Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.

Size: px
Start display at page:

Download "Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output."

Transcription

1 Information Governance (IG) encompasses sets of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental and operational requirements. Definitions of IG go much further than traditional Records and Information Management (RIM) in order to address all phases of the records and information life cycle. Records management deals with the creation, retention and storage and disposition of records. A record can either be a physical tangible object, digital information such as a database, application data, and e mail. The lifecycle was historically viewed as the point of creation to the eventual disposal of a record. As data generation has exploded in recent decades, and regulations and compliance issues increased, traditional records management has failed to keep pace. A more comprehensive platform for managing records and information is necessary to address all phases of the lifecycle this has led to the advent of IG. IG goes beyond retention and disposition to include overall information management rights, security, audit and e mail management. The table below is the BST Information Governance model with a brief description of each component. d Records and Information: is all forms of records and information registered in either temporary or permanent form so that it can be retrieved, reproduced, or preserved. Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output. RIM Policy (Records and Information): is policy that aligns with an organization s environment, strategic direction, policy framework, and records and information keeping. RIM policy should reflect current business and legal needs including endorsement by an organization s senior executives. RIM Policy should:

2 be implemented and communicated regularly across the whole organization; cover all systems that contain records and information; cover all practices associated with records and information; be linked to related business policies and programs; be supported by sets of procedures, guidance, and tools for records and information management; be enabled to be assessment compliance monitored; and be assessed regularly. Having a RIM policy provides key benefits including: communication to all organization staff of the organization s commitment to records management, and staff recordkeeping responsibilities; provides the directive to ensure that the evidentiary, accountability and regulatory requirements of the organization are met; promotes a holistic culture of good recordkeeping practice; increases the probability of organization staff complying with good recordkeeping practice; decreases the level of risk associated with recordkeeping practices; enhances efficiency of business processes, practices and service delivery; and encourages ethical behavior. Retention and Disposition Retention: is how records and information are stored for a given period of time in an organization s document management policies. The information on critical documents must be protected for certain amounts of time. Retention periods for various documents are dictated by the needs of the organization and are measured up against what applicable laws and regulations require. Disposition: is a critical element of records and information management and is the final operational action taken in the records and information lifecycle. Disposition includes the destruction of records and information or the transfer to another entity (most commonly an Archives) for permanent preservation. An organization s records and information disposition program should provide approved routine procedures to dispose or transfer records and information that is no longer needed by the organization for current business. Disposal Policy: is policy regarding the destruction or transfer of records and information. On some occasions, the disposal may be to transfer records and information to another State or Federal agency. Proper authorization prior to proceeding with disposal is usually needed. Disposal of records and information should occur routinely in accordance an organization s records and information management policy. Archive: is records and information that can be expected to be kept permanently and as closely as possible to its original form. Archival records and information can be "expected" to retain permanently its original characteristics. Permanent records and information determined to be of sufficient additional historical, or of continuing or enduring value, warrants conservation and preservation in an archival facility.

3 Freedom of Information: is a legal reference to a citizen's right to access information that is held by various organizations. In many countries, this freedom is supported as a constitutional right. Freedom of Information Act: is law that gives people the right to access information from the federal government Other Oversight: is oversight with the watchful care, management or supervision by a higher entity such as the government, laws, stakeholders, etc. Privacy: is the relationship between collection and dissemination of records and information and the expectation of privacy, and the legal and political issues surrounding records and information. Privacy concerns can exist wherever personally identifiable records and information is collected and stored on paper or in digital form. Improper or nonexistent disclosure control can be a root cause of privacy issues. Records and information privacy issues arise in response to information from a wide range of sources including, healthcare records, criminal justice investigations and proceedings, financial institutions and transactions, biological traits such as genetic material, residence and geographic records, ethnicity, privacy breach and location based service and geolocation. Data Breach: is the intentional or unintentional release of secure records and information to an untrusted person or environment. User Rights: is the right of a person to access certain records and information. User Access Controls: is security that is applied to records and information that supports limiting access to no privileges until authorizations are in place for increase or elevation in privilege. In this way, only certain records and information are accessible by certain people. Confidentiality: is records and information that are in strict privacy or secrecy. Data Handling: ensures the security, confidentiality and appropriate use of all records and information stored, maintained, or transmitted by an organization, and guidelines for handling and disposal. This includes protection from unauthorized modification, destruction, or disclosure, whether intentional or accidental for information identified as personal identifying information. Data Backups: should be a critical requirement of all organizations for all records and information backup and archive solutions. Data integrity ensures that records and information is recoverable throughout its lifecycle. User Access: is the auditing of who is accessing what records and information. Information Itself: is auditing to assure that records and information is being accessed or read has neither been tampered with, nor been altered or damaged through human or system error since the time of the last authorized access. IT Security: is an audit on the level of information security. Within the broad scope of auditing information security, there are multiple types of audits, multiple objectives for different audits, etc. Most commonly the controls being audited can be categorized to technical, physical and administrative. Auditing information security covers topics from

