version 1.0 Copyright 2000-2010 Portlock Corporation Copyright 2000-2010 Portlock Corporation Page 1 of 20 The Portlock storage management

More information

2.82.010 Government records findings--recognition of public policy.

2.82.010 Government records findings--recognition of public policy. Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County

More information

How To Use A Court Record Electronically In Idaho

How To Use A Court Record Electronically In Idaho Idaho Judicial Branch Scanning and Imaging Guidelines DRAFT - October 25, 2013 A. Introduction Many of Idaho s courts have considered or implemented the use of digital imaging systems to scan court documents

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

erecording Best Practices for Recorders

erecording Best Practices for Recorders 2501 Aerial Center Parkway, Suite 103, Morrisville, NC 27560 919.459.2081 erecording Best Practices for Recorders Adopted by the PRIA Board on, 2015 http://www.pria.us PRIA Copyright Notice, Disclaimer

More information

SOUTH EASTERN SCHOOL DISTRICT

SOUTH EASTERN SCHOOL DISTRICT No. 800 SECTION: OPERATIONS SOUTH EASTERN SCHOOL DISTRICT TITLE: RECORDS RETENTION AND MANAGEMENT ADOPTED: April 18, 2013 REVISED: 800. RECORDS RETENTION AND MANAGEMENT 1. Purpose It shall be the policy

More information

Archive Legislation: Email archiving in the United States. The key laws that affect your business

Archive Legislation: Email archiving in the United States. The key laws that affect your business Archive Legislation: Email archiving in the United States The key laws that affect your business Contents Laws regulating archiving and the penalties 3 I. The Securities Exchange Act of 1934 (the 1934

More information

UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure

UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure UNINETT Sigma2 AS: architecture and functionality of the future national data infrastructure Authors: A O Jaunsen, G S Dahiya, H A Eide, E Midttun Date: Dec 15, 2015 Summary Uninett Sigma2 provides High

More information

EMC Data Domain Boost for Oracle Recovery Manager (RMAN)

EMC Data Domain Boost for Oracle Recovery Manager (RMAN) White Paper EMC Data Domain Boost for Oracle Recovery Manager (RMAN) Abstract EMC delivers Database Administrators (DBAs) complete control of Oracle backup, recovery, and offsite disaster recovery with

More information

Rules and Regulations

Rules and Regulations 1059 Rules and Regulations Federal Register Vol. 76, No. 5 Friday, January 7, 2011 This section of the FEDERAL REGISTER contains regulatory documents having general applicability and legal effect, most

More information

Cloud Archiving. Paul Field Consultant

Cloud Archiving. Paul Field Consultant Paul Field Consultant SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA. Member companies and individual members may use this material in presentations and literature

More information

Introduction to Optical Archiving Library Solution for Long-term Data Retention

Introduction to Optical Archiving Library Solution for Long-term Data Retention Introduction to Optical Archiving Library Solution for Long-term Data Retention CUC Solutions & Hitachi-LG Data Storage 0 TABLE OF CONTENTS 1. Introduction... 2 1.1 Background and Underlying Requirements

More information

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications

IBM Software Information Management. Scaling strategies for mission-critical discovery and navigation applications IBM Software Information Management Scaling strategies for mission-critical discovery and navigation applications Scaling strategies for mission-critical discovery and navigation applications Contents

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Agency: Securities and Exchange Commission ( SEC or Commission ).

