OCIO Directive on Instant Messaging. Presented by: Lori Collins Information Management Branch February 21, 2012

Size: px
Start display at page:

Download "OCIO Directive on Instant Messaging. Presented by: Lori Collins Information Management Branch February 21, 2012"

Transcription

1 OCIO Directive on Instant Messaging Presented by: Lori Collins Information Management Branch February 21, 2012

2 Overview Instant Messages Directive on Instant Messaging Resources Questions/Discussion

3 Instant Messages Instant messaging is a form of real-time, direct communication between two or more parties using personal computers or other devices Examples of instant messaging include: Pin-to-Pin messaging allows private text exchanges between Blackberry devices. A PIN is a unique Blackberry address code similar to a tracking or phone number that is used to transmit messages to other PIN numbers Blackberry Messenger (BBM) is a proprietary Instant Messenger application included on BlackBerry devices and only possible between two BlackBerry devices SMS Text Messaging is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices

4 Instant Messages Instant messages tend to brief one or two lines and conversational in nature. These factors reduce the ability of an instant message to be a complete and reliable record of business activity Transitory Records is defined as: a government record of temporary usefulness in any format or medium having no ongoing value beyond an immediate and minor transaction or the preparation of a subsequent record. Instant messages can be used to facilitate the flow of business. For example: I m on my way to the meeting I will be out for the afternoon This is a GREAT IM Community Session!

5 Directive on Instant Messaging OCIO is authorized to issues Directives under the Information Management and Protection Policy (TBM ) Compliance with the Instant Messaging Directive is mandatory for all government employees Instant messages are transitory records as defined in the Management of Information Act, are therefore not required to be retained and should be deleted on a regular basis Transitory records, including instant messages, are discoverable in the event of legal, audit, or Access to Information and Protection of Privacy Act requests

6 Directive on Instant Messaging OCIO does not record, retain or back-up Pin-to-Pin, SMS or Blackberry Messenger Messages It is the responsibility of individuals using instant messaging technology to delete instant messages stored on their devices Most devices (e.g., Blackberries) have significant memory Users are advised that regular deletion of instant messages is considered to be best practice Messages will be stored on devices for varying periods of time dependent upon how the device is configured Messages may be automatically deleted after a pre-set time period or they may simply begin to be automatically deleted when the storage capacity of the device is full OCIO can provide advice about how to determine which of these options applies in individual cases

7 Directive on Instant Messaging In the event that an instant message communication Individuals are advised to transfer instant message content reflective of government business to an appropriate format for management as a government record (e.g., forward a Pin to Pin or BBM message to your ; which is retained and backed-up by OCIO) Individuals are advised to contact the OCIO IT Service Desk if they have questions: The configuration of their technology of mobile device How to delete messages How to transfer instant messages to a supported format

8 Resources Instant Messaging Directive FYI on Instant Messaging FAQ on Instant Messaging Contact for information related to the Instant Messaging Directive Contact the OCIO IT Service Desk HELP (4357) or for information related to technology including how to delete instant messages or transfer instant messages to an alternative format

9 Questions? Lori Collins

Supersedes Policy previously approved by TBM

Supersedes  Policy previously approved by TBM Document Title: Email Policy Pages Document Type: Policy 6 No. Of Scope: Government of Newfoundland and Labrador (GNL) Trim # DOC15481/2009 Revision ( # ) 27 Treasury Board Approval ( # ) TBM2009-298 Supersedes

More information

4.2 Electronic Mail Policy

4.2 Electronic Mail Policy Policy Statement E-mail is an accepted, efficient communications tool for supporting departmental business. As provided in the Government Records Act, e-mail messages are included in the definition of

More information

Enterprise Mobility Management

Enterprise Mobility Management B L A C K B E R R Y K E E P S Y O U R B U S I N E S S M O V I N G Enterprise Mobility Management Perfectly balancing end-user and corporate needs 800.972.3922 + Enterprise mobility is enabling organizations