4 auditing the physical security of data centers to auditing the logical security of databases and highlights key components to look for and different methods for auditing these areas. Organization Policy: is policy that an organization implements for the acceptable usage of its e mail system. Usage Rules: are rules installed by an organization that dictates user behavior for e mail usage. Retention & Disposition: See Records Management Retention & Disposition. Disposal Policy: See Records Management Disposal Policy. Archive: See Records Management Archive. Information Governance (IG) training is critical so that organization staff members acquire knowledge, skills, and competencies to perform records and information management job functions. IG training has specific goals of improving staff member capabilities, capacities, productivity and performance in managing records and information. BST provides a wide variety of solutions for IG whether an organization wants to reduce the risk of litigation, cut back on the use of paper, or utilize the latest digital imaging technologies for "info efficiency." Information Governance Holistic Apporach Dynamics Holism is the idea that systems (Records and Information, Information Governance, Information Technology, organizations, or any other "system") and their properties should be viewed as wholes and not as collections of parts. This often includes the view that systems function as wholes and that their functioning cannot be fully understood solely in terms of their component parts. For example, in branding, a "holistic brand" is considering the entire brand or image of the organization. Holistic Approach Dynamics (HAD) is a concept that was developed by BST and is utilized to implement an organization's information solution whether it is the deployment of an efficiency application such as a document/records solution, or the design and development of a website that promotes an organization's information solution. In either case, the end result is an overall "attainable information solution." Information Governance Holistic Approach Dynamics (HAD) Concept

5 Click on link to jump to section Facts Policy Program Facilities Purpose Outreach Education Buy in Support

6 Information is an asset Information has purpose Information has sources & targets Information has deadlines Information has consumers Information carries obligations Information carries risks Information has many forms Information isn't immortal Information demands accountability In forward thinking organizations, an Information Governance Manager (IGM) should be on the organizational chart in a solidified position. The IGM should also a part of the executive level interactions. The IGM is the authority on the lifecycle of records and information which includes understanding where it resides, records retention and disposition policies, and archival procedures. The IGM provides the leadership and a framework for an organization to be assured that information processes are appropriately secure and legal. At first glance it may seem like the most expedient approach to information is for the IGM to create the records and information policies based on his/her knowledge of laws and regulations and then just communicate these rules out to the organization. This has an appealing simplicity but it ignores some basic realities. Information touches virtually every function within the organization and a failure to understand the needs of various organization personnel can ultimately derail the success of an information program. In all organizations there is an IT department, business units, legal departments, and records and information is stored in multiple systems and datacenters. Laws and regulations are always changing so the input of legal counsel is vital. The best approach is to make sure that the relevant stakeholders are included in the process from the early stages. This requires the need for an "Information Governance Steering Committee." The foundation of any information program should always be in the form of a solid, comprehensive Records and Information Management (RIM) policy. It is fundamentally important for organizations to develop information policy for a variety for reasons including compliance, risk of audit and knowledge for personnel to form educated attitudes about information. An organization without information policy is an organization without information control. If there are no

7 formal documented policies, then organization personnel at any level have no guidance on how to make information decisions. Information Governance (IG) is the set of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting an organization's immediate and future regulatory, legal, risk, environmental and operational requirements. Information Technology (IT) is the application of computers and telecommunications equipment to store, retrieve, transmit and manipulate data, often in the context of a business or other enterprise. It makes sense to be separate IG from IT and have IG as a standalone program. The objectives of IG and IT are not the same in most ways. IG agendas and business processes are very different from IT. IG should be a customer of IT much like HR or Finance, etc. Support of backend infrastructure is on IT servers, databases, etc. Development of information policy, support of frontend components such as the applications, scanners, etc., and direct personnel support is on IG. A dedicated office area where a records and information program is managed and policy is developed. It also is a location to stage documents for preparation for scanning, sorting, classifying or archival determination. Adequate areas for the storage of physical records whether it is onsite or at an offsite location these areas can be secure. A secure area where Information Technology infrastructure exits and houses servers and storage area networks. The servers house databases and applications that are the backend of an electronic document management system and storage area networks house digital information. Information goals are general guidelines that explain how organizations manage and govern information. They are usually long term and represent visions. Information objectives define strategies or implementation steps to attain the identified goals. Unlike goals, objectives are specific, measurable, and have a defined completion date. They are more specific and outline the who, what, when, where, and how of reaching information goals. Outreach is an organization s active involvement in providing their personnel with knowledge of records and information management. It also teaches and promotes overall best practices.

