Top 12 Objections to Scanning and Destroying Paper. Presented by John Gilbert

Size: px
Start display at page:

Download "Top 12 Objections to Scanning and Destroying Paper. Presented by John Gilbert"

Transcription

1 Top 12 Objections to Scanning and Destroying Paper Presented by John Gilbert BOLD Bite 4/3/2017 1:20 PM - 1:39 PM The handouts and presentations attached are copyright and trademark protected and provided for individual use only.

2 Scan and Shred: Objections and Answers John Gilbert, nqueue April 3, 2017 Question 1 Can scanning and shredding satisfy ethical and client services requirements? 1

3 Answer 1. No. You must always keep 3 copies, including carbon and typewriter ribbon. 2. Why scan and shred, everyone loves paper the more stacks the better! 3. After digitizing paper documents, a lawyer may destroy copies of paper documents Follow up After digitizing paper documents, a lawyer may destroy copies of paper documents obtained from the client unless the lawyer has reason to know that the client wants the lawyer to retain them. A lawyer has the discretion to decide whether to maintain the balance of the file solely as electronic images and destroy the paper documents. State Bar of Arizona (Opinion 07-02) 2

4 Question 2 A lawyer must preserve some paper documents, approximately what percent needs to be kept? Answer %, and duplicate copies of a essential documents. 2. Only the documents printed on green paper. 3. Approximately 25%. 3

5 Follow Up Preserve - Intrinsically valuable Preserve - Original not otherwise filed Shred: Client docs delivered as copies Preserve - Legal Obligation to preserve Preserve - Electronic version fails to protect client's interests Shred: Printed copies of electronic docs Shred: Notes, Memos, Markups Question 3 Who decides what papers to keep? How does the practice control the time and effort to manage a scan and shred program? 4

6 Answer 1. Assign someone in the mail room to shred whatever they feel needs to be shredded. 2. Never shred anything, paper is good! 3. The attorneys and the firm set the policies. Follow up Lawyers set policies and resolve issues; delegate detailed work. Consider a QA step. Balance effort with benefits to scanned documents: Reduced handling and risk of disorder Quick and shared access Managing space costs 5

7 Question 4 Doesn t litigation require the ability to produce paper documents? Answer 1. Yes you must always have paper, and some extra paper to spare. 2. Print 2 copies to be safe, you can never have too much paper. 3. A significant portion, if not the majority of document production now electronic. 6

8 Follow up Copies used for substantially all production of paper documents Chain of custody, supported by audit logs, critical for paper documents and their copies Question 5 If the lawyer or her assistant doesn t do the scanning, how will the lawyer s files stay organized? 7

9 Answer 1. They won t, files don t need to be organized anyway. 2. The scanning fairy will come in after the cleaning crew and will scan all your documents. 3. You should delegate the scanning to someone properly trained in your firms processes and procedures. Follow up Delegating scanning Most scanning should be performed by assistants Employ best practices for filing and naming utilizing: Correct matter number for all filing Full descriptive names Leverage technology designed to assist 8

10 Question 6 What if there are errors in the scanning or storage process? How can those risks be managed and minimized? Answer 1. They can t be, you will have to live with it. Get used to disappointment. 2. Don t scan and you won t ever have an error. 3. Implement a QA program. 9

11 Follow up What if there are errors? Include a QA program that includes: Confirmation of number of pages scanned List of recently scanned documents Scanning protects against paper filing system stresses and errors Misfiled documents Damage to originals Immediate shared access Question 7 Doesn t it make more sense to scan and return the originals to the client rather than shred them? 10

12 Answer 1. No shred everything just don t get your tie stuck in the shredder. 2. Ship all paper back to the client whether or not they want it they will love you for this. 3. Establish expectations with your client at the outset. Follow up Shred or return? Only shred copies, not original documents. Prompt return of originals after scanning avoids extra effort later. 11

13 Question 8 If a representation ends, can a lawyer s responsibility to return files be satisfied with scanned documents? Answer 1. No you are in trouble if you don t have paper, quick throw anything in a box and send it to them. 2. No never scan and you wont have that problem 3. Unless a physical original is required (items 1 and 2), a scanned copy should meet the responsibility to return files. 12

14 Question 9 To study a file thoroughly, some lawyers still want to read it on paper. Will printing scanned documents waste paper and money? Answer 1. Yes. The only solution is to remove all printers from the firm. 2. Who needs to study a file that closely? 3. Printing only select scanned documents for review and mark-up still reduces paper. 13

15 vs. vs. 14

16 Question 10 Isn t paper more secure? It seems a new data breach is front-page news every day. Answer 1. Just blame the Russians for everything. 2. What data breach? 3. Paper can get misplaced, misfiled, lost or stolen with no recourse. Bonus to scanning, disaster recovery is facilitated by electronic storage. 15

17 Photo Credit Timothy Krause 2012 Question 11 I know exactly where my paper documents are. Having to find them on our network will just waste time. 16