More information

GOVERNMENT OF ONTARIO COMMON RECORDS SERIES TRANSITORY RECORDS

GOVERNMENT OF ONTARIO COMMON RECORDS SERIES TRANSITORY RECORDS GOVERNMENT OF ONTARIO COMMON RECORDS SERIES December 8, 2008 These series govern the retention and disposal of the transitory records (in paper, electronic, and other formats) created and received by the

More information

GOVERNMENT S WIRELESS NETWORK

GOVERNMENT S WIRELESS NETWORK Government of Newfoundland and Labrador Office of the Chief Information Officer GOVERNMENT S WIRELESS NETWORK FREQUENTLY ASKED QUESTIONS November 2012 Table of Contents 1.0 Introduction... 1 2.0 Accessing

More information

NOTICE OF PRIVACY PRACTICES

NOTICE OF PRIVACY PRACTICES NOTICE OF PRIVACY PRACTICES Chmura Orthodontics ( Practice ) understands the important of keeping your personal information private. Personal information includes: your name, postal address, e-mail address,

More information

To help customers achieve GDPR compliance, Freshchat has introduced the following new features:

To help customers achieve GDPR compliance, Freshchat has introduced the following new features: GDPR FAQ Here are some frequently asked questions from Freshchat customers. To save customer time and effort, we ve collated information and instructions on how Freshchat tackles requirements of the GDPR.

More information

Microsoft Skype for Business

Microsoft Skype for Business Microsoft Skype for Business The Next generation of LYNC IM Community OCIO - Operations & Security September 27, 2017 Agenda Past Present Capabilities Statistics Use Cases Challenges Future Skype for Business

More information

These features enable you to perform successful and efficient support session for your employees.

These features enable you to perform successful and efficient support session for your employees. REMOTE CARE - FAQs REMOTE CARE - BUSINESS FAQ'S What CommuniTake Remote Care (CRC) is for? With CommuniTake Remote Care (CRC) you can remotely view and operate an employee s mobile phone as if you are

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

GOVERNMENT S WIRELESS NETWORK

GOVERNMENT S WIRELESS NETWORK Government of Newfoundland and Labrador Office of the Chief Information Officer GOVERNMENT S WIRELESS NETWORK FREQUENTLY ASKED QUESTIONS June 2012 Table of Contents 1.0 Introduction... 1 2.0 Accessing

More information

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs

Multi-Platform Enterprise Mobility Management. Perfectly balancing end-user and corporate needs B U I L T T 0 K E E P Y O U R B U S I N E S S M O V I N G Multi-Platform Enterprise Mobility Management Perfectly balancing end-user and corporate needs Enterprise mobility is enabling organizations to

More information

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY

Department of Veterans Affairs VA DIRECTIVE April 17, 2006 WEB PAGE PRIVACY POLICY Department of Veterans Affairs VA DIRECTIVE 6502.3 Washington, DC 20420 Transmittal Sheet WEB PAGE PRIVACY POLICY 1. REASON FOR ISSUE: To establish policy for the Department of Veterans Affairs (VA) for

More information

UTAH VALLEY UNIVERSITY Policies and Procedures

UTAH VALLEY UNIVERSITY Policies and Procedures Page 1 of 6 POLICY TITLE Section Subsection Responsible Office Retention of Electronic Files Facilities, Operations, and Information Technology Information Technology Office of the Vice President of Finance

More information

Critical HIPAA Privacy & Security Crossover Areas

Critical HIPAA Privacy & Security Crossover Areas Critical HIPAA Privacy & Security Crossover Areas Presented by HIPAA Solutions, LC Peter MacKoul, JD Senior Privacy SME Ken Hughes Senior Security SME HIPAA Solutions, LC 2016 1 Critical HIPAA Privacy

More information

Why records management matters top 10 reasons

Why records management matters top 10 reasons Clean up Days! Clean up Days! Why records management matters top 10 reasons 1. To control growth and creation of records 2. To reduce operating costs 3. To improve efficiency and productivity 4. To assimilate

More information

ELECTRONIC RECORDS MANAGEMENT

ELECTRONIC RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT @ Kris Justus Electronic Records Analyst Kentucky Department for Libraries & Archives (KDLA) Electronic Records and Email Management WHAT IS A PUBLIC RECORD? KRS 171.410 defines

More information

Downloading Office Communicator Mobile for BlackBerry, Windows Mobile, and Java enabled mobile devices.