8 Not everyone in the organization is a records and information professional but all personnel should have knowledge of basic information management fundamentals. Sometimes information managers and end users don t speak the same language, and it s sometimes difficult for information managers to break down technical topics in a way users can understand. Educating users is essential so that all of organization's personnel are on the same page when it comes to information management. Buy in is the acceptance of, and commitment to a specific concept or course of action. Buy in is used in the context of an organization's "people" agreeing to accept something and provide their support of information programs. Executive Management Support is when an organization's high level managers support the endeavors of records and information management in the organization. Holistic Approach Dynamics is a trademark of Blu Star Techs LLC Holistic Information Governance 1. Information is an organizational asset In the course of our careers, we produce and receive information. It doesn t belong to us, it belongs to the organization. As such, we need to treat it like any other organizational asset. Even if you use a personal device to produce the information, it still belongs to the organization. Assets have acquisition costs, maintenance costs, residual value (sometimes), and get disposed of at the end of their useful lives. This very much applies to information also. 2. Understand what you re using information for How does information help organizations achieve strategic objectives? A government entity and a direct to consumer sales organization may use some of the same information, but they will use it differently and for different purposes. Understanding what you re using information for helps organizations understand what information they actually need. 3. Understand where information is coming from and where it s going to Information doesn t magically appear; it comes from somewhere someone. Organizations need to identify their internal and external information sources. Most organizations don t just create information ad hoc. Information is intended for specific audiences and for specific purposes. Organizations need to understand what effect their information is intended to have, and who wants or needs it. 4. Understand when you need information Information is needed at various points in the business and decision making processes. Is real time information really necessary or can you wait a few minutes or hours for it? Figure out when information is actually needed in order to make a decision. 5. Understand who can and should be using information, and for what This is not just about security, though that s a big piece. This is also about getting the information out to those who need it or to those that organizations want to influence with it. Once the information has found its way to the audience, what are they going to do with it? Are they going to make a decision, buy something, receive a benefit?

9 6. Understand your social, regulatory, and compliance obligations Depending on what you do and for whom you do it, you have information related obligations. Some of these are imposed by statute, some by convention, and some are self imposed. These obligations determine how long you must keep information, what you can do with it at the end of its life cycle, and to whom you may or must disclose it when asked. 7. Understand information related risks (too much, not enough, disclosure, etc.) If some organization information leaks, what re the consequences and can you live with them? If organizations are overwhelmed by information how does it impact performance? If organizations are missing information can they still get things done? How likely is the organization to be sued? 8. Understand how stakeholders are interacting with information It s not enough to know what an organization's stakeholders are doing with information. Organizations need to figure out how they re doing it. It s not enough to identify the types and locations of devices that stakeholders are using; organizations also need to find out if the interactions are passive or active. 9. With few exceptions, information has a finite useful life Unless an organization's information has historical/archival/archeological value, get rid of it as soon as you can. It s not just about the whole discovery/litigation thing; it s also about de cluttering and being info efficient. Information is a perishable good; once it s stale or rotted, get rid of it. 10. Make someone accountable for information Overall organizational performance, financial performance, legal, technology they all have single role accountability and responsibility. As, arguably, the second most important asset of an organization, information deserves at least the same level of attention as finance, IT, HR, legal, etc. A C level executive needs to be accountable for how information is governed and managed across the organization.

How To Manage Records And Information Management In Alberta

How To Manage Records And Information Management In Alberta 8. RECORDS AND INFORMATION MANAGEMENT Overview This chapter is intended to help public bodies understand how good records and information management practices assist in the effective administration of

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,

More information

United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008

United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 United Cerebral Palsy of Greater Chicago Records and Information Management Policy and Procedures Manual, December 12, 2008 I. Introduction United Cerebral Palsy of Greater Chicago ( UCP ) recognizes that

More information

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT POLICY Statement of Intent This policy establishes the general responsibilities for management, retention, and disposition of SOUTHWEST VIRGINIA

