1 Legal Services Corporation Baselines: Technologies That Should Be in Place in a Legal Aid Office Today (Revised 2015) At the NLADA Technology Section meeting during the 2013 Equal Justice Conference, a project was proposed to update the LSC Baselines: Technologies That Should Be in Place in a Legal Aid Office Today, which was released in 2008 and had never been updated. Following that meeting, LSC s Technology Initiative Grant (TIG) program staff (David Bonebrake, Glenn Rawdon and Jane Ribadeneyra) began working on this project with the NLADA Technology Section, led by Alison Paul and Jeff Hogue. We invited a group of legal aid stakeholders from both LSC-funded and non LSC-funded organizations to a half-day meeting in Jacksonville, FL in January 2014, prior to the annual TIG Conference. We engaged Idealware, a 501(c)(3) nonprofit that provides impartial and accessible resources about software to help nonprofits make smart software decisions, as a consultant. Idealware coordinated community input leading up to the stakeholders meeting, including posting the original Baselines for public comment and through a community webinar in January hosted by NLADA. Laura Quinn, Idealware s Executive Director, facilitated the detailed review of the 2008 baselines by the 17 stakeholders attending the pre-conference meeting. Idealware reviewed all of the input from the community and the stakeholders meeting and provided proposed revisions to the Baselines document. LSC and the NLADA Technology Section worked together to review the suggested edits and make further modifications, and provided a draft of the revised Baselines for community review and input. Following a two month comment period, LSC and the NLADA Technology Section made final revisions and clarifications to the document. The document below shows the final version and addresses the first three columns of the Baselines the Purpose Served, What Should Be in Place, and Needed Capacities or Functions. We will also be providing edits for the last two columns - Important Considerations, and Useful Websites, Resources, and Other Tools in early The document, Technologies That Should Be in Place in a Legal Aid Office Today, is intended for any legal aid office that provides a full range of legal services. Purpose served What should be in place Needed capacities or functions OVERALL PROGRAM CAPACITY Planning Technology planning should be ongoing and integrated into the overall planning of the program for effective service delivery. Technology planning should include an assessment of the program s current needs and capacities in an effort to effectively position the program to incorporate new technological advances as they evolve. Technology plan should be reviewed and updated as needed every year. Programs should consider the benefits and risks of cloud services as useful alternatives to self-hosted applications and servers for the organization, including for back-up of data and disaster preparedness.
2 OVERALL PROGRAM CAPACITY Budgeting Adequate funds should be budgeted by the Board of Directors for: 1. the ongoing maintenance and upgrade of hardware and software; 2. the personnel/consultants necessary to support and maintain the system; and 3. training in the use of technology. Technology costs should be considered in the budget of every project, program, and initiative. Personnel The organization should have at least 2 full-time technology staff or consultants per 100 FTE staff members sufficient to: Maintain equipment and networks; Maintain databases and software; Support and train staff in the use of equipment and networks; Maintain basic knowledge of trends in technology security, nonprofit purchasing options, and technology best practices; Adequate staffing or consultant time to maintain (or contribute content) to the statewide website and any program website. MANAGEMENT OF CLIENT AND CASE DATA Case management system The following capacities, including reporting features and access to client and case data, should be available in real time in all offices: Capture and retain client eligibility, case type, and other appropriate data at intake; Securely back up data in standardized data formats and, if required, move data to alternate systems; Screen applicants for eligibility and appropriate case type; Perform immediate conflict check; Enter and edit information in the CMS in real time; Securely and ethically transfer client and case data electronically to and from other service providers, provided that they have the appropriate technologies; Generate reports and extract meaningful data for strategic planning, program evaluation and other purposes, including comparison reports and running historical data; Ability to assign the appropriate funding source to cases and activity records; Allow the end user to easily configure various aspects of the CMS software application (e.g. any changing requirements on outcomes and reporting, adding/deleting data fields as needed);
3 MANAGEMENT OF CLIENT AND CASE DATA (cont d) Have the technological capacity to check for data integrity, ideally in an automated way (which ensures that integrity checks are performed regularly and uniformly), to reduce the human factor (both with respect to time and human error potential). PRODUCTION AND SUPERVISION OF LEGAL WORK Case management system Record case notes electronically including facts, advice and services offered, with deadlines. Generate simple forms and letters from the case management system. Generate reports and extract meaningful data for case planning and organizational planning. Provide remote access to the system, including databases as needed. Have a strategy as to how the case management system can help with the triage process, such as phone routing, online intake routing, securely exchanging data with partner online intake tools, and future compatibility with electronic filing systems. Calendaring A calendaring/tickler function for deadlines and appointments that can be viewed by appropriate staff. Program-wide electronic calendaring system. Document production Effective use of productivity software such as word processing, spreadsheets, and presentation software and training in their use. Develop a strategy to automate forms and pleadings routinely used for staff and pro bono advocates that includes management of forms from a central location, with a system in place to assure they are updated for legal sufficiency. Staff should receive appropriate training in the use of the automated documents. Provide technology tools to assist staff in working collaboratively on the production of large projects, such as major briefs and pleadings. Capability of creating PDF documents as well as converting them to editable files. Capability for electronic filing of pleadings when required or allowed by court systems. Timekeeping Electronic timekeeping is available and utilized.