Downloading Office Communicator Mobile for BlackBerry, Windows Mobile, and Java enabled mobile devices. Office Communicator Mobile / Download Software Page 1 of 9 Downloading Office Communicator Mobile for BlackBerry, Windows Mobile, and Java enabled mobile devices. 1. From any PC, navigate to http://www.apptix.com/webconferencing/

More information

Oracle Data Cloud ( ODC ) Inbound Security Policies

Oracle Data Cloud ( ODC ) Inbound Security Policies Oracle Data Cloud ( ODC ) Inbound Security Policies Contents Contents... 1 Overview... 2 Oracle Data Cloud Security Policy... 2 Oracle Information Security Practices - General... 2 Security Standards...

More information

Record Keeping Best Practice. Distinguish between University and Non-University Records

Record Keeping Best Practice. Distinguish between University and Non-University Records UNIVERSITY SECRETARIAT Gilmour Hall, Room 210 Phone: 905.525.9140, Ext. 24337 Board of Governors 1280 Main Street West Fax: 905.526.9884 Senate Hamilton, Ontario, Canada E-mail: univsec@mcmaster.ca L8S

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)

Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative

More information

The GDPR Are you ready?

The GDPR Are you ready? The GDPR Are you ready? kpmg.ie The GDPR - Overview The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) will come into force from 25th May 2018, replacing the existing data protection

More information

Where provided, the names and addresses of post holders within Public Bodies, Public Service Providers and Limited Companies.

Where provided, the names and  addresses of post holders within Public Bodies, Public Service Providers and Limited Companies. Oscar and GDPR Q&A 10 August 2017 Following extensive Legal Review during 2016 and consultation with the Direct Marketing Association, we have been preparing over the last two years for the implementation

More information

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development

Canada s Anti-Spam Legislation (CASL) What it means for Advisors. Distributor Learning & Development Canada s Anti-Spam Legislation (CASL) What it means for Advisors Distributor Learning & Development Learning objectives By the end of this session, you will be able to: Describe CASL and how it impacts

More information

Library and Archives Canada. Generic Application Guide for the Disposition Authorization for Transitory Records (DA 2016/001)

Library and Archives Canada. Generic Application Guide for the Disposition Authorization for Transitory Records (DA 2016/001) Library and Archives Canada Generic Application Guide for the Disposition Authorization for Transitory Records (DA 2016/001) Generic Application Guide for the Disposition Authorization for Transitory Records

More information

OATS SM Subscriber Initiation And Registration Form

OATS SM Subscriber Initiation And Registration Form (Use for Phase 3 registration) OATS SM Subscriber Initiation And Registration Form ***Please read all instructions carefully prior to filling out the form*** Please complete and return this Order Audit

More information

PCA Staff guide: Information Security Code of Practice (ISCoP)

PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Staff guide: Information Security Code of Practice (ISCoP) PCA Information Risk and Privacy Version 2015.1.0 December 2014 PCA Information Risk and Privacy Page 1 Introduction Prudential Corporation

More information

Application Decommissioning in Digital Transformation

Application Decommissioning in Digital Transformation Application Decommissioning in Digital Transformation Produced by In cooperation with MARCH 2018 CONTENTS Role of Application Decommissioning in Digital Transformation 3 What is application decommissioning?...

More information

Marketing Law in Canada Has Changed... Are You Ready?