More information

Guidelines. Managing E-mail Records. Office of the Secretary of State. Approved and Recommended by the State Records Commission February 22, 2001

Guidelines. Managing E-mail Records. Office of the Secretary of State. Approved and Recommended by the State Records Commission February 22, 2001 Guidelines Managing E-mail Records Approved and Recommended by the State Records Commission February 22, 2001 Office of the Secretary of State Introduction Most everyone would agree that e-mail has changed

More information

Corporate Records Management Policy

Corporate Records Management Policy Corporate Records Management Policy Introduction Part 1 Records Management Policy Statement. February 2011 Part 2 Records Management Strategy. February 2011 Norfolk County Council Information Management

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY POLICY STATEMENT The records of Legal Aid NSW are a major component of its corporate memory and risk management strategies. They are a vital asset that support ongoing operations

More information

Non-Profit Records Management Tool Kit

Non-Profit Records Management Tool Kit Non-Profit Records Management Tool Kit January 2013 Contents Introduction.... 3 Generally Accepted Record Keeping Principles.... 4 What is a Record?.... 5 File Maintenance.... 6 Classifying a Record.....8

More information

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM

PINAL COUNTY POLICY AND PROCEDURE 2.50 ELECTRONIC MAIL AND SCHEDULING SYSTEM PINAL COUNTY POLICY AND PROCEDURE 2.50 Subject: ELECTRONIC MAIL AND SCHEDULING SYSTEM Date: November 18, 2009 Pages: 1 of 5 Replaces Policy Dated: April 10, 2007 PURPOSE: The purpose of this policy is

More information

PROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data.

PROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data. Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act, RSA 2000, c.a-18; Electronic Transactions Act, SA 2001, c.e- 5.5; Freedom of

More information

Council Policy. Records & Information Management

Council Policy. Records & Information Management Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant

More information

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009 State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers

More information

Data controllers and data processors: what the difference is and what the governance implications are

Data controllers and data processors: what the difference is and what the governance implications are ICO lo : what the difference is and what the governance implications are Data Protection Act Contents Introduction... 3 Overview... 3 Section 1 - What is the difference between a data controller and a

More information

About Your Email Policy Kit

About Your Email Policy Kit Email Policy Kit About Your Email Policy Kit About Your Email Policy Kit... 2 Email Policy 101... 3 Designing an Email Policy: Key Sections... 4 Sample Records Retention Policy for Electronic Mail... 11

More information

BPA Policy 236-1 Information Governance & Lifecycle Management

BPA Policy 236-1 Information Governance & Lifecycle Management B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy 236-1 Table of Contents 236-1.1 Purpose & Background... 2 236-1.2 Policy Owner... 2 236-1.3 Applicability... 2 236-1.4 Terms & Definitions...

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Rowan University Data Governance Policy

Rowan University Data Governance Policy Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data

More information

UNIVERSITY OF MANITOBA PROCEDURE

UNIVERSITY OF MANITOBA PROCEDURE UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Issued by: Senior Information Risk Owner Policy Classification: Policy No: POLIG001 Information Governance Issue No: 1 Date Issued: 18/11/2013 Page No: 1 of 16 Review Date:

More information

Scotland s Commissioner for Children and Young People Records Management Policy

Scotland s Commissioner for Children and Young People Records Management Policy Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives

More information

ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS

ACCESS, PRODUCTION AND RETENTION OF CITY RECORDS 1.05-3 1 of 6 I. PURPOSE This directive prescribes the rules regarding access, production, and retention of City records. II. POLICY A. All records and other matters in City offices are presumed to be

More information

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services

Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...

More information

Information Management Advice 50 Developing a Records Management policy

Information Management Advice 50 Developing a Records Management policy Information Management Advice 50 Developing a Records Management policy Introduction This advice explains how to develop and implement a Records Management policy. Policy is central to the development

More information

NCI-Frederick Safety and Environmental Compliance Manual 03/2013

NCI-Frederick Safety and Environmental Compliance Manual 03/2013 E-1. Records Management I. Scope The Records Management Office maintains a comprehensive records management system meeting regulatory and contractual requirements ensuring documentation is readily accessible.