4 PRODUCTION AND SUPERVISION OF LEGAL WORK (cont d) Supervision Data to support the supervision of legal work, including case lists and activity, are available to supervisors and management. As necessary, remote access to case files for review by supervisors. Online legal research Online tools for conducting legal research using up-to-date primary sources, including laws, regulations and cases, available from every advocate s desktop with staff training regarding its use. Access to statewide materials, including forms and pleadings, legal education materials, brief banks, and topical lists. RECORDS MANAGEMENT Electronic records Filing of all electronic records, retaining them in accordance with the program s defined retention policies, assuring their accessibility and properly disposing of them when appropriate. Potential records in question include: All data files associated with program software; messages; Instant messaging (where used); Transcribed or recorded telephone messages and conversations. Policies that govern permissions or access rights to electronic files, including the right to view, edit, move or rename files. For LSC grantees, the records management system must be compliant with LSC and all other legal requirements in the maintenance of records, including the confidentiality of client records. KNOWLEDGE MANAGEMENT Pleading and brief banks, and other electronically stored data and information Store and retrieve sample pleadings, briefs, motions and other documents based on content. Program staff use an effective method for finding documents by search or logical browsing, and can purge documents. Findability may be based on a document management system or content-searchable lists, wikis, or shared folders. Electronic access to internal forms and procedures. Program-wide accessible and searchable contacts management system. Electronic access to practice guides.
5 INTAKE AND TELEPHONIC ADVICE Telephone systems Programs should monitor call volume and craft a strategy as to how they will address issues around excess demand to provide information over the phone to callers. Call routing by language, substantive and/or geographic area. Ability to serve persons with speaking or hearing disabilities through access to TTY or relay service. Technology to review busy signals, wait times, dropped calls, etc. If the program does telephone call backs, they should look at technology systems that facilitate an efficient callback system. Provide recorded information to caller while waiting or after hours. General intake should consider online intake as well as more traditional means of application. Electronic desk manual Readily available, centrally located, and easily updated electronic guide for intake workers to provide appropriate information, advice or referral. Case management system See Case Management System capacity section. LEGAL INFORMATION FOR LOW INCOME PERSONS Legal Information via Websites and Social Media Programs should collaborate in providing a statewide website with the following features: Current information regarding the program and its services; Accurate and current community legal education/pro se related materials and referral information written in plain language; Capacity to serve persons with limited English proficiency; Website designed and maintained in compliance with Section 508 of the Rehabilitation Act of 1973 as amended. In addition to general legal information available on a statewide website, the organization itself should have a compelling web presence that includes: Description of what services they offer; How to contact the program; How to apply for services. Organization should have a strategy as to whether and how they should use social media to reach out to potential clients and the low income community. Should an organization use social media for outreach or legal information, they should have a policy to govern its proper use.