Marketing Law in Canada Has Changed... Are You Ready? Email Marketing Law in Canada Has Changed... Are You Ready? Webinar May 29 th, 2014 Hosted by: Tracey Hart, Director of Marketing, Discover Boating Canada Presented by: Lonnie Brodkin-Schneider, Partner,

More information

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0

Vodafone Location Services. Privacy Management Code of Practice. Issued Version V1.0 Vodafone Location Services Privacy Management Code of Practice Issued Version V1.0 Issued Version 1.0 Page 1 of10 17/08/03 August 2003 Vodafone Limited. All rights reserved. CONTENTS 0. Overview.. 3 1.

More information

Smart guide to mobile call recording for MiFID II

Smart guide to mobile call recording for MiFID II Smart guide to mobile call recording for MiFID II Contents smart summary 3 MiFID II what is it? 4 Does MiFID II apply to my firm? 5 The options to stay compliant 6 smart guide for mobile call recording

More information

CISO View: Top 4 Major Imperatives for Enterprise Defense

CISO View: Top 4 Major Imperatives for Enterprise Defense CISO View: Top 4 Major Imperatives for Enterprise Defense James Christiansen Chief Information Security Officer Evantix, Inc. Gary Terrell CIPP Chief Information Security Officer Adobe Session ID: Star

More information

Regulatory Circular RG Members and Member Firm Organizations. Division of Member and Regulatory Services. Date: October 28, 2009

Regulatory Circular RG Members and Member Firm Organizations. Division of Member and Regulatory Services. Date: October 28, 2009 Regulatory Circular RG09-122 To: From: Members and Member Firm Organizations Division of Member and Regulatory Services Date: October 28, 2009 RE: Supervision of Electronic Communications and Electronic

More information

Skype for Business File Transfer

Skype for Business File Transfer File Transfer File Transfer enables users to send files to each other in a Peer-to-Peer scenario. Meeting Attachments allow users to upload files to a Conference Session for other users to download. The

More information

Vocera Secure Texting 2.1 FAQ

Vocera Secure Texting 2.1 FAQ General Description Q. What is Vocera Secure Texting? A. Vocera Secure Texting (VST) combines convenience with privacy by providing a secure, easy to use, HIPAA-compliant alternative to SMS as well as

More information

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley

Auditing Bring Your Own Devices (BYOD) Risks. Shannon Buckley Auditing Bring Your Own Devices (BYOD) Risks Shannon Buckley Agenda 1. Understanding the trend towards BYOD. 2. Weighing up the cost benefit vs. the risks. 3. Identifying and mitigating the risks. 4. Tips

More information

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9

COUNTY OF RIVERSIDE, CALIFORNIA BOARD OF SUPERVISORS POLICY. ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 ELECTRONIC MEDIA AND USE POLICY A-50 1 of 9 Purpose: The purpose of this policy is to establish guidelines for proper use of all forms of electronic media. As used in this policy, electronic media includes,

More information

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS

POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS POWER AND WATER CORPORATION POLICY MANAGEMENT OF EXTERNAL SERVICE PROVIDERS Prepared by: Approved by: Chief Procurement Officer John Baskerville Chief Executive File number: D2015/65737 June 2015 MANAGEMENT

More information

The Apple Store, Coombe Lodge, Blagdon BS40 7RG,

The Apple Store, Coombe Lodge, Blagdon BS40 7RG, 1 The General Data Protection Regulation ( GDPR ) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union ( EU ) and will be directly applicable in all EU Member

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

Achievements to remove and prevent barriers

Achievements to remove and prevent barriers Sonnet Insurance accessibility plan Introduction At Sonnet, we strive to meet the needs of our customers, partners, and employees with disabilities, and are actively working to remove and prevent barriers

More information

I-9 AND E-VERIFY VENDOR DUE DILIGENCE

I-9 AND E-VERIFY VENDOR DUE DILIGENCE I-9 AND E-VERIFY VENDOR DUE DILIGENCE WHITE PAPER I-9 and E-Verify Vendor Due Diligence Key questions to ask electronic I-9 vendors to ensure you are making the best choice for your business. 1. Vendor

More information

Presented by: Therese Mickelson, ABC!