Agency: Securities and Exchange Commission ( SEC or Commission ). SECURITIES AND EXCHANGE COMMISSION [Release No. IA-2971 / 803-200] BlackRock, Inc.; Notice of Application January 4, 2010 Agency: Securities and Exchange Commission ( SEC or Commission ). Action: Notice

More information

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria

System Requirements for Archiving Electronic Records PROS 99/007 Specification 1. Public Record Office Victoria System Requirements for Archiving Electronic Records PROS 99/007 Specification 1 Public Record Office Victoria Version 1.0 April 2000 PROS 99/007 Specification 1: System Requirements for Archiving Electronic

More information

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS

EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS SOLUTION PROFILE EMC DATA DOMAIN EXTENDED RETENTION SOFTWARE: MEETING NEEDS FOR LONG-TERM RETENTION OF BACKUP DATA ON EMC DATA DOMAIN SYSTEMS MAY 2012 Backups are essential for short-term data recovery

More information

Blocal government bulletin b

Blocal government bulletin b Electronic Records Standards and Procedures Blocal government bulletin b july 1998 Comments or complaints regarding the programs and services of the Texas State Library and Archives Commission may be addressed

More information

Extend Business Scope and Improve Governance with SAP Content Management

Extend Business Scope and Improve Governance with SAP Content Management SAP Brief SAP Content Management for Microsoft SharePoint by OpenText Objectives Extend Business Scope and Improve Governance with SAP Content Management Ensure content compliance and harness the power

More information

IAASB Main Agenda (June 2010) Agenda Item. April 28, 2009

IAASB Main Agenda (June 2010) Agenda Item. April 28, 2009 Agenda Item 8-B Statement of Position 09-1 April 28, 2009 Performing Agreed-Upon Procedures Engagements That Address the Completeness, Accuracy, or Consistency of XBRL-Tagged Data Issued Under the Authority

More information

15 Organisation/ICT/02/01/15 Back- up

15 Organisation/ICT/02/01/15 Back- up 15 Organisation/ICT/02/01/15 Back- up 15.1 Description Backup is a copy of a program or file that is stored separately from the original. These duplicated copies of data on different storage media or additional

More information

Trends in Enterprise Backup Deduplication

Trends in Enterprise Backup Deduplication Trends in Enterprise Backup Deduplication Shankar Balasubramanian Architect, EMC 1 Outline Protection Storage Deduplication Basics CPU-centric Deduplication: SISL (Stream-Informed Segment Layout) Data

More information

Spambrella Email Archiving Service Guide Service Guide

Spambrella Email Archiving Service Guide Service Guide April 4, 2013 Spambrella Email Archiving Service Guide Service Guide Spambrella and/or other noted Spambrella related products contained herein are registered trademarks or trademarks of Spambrella and/or

More information

Department of the Interior Privacy Impact Assessment

Department of the Interior Privacy Impact Assessment Department of the Interior August 15, 2014 Name of Project: email Enterprise Records and Document Management System (eerdms) Bureau: Office of the Secretary Project s Unique ID: Not Applicable A. CONTACT

More information

Backup and Recovery 1

Backup and Recovery 1 Backup and Recovery What is a Backup? Backup is an additional copy of data that can be used for restore and recovery purposes. The Backup copy is used when the primary copy is lost or corrupted. This Backup

More information

How To Restore From A Backup In Sharepoint

How To Restore From A Backup In Sharepoint Recovering Microsoft Office SharePoint Server Data Granular search and recovery means time and cost savings. An Altegrity Company 2 Introduction 3 Recovering from Data Loss 5 Introducing Ontrack PowerControls

More information

FAQs: Final CIP Rule

FAQs: Final CIP Rule FAQs: Final CIP Rule The staff of the Board of Governors of the Federal Reserve System, Federal Deposit Insurance Corporation, Financial Crimes Enforcement Network, National Credit Union Administration,

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

Electronic Record Management Guidelines for Arkansas State Government. Developed by the Arkansas Records Retention Workgroup

Electronic Record Management Guidelines for Arkansas State Government. Developed by the Arkansas Records Retention Workgroup Electronic Record Management Guidelines for Arkansas State Government Developed by the Arkansas Records Retention Workgroup October 2005 This page is blank to allow for correct pagination for duplex printing.