More information

FDU - Records Retention policy Final.docx

FDU - Records Retention policy Final.docx Records and Information Management Program Policy and Procedure Responsible Office Office of the General Counsel Effective Date 04/01/2012 Responsible Official General Counsel Last Revision I. Rationale

More information

RECORDKEEPING MATURITY MODEL

RECORDKEEPING MATURITY MODEL Introduction Maturity Rating Definitions 1 Level 1 Inadequate/Sub-standard Practice is not formalised or documented. Processes and practices are fragmented or non-existent. Where processes and practices

More information

LONDON PUBLIC LIBRARY POLICY

LONDON PUBLIC LIBRARY POLICY PURPOSE The purpose of this policy is to: Ensure accessibility to accurate, authentic and reliable London Public Library Records in all formats, including electronic, to meet legislated requirements, support

More information

Information Management Policy CCG Policy Reference: IG 2 v4.1

Information Management Policy CCG Policy Reference: IG 2 v4.1 Information Management Policy CCG Policy Reference: IG 2 v4.1 Document Title: Policy Information Management Document Status: Final Page 1 of 15 Issue date: Nov-2015 Review date: Nov-2016 Document control

More information

Wright State University Information Security

Wright State University Information Security Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified

More information

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE:

Policy No: TITLE: EFFECTIVE DATE: CANCELLATION: REVIEW DATE: Policy No: TITLE: AP-AA-17.2 Data Classification and Data Security ADMINISTERED BY: Office of Vice President for Academic Affairs PURPOSE EFFECTIVE DATE: CANCELLATION: REVIEW DATE: August 8, 2005 Fall

More information

Guidelines on Data Protection. Draft. Version 3.1. Published by

Guidelines on Data Protection. Draft. Version 3.1. Published by Guidelines on Data Protection Draft Version 3.1 Published by National Information Technology Development Agency (NITDA) September 2013 Table of Contents Section One... 2 1.1 Preamble... 2 1.2 Authority...

More information

CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006)

CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) CHAPTER 9 RECORDS MANAGEMENT (Revised April 18, 2006) WHAT IS THE PURPOSE OF RECORDS MANAGEMENT? 1. To implement a cost-effective Department-wide program that provides for adequate and proper documentation

More information

Records Management. Training 101

Records Management. Training 101 Records Management Training 101 Learning Objectives This training is designed to help you: Understand the importance of Records Management and why records are maintained Understand your RM responsibilities

More information

INTERNATIONAL SOS. Data Protection Policy. Version 1.05

INTERNATIONAL SOS. Data Protection Policy. Version 1.05 INTERNATIONAL SOS Data Protection Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: December 2008 Revised: 2015 All copyright in these materials are reserved to AEA

More information

California State University, Sacramento INFORMATION SECURITY PROGRAM

California State University, Sacramento INFORMATION SECURITY PROGRAM California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...

More information

September 28 2011. Tsawwassen First Nation Policy for Records and Information Management

September 28 2011. Tsawwassen First Nation Policy for Records and Information Management Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION

More information

Section 28.1 Purpose. Section 28.2 Background. DOT Order 1351.28 Records Management. CIOP Chapter 1351.28 RECORDS MANAGEMENT

Section 28.1 Purpose. Section 28.2 Background. DOT Order 1351.28 Records Management. CIOP Chapter 1351.28 RECORDS MANAGEMENT CIOP Chapter 1351.28 RECORDS MANAGEMENT TABLE OF CONTENTS Section 28.1 Purpose... 1 Section 28.2 Background... 1 Section 28.3 Scope and Applicability... 2 Section 28.4 Definitions... 4 Section 28.5 Policy...

More information

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT

LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT LEGISLATION COMMITTEE OF THE CROATIAN PARLIAMENT 2300 Pursuant to its authority from Article 59 of the Rules of Procedure of the Croatian Parliament, the Legislation Committee determined the revised text

More information

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline) David J. Chavolla, Esq. and Gary L. Kemp, Esq. Casner & Edwards, LLP 303 Congress Street Boston, MA 02210 A. Document and Record Retention Preservation

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES

COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES Page 1 of 6 SP 3-125d COLORADO COMMUNITY COLLEGE SYSTEM SYSTEM PRESIDENT S PROCEDURE ELECTRONIC COMMUNICATIONS MANAGEMENT AND RETENTION PROCEDURES EFFECTIVE: June 14, 2009 REFERENCE: BP 3-125; Electronic

More information

Information Management

Information Management G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,

More information

THOMAS R FINNERAN PRINCIPAL CONSULTANT - IDENNEDY PROJECT

THOMAS R FINNERAN PRINCIPAL CONSULTANT - IDENNEDY PROJECT Privacy Engineering for Cloud and Geolocation and Data Governance THOMAS R FINNERAN PRINCIPAL CONSULTANT - IDENNEDY PROJECT Some Privacy Requirement Questions related to the Cloud How does Cloud Provider