Presented by: Therese Mickelson, ABC! Presented by: Therese Mickelson, ABC! ! Evolution of Web Web 2.0! Online conversations! Online networks! New journalism! Expect / Demand interaction ! Social Media the tools! Social Networking what you

More information

EMResource Resource Detail View

EMResource Resource Detail View EMResource Resource Detail View What is the Resource Detail View?...2 Updating Resource Information...3 Standard resource information fields...3 Status fields...4 The Contacts List...5 Instant Messaging

More information

MICROSOFT (MS) INTUNE IOS/ANDROID DEVICE ENROLLMENT

MICROSOFT (MS) INTUNE IOS/ANDROID DEVICE ENROLLMENT IS DIVISION MICROSOFT (MS) INTUNE IOS/ANDROID DEVICE ENROLLMENT FY 2018-2019 CONTENTS Introduction 3 Timeline 4 Getting Started 5 Content transfer guidelines 7 Page 2 INTRODUCTION BACKGROUND Microsoft

More information

ICE IM Compliance Overview

ICE IM Compliance Overview ICE IM Compliance Overview January 2017 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange, Inc. Copyright Intercontinental

More information

DIGITAL RECORDS MANAGEMENT GUIDELINES

DIGITAL RECORDS MANAGEMENT GUIDELINES DIGITAL RECORDS MANAGEMENT GUIDELINES This Digital Records Management Guidelines document will primarily address the following types of digital records: Email Media Born Digital Records Scanned Records

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

FPS004 Continuing Professional Development Policy

FPS004 Continuing Professional Development Policy FPS004 Continuing Professional Development Policy January 2019 FPS004 Continuing Professional Development Policy 1 Disclaimer and copyright. While FASEA endeavours to ensure the quality of this publication,

More information

Records Retention 101 for Local Government Agencies. Overview

Records Retention 101 for Local Government Agencies. Overview Records Retention 101 for Local Government Agencies YVCOG-hosted Training Union Gap, 9/21/2017 Washington State Archives Scott Sackett, Electronic Records Management Consultant scott.sackett@sos.wa.gov

More information

RECORDS AND INFORMATION MANAGEMENT AND RETENTION

RECORDS AND INFORMATION MANAGEMENT AND RETENTION RECORDS AND INFORMATION MANAGEMENT AND RETENTION Policy The Health Science Center recognizes the need for orderly management and retrieval of all official records and a documented records retention and

More information

Next Generation Authentication

Next Generation Authentication Next Generation Authentication Bring Your Own security impact Dominique Dessy Sr. Technology Consultant 1 2012 DIGITAL UNIVERSE 1.8 ZETTABYTES 1,800,000,000,000,000,000,000 2 $ 3 4 Threat Landscape 60%

More information

Certification Process Overview

Certification Process Overview Certification Process Overview 1. General: TUV India Pvt. Ltd (TUV) is a part of TUV NORD Group and provides system certification services. This overview is to give the idea of steps involved in certification,

More information

ELECTRONIC MAIL POLICY

ELECTRONIC MAIL POLICY m acta I. PURPOSE The Information Systems (IS) Department is responsible for development and maintenance of this policy. The Finance and Administration Division is responsible for publishing and distributing

More information

Analyzing Instant Messaging Applications for Threats : WhatsApp Case Study

Analyzing Instant Messaging Applications for Threats : WhatsApp Case Study Analyzing Instant Messaging Applications for Threats : WhatsApp Case Study Priti Jagwani* Internet has revolutionized the way we communicate. Email, social media, instant messengers and now mobile messaging

More information

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019

Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 General Office Properties Income Trust Privacy Notice Last Updated: February 1, 2019 Office Properties Income Trust ( OPI ) is committed to your right to privacy and to keeping your personal information

More information

Access to personal accounts and lawful business monitoring

Access to personal  accounts and lawful business monitoring Access to personal email accounts and lawful business monitoring Contents Policy statement... 2 Access to personal emails... 2 Manager suspects misuse... 3 Lawful business monitoring... 4 Additional information...