6 LEGAL INFORMATION FOR LOW INCOME PERSONS (cont d) Mobile Technology for clients Ability to provide information to clients who use mobile devices, such as through mobile compatible websites, mobile apps, or SMS text messaging. Community legal education Community legal education presentations are supported by effective use of technology, such as online conferencing, videos, and other appropriate technologies. SUPPORT FOR PRO BONO AND USE OF PRIVATE ATTORNEYS Support for program efforts to accept, refer and track pro bono and PAI cases Programs should have the following technology in place to support their pro bono programs: A website that may include such features as allowing pro bono lawyers to review available cases and volunteer, posting of training and resource materials, and calendars of training opportunities; A case management system that will track referred cases, time spent on those cases and work accomplished, and automate oversight of pro bono cases to promote timely case closure; A strategy to share client and case data securely with pro bono volunteers using electronic means. Direct support for volunteer attorneys Program provides assistance and support in PAI representation, which may include automated documents, pleadings and brief banks. Program provides volunteer attorney training and resource materials through the use of technology, such as web conferencing, video conferencing and hosted online trainings. SECURITY Firewalls, antivirus, anti-spam, and antispyware applications, back-up and appropriate policies regarding use of data and computers Operating systems, antivirus software, and other software applications have the most current patches and definition updates. Maintain backup and recovery systems pursuant to grant assurances, including off-site backups. Security policies and procedures for protecting client and case data, sensitive personal and personnel data, and all communications from loss or unauthorized intrusion. Server equipment should be kept in a secure environment with appropriate ventilation and cooling. Disaster recovery plan (that includes periodic testing) for mission critical technology systems. Technology is included as part of the organization s disaster plan.
8 TRAINING (cont d) Use of technology to deliver training on substantive law, legal skills, and administrative policies and procedures Technologically supported skills, substantive, and administrative training, such as access to on-demand training packages, including on-line trainings, DVDs and podcasts. COMMUNICATION , lists, and other Universal capacity to communicate through program provided accounts. technologically supported communication methods Policy for proper use of and other electronic communication tools. lists by substance and administrative function, as appropriate. Develop and use collaborative work environment tools such as blogs, wikis, real-time group editing tools, and web conferencing for internal and external communication. Internal communication mechanisms An internal communication mechanism for communications to staff ( , lists, blogs, web conferencing). Have a system for tracking technology issues. ADMINISTRATION Accounting Accounting systems should have the capacity to manage these functions: General ledger, payables, receivables and fixed assets; Payroll; Maintain client trust accounts; Track and report budgeting and expenditures; Generate all needed internal and external reports. Human resources management Maintain all appropriate personnel records electronically, including: Payroll; Timekeeping; Benefits administration. Maintain confidentiality of personnel data. Advertise positions and accept applications electronically. Generate appropriate and necessary personnel reports.
9 DEVELOPMENT/ FUNDRAISING Grant maintenance Grant maintenance system that can track each grant, including: information on grant requirements, restrictions and commitments; tracking of expenditures and activities; management of reimbursables; indirect cost calculations; control of expenditures against budget; generation of reports and tracking of deadlines. Maintenance of contact information. Fundraising and marketing In addition to general legal information available on a statewide website, the organization itself should have a compelling web presence that includes: Description of what services they offer; Information about volunteer and donation opportunities, as appropriate Ability to donate online; Use of a modern content management system to enable staff to quickly and easily update it; Website should be hosted off-site. Organization should have a strategy as to whether and how they should use social media to reach out to potential supporters, volunteers, and donors. Should an organization use social media for outreach, they should have a policy to govern its proper use. Electronically track the contact information, donation and contact history for each individual donor, if the organization has individual donors. Ability to generate reliable reports of donors that meet specific criteria, such as interests and giving history. Generation of letters, reports, and other appropriate documents.