More information

SOFTWARE LICENSE AGREEMENT

SOFTWARE LICENSE AGREEMENT SOFTWARE LICENSE AGREEMENT This Software License Agreement (this Agreement ) is entered into as of the installation date of the software by and between Nanotron Technologies GmbH, a German corporation

More information

REMOTE TECHNOLOGIES INCORPORATED DEALER AGREEMENT

REMOTE TECHNOLOGIES INCORPORATED DEALER AGREEMENT REMOTE TECHNOLOGIES INCORPORATED DEALER AGREEMENT Remote Technologies Incorporated of 5775 12th Avenue East, Suite 180, Shakopee, MN 55379 ( RTI ), and Dealer: dba (if applicable): Contact Name and Title:

More information

The BRU Advantage. Contact BRU Sales. Technical Support. Email: brusales@tolisgroup.com T: 480.505.0488 F: 480.505.0493 W: www.tolisgroup.

The BRU Advantage. Contact BRU Sales. Technical Support. Email: brusales@tolisgroup.com T: 480.505.0488 F: 480.505.0493 W: www.tolisgroup. The BRU Advantage The following information is offered to detail the key differences between the TOLIS Group, Inc. BRU data protection products and those products based on the traditional tar and cpio

More information

Agreed-Upon Procedures Engagements

Agreed-Upon Procedures Engagements Agreed-Upon Procedures Engagements 1323 AT Section 201 Agreed-Upon Procedures Engagements Source: SSAE No. 10; SSAE No. 11. Effective when the subject matter or assertion is as of or for a period ending

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY

UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY DOC. T99-061 Passed by the BoT 8/4/99 UNIVERSITY OF MASSACHUSETTS RECORD MANAGEMENT, RETENTION AND DISPOSITION POLICY The President of the University shall adopt guidelines to require that each campus

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments

CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:

More information

Versity 2013. All rights reserved.

Versity 2013. All rights reserved. From the only independent developer of large scale archival storage systems, the Versity Storage Manager brings enterpriseclass storage virtualization to the Linux platform. Based on Open Source technology,

More information

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases

Backup and Recovery. What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases Backup and Recovery What Backup, Recovery, and Disaster Recovery Mean to Your SQL Anywhere Databases CONTENTS Introduction 3 Terminology and concepts 3 Database files that make up a database 3 Client-side

More information

RAID installation guide for Silicon Image SiI3114

RAID installation guide for Silicon Image SiI3114 RAID installation guide for Silicon Image SiI3114 Contents Contents 2 1 Introduction 4 1.1 About this Guide 4 1.2 The Basics 4 1.2.1 What is RAID? 4 1.2.2 Advantages of RAID 4 1.2.3 Disadvantages of RAID

More information

EMC DATA DOMAIN PRODUCT OvERvIEW

EMC DATA DOMAIN PRODUCT OvERvIEW EMC DATA DOMAIN PRODUCT OvERvIEW Deduplication storage for next-generation backup and archive Essentials Scalable Deduplication Fast, inline deduplication Provides up to 65 PBs of logical storage for long-term

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Authentication of Hardcopy and Electronic Professional Documents

Authentication of Hardcopy and Electronic Professional Documents Authentication of Hardcopy and Electronic Professional Documents Approved by Council May 12, 2011 Table of Contents Introduction... 1 Requirements of the Act, By-laws, and Code of Ethics... 2 Definitions...

More information

Long term retention and archiving the challenges and the solution

Long term retention and archiving the challenges and the solution Long term retention and archiving the challenges and the solution NAME: Yoel Ben-Ari TITLE: VP Business Development, GH Israel 1 Archive Before Backup EMC recommended practice 2 1 Backup/recovery process

More information

POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS

POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS POLICY AND GUIDELINES FOR THE MANAGEMENT OF ELECTRONIC RECORDS INCLUDING ELECTRONIC MAIL (E-MAIL) SYSTEMS 1. Purpose Establish and clarify a records management policy for municipal officers with respect