More information

ADMIN NEWS 2/ FOREWORD CONTENTS FOREWORD

ADMIN NEWS 2/ FOREWORD CONTENTS FOREWORD CONTENTS FOREWORD TOPICS 1.0 New login URLs for FACT24 2.0 Password reset now available by SMS or FACT24 push notification 3.0 Administration: More flexibility in defining confirmation prompts 4.0 Administration:

More information

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on April 16, 2018 15:41 PM O verview 1 90% Compliance About PCI DSS 2.0 PCI-DSS is a legal obligation mandated not by government

More information

This Document is licensed to

This Document is licensed to GAMP 5 Page 291 End User Applications Including Spreadsheets 1 Introduction This appendix gives guidance on the use of end user applications such as spreadsheets or small databases in a GxP environment.

More information

Retain, search, review and produce government mobile text messages

Retain, search, review and produce government mobile text messages Retain, search, review and produce government mobile text messages Employees are now using mobile phones for business communications just as much, if not more than, their desk phones. At the same time,

More information

Managing Effectively

Managing  Effectively Managing Email Effectively Managing email effectively is your responsibility AT THE END OF THIS MODULE YOU WILL: Know your responsibilities with respect to the management of email. Understand that email

More information

ORACLE COMMUNICATIONS INSTANT MESSAGING SERVER

ORACLE COMMUNICATIONS INSTANT MESSAGING SERVER ORACLE COMMUNICATIONS INSTANT MESSAGING SERVER The Oracle Communications Instant Messaging Server provides a secure, scalable, extensible, and rich communication and collaboration platform. It allows telecommunications

More information

When facing legal disputes, can you quickly retrieve s as evidence?

When facing legal disputes, can you quickly retrieve  s as evidence? When facing legal disputes, can you quickly retrieve emails as evidence? The Importance of Email Backup Emails serve as an important communication method between enterprises, and it's crucial to properly

More information

Manage your response. Inform your people. Make it happen. IBM Crisis Management Services Incident Communication Services

Manage your response. Inform your people. Make it happen. IBM Crisis Management Services Incident Communication Services Manage your response. Inform your people. Make it happen. IBM Crisis Management Services Incident Communication Services During a critical situation, normal lines of communication may fail when you need

More information

RECORDS WWU: . WWU Archives & Records Management Tony Kurtz x3124 Rachel Thompson x6654

RECORDS WWU:  . WWU Archives & Records Management Tony Kurtz x3124 Rachel Thompson x6654 RECORDS MANAGEMENT @ WWU: E-MAIL WWU Archives & Records Management Tony Kurtz x3124 Rachel Thompson x6654 What's a Public Record? RCW 40.14 requires all public records to be kept according to an approved

More information

Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER

Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER SUNY Records Retention and Disposition Policy - 6609 Retention

More information

BlackBerry Messenger. Version 1.0. User Guide

BlackBerry Messenger. Version 1.0. User Guide BlackBerry Messenger Version 1.0 User Guide BlackBerry Messenger Version 1.0 User Guide Last modified: 21 June 2005 Part number: SWD_X_IM(EN)-001.001 At the time of publication, this documentation complies

More information

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe

Robert Bond. Respecting Privacy, Securing Data and Enabling Trust a view from Europe Respecting Privacy, Securing Data and Enabling Trust a view from Europe Robert Bond, Partner & Notary Public Robert Bond Robert Bond has nearly 40 years' experience in advising national and international

More information

Introducing IBM Lotus Sametime 7.5 software.