Policy No: 3008 Title of Policy: Preservation and Production of Electronic Records Applies to (check all that apply): Faculty Staff Students Division/Department College _X Topic/Issue: This policy enforces
8 BEST PRACTICES FOR MAKING YOUR PROJECT COSTING EASY 1 8 Best Practices for Making Your Project Costing Easy 8 BEST PRACTICES FOR MAKING YOUR PROJECT COSTING EASY 2 Whether you re a project manager at
LEGAL SERVICES CORPORATION REQUEST FOR PROPOSALS FOR A PROGRAM EVALUATOR TO EVALUATE LSC S MIDWEST LEGAL DISASTER COORDINATION PROJECT OCTOBER 28, 2015 Page 1 of 8 INTRODUCTION The Legal Services Corporation
Infrastructure Systems Data in the System Privacy Impact Assessment: Infrastructure Systems SECTION V PRIVACY QUESTIONS 1. Generally describe the information to be used in the system in each of the following
Evaluating SaaS Vendors Make no mistake: all cloud-based services are not created equal. While there are best practices and certifications within the industry, it will require some due diligence to fully
BKDconnect Security Overview 1 Introduction 1.1 What is BKDconnect 1.2 Site Creation 1.3 Client Authentication and Access 2 Security Design 2.1 Confidentiality 2.1.1 Least Privilege and Role Based Security
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Project Narrative 1. A full description of the project, including the specific technologies the project will develop or implement LAF will develop a secure enterprise-level information and knowledge management
Request for Qualifications Managed Information Technology Services For the Town of Moraga Deadline for Submittal: Wednesday, December 5, 2012 No later than 2:00 p.m. Prepared by: Stephanie Hom Administrative
2010 Awarded TIG Projects Recipient TIG # TIG Grant Category Grant Amount Center for Arkansas Legal Services 10046 Website Improvement and Innovation AR This project will create a new member area on the
White Paper Why Should You Archive Your Email With a Hosted Service? An Osterman Research White Paper Published January 2008 Executive Summary Email is the primary communication system and file transport
As public servants, it is our responsibility to use taxpayers dollars in the most effective and efficient way possible while adhering to laws and regulations governing those processes. There are many reasons
Ames Consolidated Information Technology Services (A-CITS) Statement of Work C.1 Mission Functions C.1.1 IT Systems & Facilities Support System Administration: The Contractor shall provide products and
Cloud-based Office 365 provides substantial cost, flexibility benefits over server-based system Prepared by: Ron Beck, Director, McGladrey LLP email@example.com August 2013 In the modern workplace,
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Expanding Your Practice with an Online Office By Stephanie Kimbro August 2011 From ABA TECHSHOW 2011 Web based law practices are emerging as tools to expand an existing law firm and capture a greater segment
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
minerva fundraising solutions HOW TO CHOOSE A FUNDRAISING DATABASE The most important asset to any not-for-profit organization is their donor database. Whether donation processing is outsourced or completed
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
to Legal Aid 2010 Legal Aid Education P, Session 1, Page 1 Session 1 Governance as Leadership What is governance? Governance is the exercise of authority, direction and control of an organization in order
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
This white paper from Stylusinc describes how enterprises benefits by migrating to Microsoft Office 365 and how it is bringing about a sea change in how enterprises look at basic things like email collaboration
Abstract Achieving success for today s compliance professional is both tougher and easier than ever. On one hand, there are more regulations and standards at almost every level, on the other, there are
ADVANCE YOUR MISSION WITH THE CLOUD DO MORE WITH LESS CLOUD SOLUTIONS CDW NONPROFIT 2 CLOUD SOLUTION Cloud/hosted software spending by nonprofits and associations increased by 43% while technology hardware
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
W H I T E P A P E R M a k e Y o u r B a c k u p s a C o m p e t i t i v e A d v a n t a g e f o r G r e a t e r P r o d u c t i v i t y Sponsored by: Mozy Laura DuBois August 2011 Brad Nisbet E X E C U
Information Security and CASA Programs The comprehensive and ever-changing environment of information security poses specific challenges to CASA programs. Unlike other businesses or nonprofit organizations,
Litigation Hold Notices & Electronic Discovery A R E S O U R C E F O R W S U E M P L OY E E S What is a Litigation Hold Notice? Notice from an authorized department (e.g., Attorney General s Office Torts
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
Division of Information Technology Strategic Plan 2007 2010 July 3, 2007 i Mission of the Division of Information Technology The mission of the Division of Information Technology (IT) is to add value to
2013 USER GROUP CONFERENCE The Cloud This session will touch anything and everything cloud based that is important to districts today. We will compare and contrast Google Apps and Office 365, Cloud storage
Invitation to Tender for Provision of IT Support for the Causeway Coast & Glens Heritage Trust (CCGHT) at The Old Bank, 27 Main Street, Armoy, BT53 8SL 1. INTRODUCTION The Causeway Coast & Glens Heritage
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
IT-1 Contracts/ Software Licenses/ Use Agreements General 6 IT-2 CUNY SCHOOL OF PROFESSIONAL STUDIES: DEPARTMENTAL RETENTION SCHEDULE 4/7/2014 CUNY-CIS Information Security Procedures Attestation Forms
Wood River Land Trust LTA Standard 2: Compliance with Laws 2A: Compliance 2B: Incorporation/Bylaws 2C: Tax Exemption 2D: Records Policy 2E: Public Policy Policy: The Land Trust will fulfill its legal requirements
Virtual Law Practice and the Online Delivery of Legal Services presented by Stephanie Kimbro Attorney, Kimbro Legal Services Technology Consultant, Total Attorneys Canadian Discipline Administrators Conference
IT-1 Contracts/ Software Licenses/ Use Agreements Legal agreements, including contracts, legal releases, software licenses, and use agreements involving the College or the University 6 years after expiration
BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO. 05-050 Adopting Multnomah County HIPAA Security Policies and Directing the Appointment of Information System Security
GEORGIA LEGAL SERVICES PROGRAM 2013 PRIVATE ATTORNEY INVOLVEMENT PLAN I. INTRODUCTION Organization The Georgia Legal Services Program will operate its Private Attorney Involvement Program with its traditional
Kemp s Case Works, Inc. Prime Case Management System Version 12.5.03 Today Tab A Daily Worksheet for Staff and Management introduces more time-saving features and makes Prime easier to use. The Staff Worksheet
Bringing the Cloud into Focus A Whitepaper by CMIT Solutions and Cadence Management Advisors Table Of Contents Introduction: What is The Cloud?.............................. 1 The Cloud Benefits.......................................