More information

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE

Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE Contra Costa Community College District Business Procedure 10.57 SECURITY CAMERA OPERATING PROCEDURE The District and its colleges are committed to enhancing the quality of life of the community by integrating

More information

Authentication of Documents. Use of Professional Seals

Authentication of Documents. Use of Professional Seals Authentication of Documents Use of Professional Seals Table of Contents Introduction 1 Definitions 2 1 Concepts and Principles of Authentication 4 1.1 Principles 4 1.2 Purpose of the Seal 4 1.3 Obtaining

More information

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite

Canon imagerunner Hard Disk Drive Data Security Options. Data Encryption and Overwrite Canon imagerunner Hard Disk Drive Data Security Options Data Encryption and Overwrite Canon imagerunner Hard Disk Drive Data Security Kits Powerful protection for your most important information. Canon

More information

) ) ) ) ) ) ) ) ) ) ) ) AUDITING STANDARD No. 17. PCAOB Release No. 2013-008 October 10, 2013

) ) ) ) ) ) ) ) ) ) ) ) AUDITING STANDARD No. 17. PCAOB Release No. 2013-008 October 10, 2013 1666 K Street, NW Washington, D.C. 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org AUDITING STANDARD No. 17 AUDITING SUPPLEMENTAL INFORMATION ACCOMPANYING AUDITED FINANCIAL STATEMENTS

More information

Configuring Celerra for Security Information Management with Network Intelligence s envision

Configuring Celerra for Security Information Management with Network Intelligence s envision Configuring Celerra for Security Information Management with Best Practices Planning Abstract appliance is used to monitor log information from any device on the network to determine how that device is

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes

More information

EMC DATA DOMAIN ENCRYPTION A Detailed Review

EMC DATA DOMAIN ENCRYPTION A Detailed Review White Paper EMC DATA DOMAIN ENCRYPTION A Detailed Review Abstract The proliferation of publicized data loss, coupled with new governance and compliance regulations, is driving the need for customers to

More information

STATUTORY INSTRUMENTS 2012 No. _

STATUTORY INSTRUMENTS 2012 No. _ STATUTORY INSTRUMENTS 2012 No. _ THE ELECTRONIC SIGNATURES REGULATIONS 2012 ARRANGEMENT OF REGULATIONS Regulation PART I-PRELIMINARY 1. Title. 2. Interpretation PART II - LICENSING AND RECOGNITION OF CERTIFICATION

More information

The legal admissibility of information stored on electronic document management systems

The legal admissibility of information stored on electronic document management systems Softology Ltd. The legal admissibility of information stored on electronic document management systems July 2014 SOFTOLOGY LIMITED www.softology.co.uk Specialist Expertise in Document Management and Workflow

More information

AGENCY: National Telecommunications and Information Administration, U.S. Department of

AGENCY: National Telecommunications and Information Administration, U.S. Department of This document is scheduled to be published in the Federal Register on 12/15/2015 and available online at http://federalregister.gov/a/2015-31516, and on FDsys.gov Billing Code: 3510-60-P DEPARTMENT OF

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Email-Archiving Regulatory Compliance for Small and Midsized Firms (SMBs)...a Whitepaper by Sony and Intradyn

Email-Archiving Regulatory Compliance for Small and Midsized Firms (SMBs)...a Whitepaper by Sony and Intradyn Email-Archiving Regulatory Compliance for Small and Midsized Firms (SMBs)...a Whitepaper by Sony and Intradyn EXECUTIVE SUMMARY Email is mission-critical today for virtually all businesses. Not only must

More information

Neutralus Certification Practices Statement

Neutralus Certification Practices Statement Neutralus Certification Practices Statement Version 2.8 April, 2013 INDEX INDEX...1 1.0 INTRODUCTION...3 1.1 Overview...3 1.2 Policy Identification...3 1.3 Community & Applicability...3 1.4 Contact Details...3

More information