Introducing IBM Lotus Sametime 7.5 software. Real-time collaboration solutions March 2006 Introducing IBM Lotus Sametime 7.5 software. Adam Gartenberg Offering Manager, Real-time and Team Collaboration Page 2 Contents 2 Introduction 3 Enhanced instant

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief RSA Solution Brief Managing Risk Within Advanced Security Operations RSA Solution Brief How do you advance your security operations function? Increasingly sophisticated security threats and the growing

More information

TeleWare Re:Call FAQ for Resellers

TeleWare Re:Call FAQ for Resellers TeleWare Re:Call FAQ for Resellers A - About the Re:Call Service and Application 1. Why have TeleWare developed a mobile application, isn t the SIM based recording solution sufficient? For organisations

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

SECURING MOBILITY. Through the Canadian Medium Assurance Solutions Program. ICMC May Greg Hills Director, Architecture and Technology Assurance

SECURING MOBILITY. Through the Canadian Medium Assurance Solutions Program. ICMC May Greg Hills Director, Architecture and Technology Assurance SECURING MOBILITY Through the Canadian Medium Assurance Solutions Program ICMC May 2016 Greg Hills Director, Architecture and Technology Assurance PAGE 1 INTRODUCTION Basic, Medium, and High Assurance

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the company and its authorized users and

More information

Novell GroupWise 2014 Licensing

Novell GroupWise 2014 Licensing FAQ www.novell.com Novell GroupWise 2014 Licensing Frequently Asked Questions For Sales and Partner Use Only January 2014 What is changing in the GroupWise 2014 End User License Agreement (EULA) and why?

More information

Records Retention Policy

Records Retention Policy June 21, 2017 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Review Cycle...3 1.4 Document Owner...3 1.5 Definitions...3 2 Policy...4 2.1 Records and Record Storage...4 2.2 Applicable

More information

Qualified Integrators and Resellers (QIR) TM. QIR Implementation Statement, v2.0

Qualified Integrators and Resellers (QIR) TM. QIR Implementation Statement, v2.0 Qualified Integrators and Resellers (QIR) TM Implementation Statement For each Qualified Installation performed, the QIR Employee must complete this document and confirm whether the Validated Payment Application

More information

Work smarter with. at your fingertips ENTER

Work smarter with. at your fingertips ENTER Work smarter with BCS QUALIFICATIONS at fingertips ENTER Effective IT user can unlock employee potential as well as the potential of the applications in workplace. BCS, The Chartered Institute for IT,

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Social Networking: Managing the Risks and Realizing the Benefits

Social Networking: Managing the Risks and Realizing the Benefits Social Networking: Managing the Risks and Realizing the Benefits 11 th Annual Compliance & Ethics Institute Las Vegas, NV Jim Donaldson, M.S., MPA, CHC, CISSP, CIPP/US Director of Compliance, Privacy and

More information

Group Administrator Guide

Group Administrator Guide Get Started... 4 What a Group Administrator Can Do... 7 About Premier... 10 Use Premier... 11 Use the AT&T IP Flexible Reach Customer Portal... 14 Search and Listing Overview... 17 What s New in the Group

More information

System Architecture Model Version 1.1 WV Tracking Number: WV-020

System Architecture Model Version 1.1 WV Tracking Number: WV-020 System Architecture Model Version 1.1 WV Tracking Number: WV-020 Notice Copyright 2001-2002 Ericsson, Motorola and Nokia. All Rights Reserved. Implementation of all or part of any Specification may require

More information

Building a Privacy Management Program

Building a Privacy Management Program Building a Privacy Management Program February 26, 2013 Office of the Information and Privacy Commissioner of Alberta Session Overview Reasons for having a PMP Strategies to deal with current and future

More information

IBM Resilient Incident Response Platform On Cloud

IBM Resilient Incident Response Platform On Cloud Service Description IBM Resilient Incident Response Platform On Cloud This Service Description describes the Cloud Service IBM provides to Client. Client means the contracting party and its authorized