18 Answer 1. Don t scan, just keep everything on your desk so you can find it. 2. Be productive when you waste time, check out this site: 3. Paper cannot be accessed offsite or by multiple people at the same time. Automatic filing to document management systems, or DMS s, eases access. Question 12 Change is uncomfortable. Why should I change? 17

19 Answer 1. Wedgies are also uncomfortable but so what, get over it. 2. Don t change, I like you just the way you are, the 70 s is a good look on you. 3. We live in a world of change, lawyers need to keep up with their clients and protect against risks. Questions? John Gilbert Senior Vice President, nqueue jgilbert@nqueue.com mobile direct 18

20 Your opinion matters! Please take a moment now to evaluate this session.

CRIMINAL LAW PRACTICE AREA TEMPLATE for Time Matters /Total Practice Advantage

CRIMINAL LAW PRACTICE AREA TEMPLATE for Time Matters /Total Practice Advantage CRIMINAL LAW PRACTICE AREA TEMPLATE for Time Matters /Total Practice Advantage By IP ASSOCIATES, LLC Free yourself from the constraints of Time Matters for your criminal practice! If you feel that you

More information

Legal Considerations and Case Studies

Legal Considerations and Case Studies Cybersecurity for Small & Mid-Size Businesses Phil Schenkenberg, J.D., CIPP/US Cyrus Malek, J.D., Certification in Cybersecurity and Privacy Law Legal Considerations and Case Studies Copyright, Briggs

More information

The 10 Disaster Planning Essentials For A Small Business Network

The 10 Disaster Planning Essentials For A Small Business Network The 10 Disaster Planning Essentials For A Small Business Network If your data is important to your business and you cannot afford to have your operations halted for days or even weeks due to data loss

More information

ARCHIVE ESSENTIALS

ARCHIVE ESSENTIALS EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has

More information

Disaster Recovery Self-Audit

Disaster Recovery Self-Audit Disaster Recovery Self-Audit Disaster Recovery Audit There are 3 steps to this process: 1. Identify all data and IT-related functions (like credit card processing, documents on your file server, member

More information

Clean & Speed Up Windows with AWO

Clean & Speed Up Windows with AWO Clean & Speed Up Windows with AWO C 400 / 1 Manage Windows with this Powerful Collection of System Tools Every version of Windows comes with at least a few programs for managing different aspects of your

More information

Why records management matters top 10 reasons

Why records management matters top 10 reasons Clean up Days! Clean up Days! Why records management matters top 10 reasons 1. To control growth and creation of records 2. To reduce operating costs 3. To improve efficiency and productivity 4. To assimilate

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

ELECTRONIC RECORDS MANAGEMENT

ELECTRONIC RECORDS MANAGEMENT ELECTRONIC RECORDS MANAGEMENT @ Kris Justus Electronic Records Analyst Kentucky Department for Libraries & Archives (KDLA) Electronic Records and Email Management WHAT IS A PUBLIC RECORD? KRS 171.410 defines

More information

10 Hidden IT Risks That Might Threaten Your Business

10 Hidden IT Risks That Might Threaten Your Business (Plus 1 Fast Way to Find Them) Your business depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine

More information

Disaster Preparedness + Cloud Computing. Jack Newton CEO + Founder Clio

Disaster Preparedness + Cloud Computing. Jack Newton CEO + Founder Clio Disaster Preparedness + Cloud Computing Jack Newton CEO + Founder Clio WHAT IS A DISASTER? Disasters Disruption of business functions and processes. Disasters to Others Clients undergo disasters for which

More information

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been

More information

The 10 Disaster Planning Essentials

The 10 Disaster Planning Essentials The 10 Disaster Planning Essentials For A Small Business Network 252 Plymouth Ave. S. Rochester, NY 14608 585-546-4120 info@capstoneitinc.com www.rochestercomputersupport.com The 10 Disaster Planning Essentials

More information

ProServeIT Corporation Century Ave. Mississauga, ON L5N 6A4 T: TF: F: W: ProServeIT.

ProServeIT Corporation Century Ave. Mississauga, ON L5N 6A4 T: TF: F: W: ProServeIT. 1 Table of Contents POST #1... 3 Why Use a SharePoint Content Management System? A Quick Guide for Executives & Managers [Downloadable Infographic]... 3 POST #2... 5 Branding SharePoint 6 Ways to Brand

More information

THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365

THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365 THE DEFINITIVE GUIDE TO BACKUP FOR OFFICE 365 ENSURING COMPLETE AND EFFECTIVE DATA PROTECTION FOR OFFICE 365 TABLE OF CONTENTS THE TRUTH ABOUT SAAS DATA LOSS THE TOP 4 REASONS YOU NEED BACKUP FOR OFFICE

More information

Making a Business Case for Electronic Document or Records Management

Making a Business Case for Electronic Document or Records Management Making a Business Case for Electronic Document or Records Management Building and maintaining an edms system is a significant investment in both tools and people. It requires on-going care and attention.