(Presentation Notes) Full Presentation & Video Available @ http://accellis.com/ using-amicus-attorney-with-dropbox Materials by: Colleen Heine Amicus Attorney Certified Consultant My name is Colleen Heine
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
Request for Proposals Information Technology Support & Consulting Services City of Calistoga Finance Department 1232 Washington Street Calistoga, California 94515 Date of Issuance: Deadline to Submit Proposal:
Introduction to Computerized Legal Software (Law 56) Computers in the Law Office Chapter 1 Why are we here? Computerized legal software will: 1. Allow a legal assistant to be more productive and efficient;
TOOLS FOR STATE VOADS TO PREPARE FOR DISASTER CASE MANAGEMENT Audience for document State and Territory Voluntary Organizations Active in Disaster (VOAD) disaster case management (DCM) organizations and
STATE OF MONTANA SECRETARY OF STATE S OFFICE JOB PROFILE AND EVALUATION SECTION I - Identification Working Title: IT Help Desk Lead Class Code Number: 151415 Class Code Title: Computer Support Specialist
HR Documents and Templates Information Technology PolicyPro PLANNING Strategic Planning Contents of an IT Strategic Plan (F) Strategic Issues Checklist (CH) Tactical Planning Implementation Planning Change
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Program: Administration IS Administration provides strategic planning, direction, and central management oversight of the Information Services that includes the following programs: Desktop Support Services,
LEGAL SERVICES CORPORATION Office of Program Performance FINAL PROGRAM QUALITY REPORT FOR Bay Area Legal Aid Recipient Number: 805270 February 28 March 4, 2011 Team Members: Chuck Greenfield, Program Counsel
Introduction Thanks Survey of attendees Questions at the end 1 Electronic records come in a variety of shapes and sizes and are stored in a multitude of ways. Just what are you managing? Video Cloud computing
SOUTHERN SLOPES COUNTY COUNCIL COMPUTER & INFORMATION TECHNOLOGY USE POLICY OBJECTIVE To provide users with guidelines for the use of information technology resources provided by Council. SCOPE This policy
Voice Documentation in HIPAA Compliance An OAISYS White Paper Americas Headquarters OAISYS 7965 South Priest Drive, Suite 105 Tempe, AZ 85284 USA www.oaisys.com (480) 496-9040 CONTENTS 1 Introduction 2
HIPAA - Privacy And Security Audit For Provider Practices THIS IS A MODEL AUDIT. IT WILL NEED TO BE CHANGED TO MEET THE PARTICULAR NEEDS AND CIRCUMSTANCES OF ANY TRUSTED SOURCES DEVELOPING AN AUDIT. The
1464 INFORMATION TECHNOLOGY ENGINEER V NATURE AND VARIETY OF WORK This is senior level lead administrative, professional and technical engineering work creating, implementing, and maintaining the County
GOVERNANCE GUIDELINE FOR COMMUNITY HEALTH SERVICE PROVIDERS August 2013 1 Table of Contents 1.0 Governance 3-4 2.0 Human Resources 4-5 3.0 Procurement/Contract Management 5 4.0 Financial Management/Financial
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
LEGAL SERVICES CORPORATION OFFICE OF INSPECTOR GENERAL REVIEW OF GRANTEE S TRANSFER OF FUNDS AND COMPLIANCE WITH PROGRAM INTEGRITY STANDARDS Grantee: Pine Tree Legal Assistance, Inc. Recipient No. 120000
RECORD RETENTION AND DESTRUCTION POLICY 1) Purpose Administration Department Policy #: Total pages: 10 Attachments: Approved by: Effective Date: Date Revised: Date to be reviewed: The purpose of this Policy
Customer Solution Case Study Museum Avoids 92 Percent of Operating Costs for Messaging, Communications Service Overview Country or Region: United States Industry: Nonprofit Customer Profile The Wildlife