More information

Security Information for SAP Asset Strategy and Performance Management

Security Information for SAP Asset Strategy and Performance Management Master Guide SAP Asset Strategy and Performance Management Document Version: 2.0 2018-03-09 Security Information for SAP Asset Strategy and Performance Management Typographic Conventions Type Style Example

More information

MNsure Privacy Program Strategic Plan FY

MNsure Privacy Program Strategic Plan FY MNsure Privacy Program Strategic Plan FY 2018-2019 July 2018 Table of Contents Introduction... 3 Privacy Program Mission... 4 Strategic Goals of the Privacy Office... 4 Short-Term Goals... 4 Long-Term

More information

AKO Administrator Training

AKO Administrator Training AKO Administrator Training Creating Organizational Sites Overview 1. What is a site? Definition of a site Site types 2. How do I create a site? Site Wizard - walkthrough 3. How do I manage a site? Definition

More information

ALLIANCE BENEFIT GROUP of Houston, Inc.

ALLIANCE BENEFIT GROUP of Houston, Inc. New mandatory electronic filing requirements (EFAST2) now apply to the Form 5500 Annual Return that your benefit plan must file. The electronic filing procedures require that you sign the Form 5500 electronically.

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

Privacy Policy. Act shall mean the Information Technology Act, 2000 and Rules thereunder as amended from time to time.

Privacy Policy. Act shall mean the Information Technology Act, 2000 and Rules thereunder as amended from time to time. Privacy Policy The Clearing Corporation of India Ltd. (CCIL) adheres to the stringent principles governing its operations as a Financial Market Infrastructure regulated by the Reserve Bank of India (RBI).

More information

FOR AGENCY SECURITY LIAISONS Last Updated April 16, 2013 PART A

FOR AGENCY SECURITY LIAISONS Last Updated April 16, 2013 PART A RESETTING PASSWORDS IN CORE-CT PART A In accordance with OSC Memorandum 2011 23, November 7, 2011, Comptroller's Core-CT Systems Security for State Employees, the role of resetting passwords for users

More information

HOW TO SECURE YOUR FACEBOOK ACCOUNT.

HOW TO SECURE YOUR FACEBOOK ACCOUNT. HOW TO SECURE YOUR FACEBOOK ACCOUNT. How secure is your Facebook account? The Yorkshire and Humber Regional Cyber Crime Unit (RCCU) protect team have produced this documentation regarding public Facebook

More information

DEPARTMENT OF HOMELAND SECURITY RECORDS MANAGEMENT HANDBOOK

DEPARTMENT OF HOMELAND SECURITY RECORDS MANAGEMENT HANDBOOK DEPARTMENT OF HOMELAND SECURITY RECORDS MANAGEMENT HANDBOOK V. 2 January 2005 0550 Publication Table of Contents CHAPTER 1: OVERVIEW...1 CHAPTER 2: DEFINITIONS...8 CHAPTER 3: ELECTRONIC MAIL RECORDS...9

More information

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017

Wye Valley NHS Trust. Data protection audit report. Executive summary June 2017 Wye Valley NHS Trust Data protection audit report Executive summary June 2017 1. Background The Information Commissioner is responsible for enforcing and promoting compliance with the Data Protection Act

More information

Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees

Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees 1. What is an Official Personnel Folder (OPF)? The Official Personnel Folder (Standard Form 66)

More information

SSC-Navigate Guide for Kansas State University Advisors

SSC-Navigate Guide for Kansas State University Advisors SSC-Navigate Guide for Kansas State University Advisors Prepared by Brad Cunningham University Academic Services Coordinator bradc@ksu.edu Updated July 2018 Table of Contents Introduction... 3 Appointments...

More information

Enterprise Product Guide

Enterprise Product Guide Enterprise Product Guide BlackBerry Enterprise Software April 2018 Published: 2018-06-06 SWD-20180606124626584 Contents BlackBerry enterprise products... 5 The BlackBerry Infrastructure...6 BlackBerry

More information