More information

PHI Air Medical, L.L.C. Compliance Plan

PHI Air Medical, L.L.C. Compliance Plan Page No. 1 of 13 Introduction: The PHI Air Medical, L.L.C. is to be used by employees, contractors and vendors to get a high level understanding of the key regulatory requirements relating to our participation

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY Version 8.0 Purpose: For use by: This document is compliant with /supports compliance with: To outline the lifecycle of a record and to provide guidance on retention and disposal

More information

FARMINGTON PUBLIC SCHOOLS 2410

FARMINGTON PUBLIC SCHOOLS 2410 FARMINGTON PUBLIC SCHOOLS 2410 Administration Retention of Electronic Records and Information I. POLICY The Board of Education (the Board ) complies with all state and federal regulations regarding the

More information

OFFICIAL. NCC Records Management and Disposal Policy

OFFICIAL. NCC Records Management and Disposal Policy NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy

More information

The Next Frontier. for Records Managers. Retention and Disposition of Structured Data:

The Next Frontier. for Records Managers. Retention and Disposition of Structured Data: Retention and Disposition of Structured Data: The Next Frontier for Records Managers Establishing a relationship with IT managers and learning about the basics of system technology will help the records

More information

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY

ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY ELECTRONIC COMMUNICATION & INFORMATION SYSTEMS POLICY I. ELECTRONIC COMMUNICATION A. PURPOSE To better serve our citizens and give our workforce the best tools to do their jobs, the Common Council of the

More information

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention

State of Michigan Records Management Services. Frequently Asked Questions About E mail Retention State of Michigan Records Management Services Frequently Asked Questions About E mail Retention It is essential that government agencies manage their electronic mail (e mail) appropriately. Like all other

More information

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers

Office of the Data Protection Commissioner of The Bahamas. Data Protection (Privacy of Personal Information) Act, 2003. A Guide for Data Controllers Office of the Data Protection Commissioner of The Bahamas Data Protection (Privacy of Personal Information) Act, 2003 A Guide for Data Controllers 1 Acknowledgement Some of the information contained in

More information

9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4

9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4 9. GOVERNANCE Policy 9.8 RECORDS MANAGEMENT POLICY Version 4 9. GOVERNANCE 9.8 RECORDS MANAGEMENT POLICY OBJECTIVES: To establish the framework for, and accountabilities of, Lithgow City Council s Records

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

Administrative Procedure

Administrative Procedure Administrative Procedure Number: 707 Effective: 5/13/2011 Supersedes: INTERIM Page: 1 of 11 Subject: RECORDS RETENTION, MANAGEMENT, AND DISPOSITION PROGRAM 1.0. PURPOSE: 1.1. To establish and administer

More information

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management

More information

SUTLEJ TEXTILES AND INDUSTRIES LIMITED DOCUMENT PRESERVATION AND RETENTION POLICY

SUTLEJ TEXTILES AND INDUSTRIES LIMITED DOCUMENT PRESERVATION AND RETENTION POLICY SUTLEJ TEXTILES AND INDUSTRIES LIMITED DOCUMENT PRESERVATION AND RETENTION POLICY Date: December 1, 2015 Page 1 of 8 Table of Contents 1. Concept 03 1.1 Background 1.2Title&Scope 1.3 Objective of the Policy

More information

Institutional Data Governance Policy

Institutional Data Governance Policy Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.

More information

Policy for the Acceptable Use of Information Technology Resources

Policy for the Acceptable Use of Information Technology Resources Policy for the Acceptable Use of Information Technology Resources Purpose... 1 Scope... 1 Definitions... 1 Compliance... 2 Limitations... 2 User Accounts... 3 Ownership... 3 Privacy... 3 Data Security...

More information

Cloud Computing and Records Management

Cloud Computing and Records Management GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 srsarecordsmanagement@sa.gov.au www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version

More information

Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2

Table of Contents. Chapter No. 1. Introduction 1. 2. Objective 1. 3. E-mail Use Compliance 1. 4. Definitions 2. 5. Roles and Responsibilities 2 Table of Contents Chapter Subject Page No. 1. Introduction 1 2. Objective 1 3. E-mail Use Compliance 1 4. Definitions 2 5. Roles and Responsibilities 2 6. Creation and Use of E-mails 3 7. Managing E-mails

More information

Caldwell Community College and Technical Institute

Caldwell Community College and Technical Institute Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative

More information

Issues to Address: The Privacy Concerns of Individuals

Issues to Address: The Privacy Concerns of Individuals July 21, 2009 The Honorable Michael J. Astrue Commissioner Social Security Administration 6401 Security Boulevard Baltimore, MD 21235-7703 Dear Mike: As you requested, the ABA explored the issues related

More information

Disposal Authorisation for Information and Technology Management Records. Administrative Schedule No. 4

Disposal Authorisation for Information and Technology Management Records. Administrative Schedule No. 4 Disposal Authorisation for Information and Technology Management Records Administrative Schedule No. 4 July 2014 AUTHORISATION FOR THE COMMENCEMENT OF THIS SCHEDULE Issued under the National Archive and

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

E-MAIL RETENTION BEST PRACTICE. Issue Date: April 20, 2011. Intent and Purpose:

E-MAIL RETENTION BEST PRACTICE. Issue Date: April 20, 2011. Intent and Purpose: E-MAIL RETENTION BEST PRACTICE Issue Date: April 20, 2011 Intent and Purpose: The intent of this best practice is for county officials to have an educational mechanism to explain requirements for maintaining

More information

Information and Compliance Management Information Management Policy

Information and Compliance Management Information Management Policy Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Southern Law Center Law Center Policy #IT0004. Title: Email Policy

Southern Law Center Law Center Policy #IT0004. Title: Email Policy Southern Law Center Law Center Policy #IT0004 Title: Email Policy Authority: Department Original Adoption: 7/20/2007 Effective Date: 7/20/2007 Last Revision: 9/17/2012 1.0 Purpose: To provide members of

More information

Records Management Policy.doc

Records Management Policy.doc INDEX Pages 1. DESCRIPTORS... 1 2. KEY ROLE PLAYERS... 1 3. CORE FUNCTIONS OF THE RECORDS MANAGER... 1 4. CORE FUNCTIONS OF THE HEAD OF REGISTRIES... 1 5. PURPOSE... 2 6. OBJECTIVES... 2 7. POLICY... 2

More information

University of Louisiana System

University of Louisiana System Policy Number: M-17 University of Louisiana System Title: RECORDS RETENTION & Effective Date: OCTOBER 10, 2012 Cancellation: None Chapter: Miscellaneous Policy and Procedures Memorandum Each institution

More information

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose

ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE EQUIPMENT PROCEDURE. Purpose ST. CLOUD STATE UNIVERSITY INSTALLATION AND USE OF VIDEO SURVEILLANCE TYPE OF PROCEDURE: ADMINISTRATIVE EQUIPMENT PROCEDURE Title: Installation and Use of Video Surveillance Equipment Procedures Related

More information

ARMA: Information Governance: A Revenue Source Potential

ARMA: Information Governance: A Revenue Source Potential ARMA: Information Governance: A Revenue Source Potential Presenter: Martin Tuip Executive Director for IG Products ARMA International Agenda About ARMA International What is Information Governance? Generally

More information

Introduction Thanks Survey of attendees Questions at the end

Introduction Thanks Survey of attendees Questions at the end Introduction Thanks Survey of attendees Questions at the end 1 Electronic records come in a variety of shapes and sizes and are stored in a multitude of ways. Just what are you managing? Video Cloud computing

More information

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES

RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information

More information

PHI- Protected Health Information

PHI- Protected Health Information HIPAA Policy 2014 The Health Insurance Portability and Accountability Act is a federal law that protects the privacy and security of patients health information and grants certain rights to patients. Clarkson

More information

Privacy Policy. February, 2015 Page: 1

Privacy Policy. February, 2015 Page: 1 February, 2015 Page: 1 Revision History Revision # Date Author Sections Altered Approval/Date Rev 1.0 02/15/15 Ben Price New Document Rev 1.1 07/24/15 Ben Price Verify Privacy Grid Requirements are met

More information

2.82.010 Government records findings--recognition of public policy.

2.82.010 Government records findings--recognition of public policy. Chapter 2.82 RECORDS MANAGEMENT 2.82.010 Government records findings--recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake County

More information

Document Management in the FIPPA Era

Document Management in the FIPPA Era Document Management in the FIPPA Era Kathryn Frelick DISCLAIMER This Coffee Talk presentation is provided as an information service and is not meant to be taken as legal opinion or advice. Please do not

More information

8 REASONS TO OUTSOURCE RECORDS MANAGEMENT

8 REASONS TO OUTSOURCE RECORDS MANAGEMENT Contents: Untapped Opportunity 8 REASONS TO OUTSOURCE RECORDS MANAGEMENT Before you decide to manage your own records, take a minute to think inside the box. In this report, you will learn some of the