Last updated: March 4, 2014 Stable and Secure Network Infrastructure Benchmarks 501 Commons has developed a list of key benchmarks for maintaining a stable and secure IT Infrastructure for conducting day-to-day
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Cyber Security Best Practices 1. Set strong passwords; Do not share them with anyone: They should contain at least three of the five following character classes: o Lower case letters o Upper case letters
Monitoring Tool For Area Agencies on Aging 1 Program organization and management 1. What experience and demonstrable capacity does the provider have to: a. Provide effective administrative and judicial
Texas Transportation Institute Information Resources Strategic Plan 2012 2016 June 2012 Information Resources Strategic Plan 2012 2016 Texas Transportation Institute The Texas A&M University System The
2-1-1 DISASTER SUPPORT COLLECTIVE Disaster Exercise After Action Report 09/05/12 Information maintained and distributed by 211 LA County serving as administrative lead for the 2-1-1 Disaster Support Collective.
PROCEDURE 4040P Community Relations PRESERVATION AND PRODUCTION OF ELECTRONIC RECORDS Electronic Discovery Committee To help meet its obligations, the WSD uses an Electronic Discovery Committee, made up
24 LANGUAGE ACCESS POLICY & PROCEDURES A. Mission and Language Policy 1. Mission Statement for SC Legal Services - South Carolina Legal Services is a statewide law firm that provides civil legal services
State of Montana Office of the State Public Defender Agency IT Plan Fiscal Year 2014-2019 Table of Contents 1 1. Executive Summary 3 2. Environment, Success, Capabilities 4 3. IT Contributions and Strategies
FINANCIAL INSTITUTIONS ENERGY INFRASTRUCTURE, MINING AND COMMODITIES TRANSPORT TECHNOLOGY AND INNOVATION PHARMACEUTICALS AND LIFE SCIENCES BYOD: Bring your own device How to make BYOD a PLUS, not a RISK
Union County Electronic Records and Document Imaging Policy Adopted by the Union County Board of Commissioners December 2, 2013 1 Table of Contents 1. Purpose... 3 2. Responsible Parties... 3 3. Availability
Best Practices in Enterprise Mobility Management An ENTERPRISE MANAGEMENT ASSOCIATES (EMA ) White Paper Prepared for FrontRange October 2013 IT & DATA MANAGEMENT RESEARCH, INDUSTRY ANALYSIS & CONSULTING
Paul M. Perry, FHFMA, CITP, CPA Alabama CyberNow Conference April 5, 2016 Information Technology General Controls And Best Practices 1. IT General Controls - Why? 2. IT General Control Objectives 3. Documentation
ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst
Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION
Service Level Standard Personal Devices Revision History Date Version Changes 2/17/2012 1.00 Initial Draft Special Note: Service Level Standards will be reviewed and updated following the end of the spring
Questionnaire on Electronically Stored Information (March 17, 2011) I. Definitions and Instructions A. ESI means electronically stored information as the term is used in the Federal Rules of Civil Procedure.
NASACT Conference August, 2014 Trends in Government Workforce Management Sherry Amos Managing Director, Industry Strategy Education and Government Workday Alliance To Transform Government Summit Report
What can the SaaS Whitepaper Cloud do for You? Content Introduction 1 A Quick Look at Benefits 2 Evaluating the Costs 3 Evaluating the Security 4 Evaluating the People Behind the Cloud 5 1 Introduction
Ashley Clarke Hosted Desktop Business Name Our Partner s Technology Partner Ashley Clarke s Hosted Desktop is a full featured Windows 8 style experience delivered from the cloud. One of the key advantages