More information

Part 2: Records and Information Management: Creation and Use

Part 2: Records and Information Management: Creation and Use Records and Information Management: Creation and Use Part 2: Records and Information Management: Creation and Use Creating Records and Information Information Capture and Use Legal Compliance Risk Assessment

More information

Personal Data Act (1998:204);

Personal Data Act (1998:204); Personal Data Act (1998:204); issued 29 April 1998. Be it enacted as follows. General provisions Purpose of this Act Section 1 The purpose of this Act is to protect people against the violation of their

More information

STATE OF WYOMING Electronic Mail Policy

STATE OF WYOMING Electronic Mail Policy Introduction: STATE OF WYOMING Electronic Mail Policy Pursuant to Executive Order 1999-4 dated the 23rd of December, 1999 Electronic mail (e-mail) enables the user to send and receive messages, make appointments,

More information

METRO REGIONAL GOVERNMENT Records Retention Schedule

METRO REGIONAL GOVERNMENT Records Retention Schedule Program: Administration IS Administration provides strategic planning, direction, and central management oversight of the Information Services that includes the following programs: Desktop Support Services,

More information

Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s):

Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s): Title: Category: Administration Information Management Policy No.: B5010 Replaces: B5010 Applicability: All Employees Effective Date: December 6, 2005; revised January 27, 2009 Source(s): Approval: (President

More information

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE

APPROVED BY: Signatures on File Chief Information Officer APPROVED BY: Chief Financial Officer PURPOSE TITLE: COMPUTER USE POLICY PAGE 1 OF 5 EFFECTIVE DATE: 07/2001 REVIEW DATES: 02/2003, 09/2006 REVISION DATES: 03/2005, 03/2008 DISTRIBUTION: All Departments PURPOSE APPROVED BY: Signatures on File Chief

More information

AUDIT REPORT. The Energy Information Administration s Information Technology Program

AUDIT REPORT. The Energy Information Administration s Information Technology Program U.S. Department of Energy Office of Inspector General Office of Audits and Inspections AUDIT REPORT The Energy Information Administration s Information Technology Program DOE-OIG-16-04 November 2015 Department

More information

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks; Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document

More information

Chapter 2.82 - RECORDS MANAGEMENT Sections:

Chapter 2.82 - RECORDS MANAGEMENT Sections: Chapter 82 - RECORDS MANAGEMENT Sections: 8010 - Government records findings Recognition of public policy. The council of Salt Lake County finds the following: A. It is in the best interests of Salt Lake

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

How To Ensure Health Information Is Protected

How To Ensure Health Information Is Protected pic pic CIHI Submission: 2011 Prescribed Entity Review October 2011 Who We Are Established in 1994, CIHI is an independent, not-for-profit corporation that provides essential information on Canada s health

More information

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT PROGRAM. Revised January 15, 2014

SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT PROGRAM. Revised January 15, 2014 SOUTHWEST VIRGINIA COMMUNITY COLLEGE RECORDS MANAGEMENT PROGRAM Revised January 15, 2014 Page 1 Introduction In compliance with the Code of Virginia, Section 42.1085, Southwest Virginia Community College

More information

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy...

Records Management - Council Policy Version 2-28 April 2014. Council Policy. Records Management. Table of Contents. Table of Contents... 1 Policy... Council Policy Records Management Table of Contents Table of Contents... 1 Policy... 2 Policy Objectives... 2 Policy Statement... 2 Records Management Program... 2 Accountability Requirements... 3 General

More information

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy.

1.5 The Information Governance Policy should be read in conjunction with the Information Governance Strategy. Title: Reference No: NHSNYYIG - 007 Owner: Author: INFORMATION GOVERNANCE POLICY Director of Standards First Issued On: September 2010 Latest Issue Date: February 2012 Operational Date: February 2012 Review

More information

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY

DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY DEALERSHIP IDENTITY THEFT RED FLAGS AND NOTICES OF ADDRESS DISCREPANCY POLICY This Plan we adopted by member, partner, etc.) on Our Program Coordinator (date). (Board of Directors, owner, We have appointed

More information

Information Security and Electronic Communications Acceptable Use Policy (AUP)

Information Security and Electronic Communications Acceptable Use Policy (AUP) Policy No.: AUP v2.0 Effective Date: August 16, 2004 Revision Date: January 17, 2013 Revision No.: 1 Approval jwv / mkb Information Security and Electronic Communications (AUP) 1. INTRODUCTION Southwestern

More information