More information

It s possible to get your inbox to zero and keep it there, even if you get hundreds of s a day.

It s possible to get your  inbox to zero and keep it there, even if you get hundreds of  s a day. It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated, though it does take effort and discipline. Many people simply need

More information

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors

Balancing RTO, RPO, and budget. Table of Contents. White Paper Seven steps to disaster recovery nirvana for wholesale distributors White Paper Seven steps to disaster recovery nirvana for wholesale distributors Balancing RTO, RPO, and budget In our last white paper, Thinking through the unthinkable: Disaster recovery for wholesale

More information

Close Your File Template

Close Your File Template In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of

More information

TO SCAN OR NOT TO SCAN? Donna Read, CRM, CDIA+, ERMs, ECMp President DL Read LLC Dlreadllc.com

TO SCAN OR NOT TO SCAN? Donna Read, CRM, CDIA+, ERMs, ECMp President DL Read LLC Dlreadllc.com TO SCAN OR NOT TO SCAN? Donna Read, CRM, CDIA+, ERMs, ECMp President DL Read LLC dlread@verizon.net Dlreadllc.com 2 Time = $ Reasons to Scan Who Decides Workflow and Capture How To Decide ROI Questions

More information

_APP A_541_10/31/06. Appendix A. Backing Up Your Project Files

_APP A_541_10/31/06. Appendix A. Backing Up Your Project Files 1-59863-307-4_APP A_541_10/31/06 Appendix A Backing Up Your Project Files At the end of every recording session, I back up my project files. It doesn t matter whether I m running late or whether I m so

More information

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats

The Quick-Start Guide to Print Security. How to maximize your print environment and minimize security threats The Quick-Start Guide to Print Security How to maximize your print environment and minimize security threats 2 The Hidden Security Threat What s the first thing that comes to mind when you hear the words

More information

You can count on us. ADDS Additional Service Schedule

You can count on us. ADDS Additional Service Schedule You can count on us. ADDS Additional Service Schedule Collection & Delivery Services Delivery / Collection Service Cost of ordering via ADDS ActiveWeb online Cost placing orders manually via orders@archivestorage.net

More information

Repurposing Your Podcast. 3 Places Your Podcast Must Be To Maximize Your Reach (And How To Use Each Effectively)

Repurposing Your Podcast. 3 Places Your Podcast Must Be To Maximize Your Reach (And How To Use Each Effectively) Repurposing Your Podcast 3 Places Your Podcast Must Be To Maximize Your Reach (And How To Use Each Effectively) What You ll Learn What 3 Channels (Besides itunes and Stitcher) Your Podcast Should Be On

More information

MAXIMIZING THE UTILITY OF MICROSOFT OUTLOOK. Presented by: Lisa Hendrickson Deborah Savadra

MAXIMIZING THE UTILITY OF MICROSOFT OUTLOOK. Presented by: Lisa Hendrickson Deborah Savadra MAXIMIZING THE UTILITY OF MICROSOFT OUTLOOK Presented by: Lisa Hendrickson (@callthatgirl) Deborah Savadra (@legalofficeguru) INTRODUCTION: INBOX = MONEY Your inbox equals money, as it does for anyone

More information

Records Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017

Records Management at MSU. Hillary Gatlin University Archives and Historical Collections January 27, 2017 Records Management at MSU Hillary Gatlin University Archives and Historical Collections January 27, 2017 Today s Agenda Introduction to University Archives Records Management at MSU Records Retention Schedules

More information

Recipes. Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24

Recipes.  Marketing For Bloggers. List Building, Traffic, Money & More. A Free Guide by The Social Ms Page! 1 of! 24 16 Recipes Email Marketing For Bloggers List Building, Traffic, Money & More A Free Guide by The Social Ms Page 1 of 24 Brought to you by: Jonathan Gebauer, Susanna Gebauer INTRODUCTION Email Marketing

More information

The Trail of Electrons

The Trail of Electrons E-Records E-Mail E-Discovery The Trail of Electrons ML Taylor, C.P.M. February 2013 January 2013 ML Taylor, C.P.M. 1 Objectives 1. Raise awareness of the issues surrounding the use of email and electronic

More information

(toll free) Website Wizards Website0Wizard

(toll free) Website Wizards Website0Wizard sales@website-wizards.com 651-323-2010 (toll free) 1-866-476-0226 Website Wizards Website0Wizard Website Services Design SEO Content Advertising Social Media Management Upgrades - Updates About Us: Page:

More information

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain

A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation. Mark Kaufman, Iron Mountain A Promise Kept: Understanding the Monetary and Technical Benefits of STaaS Implementation Mark Kaufman, Iron Mountain SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA.

More information

1: Introduction to Object (1)

1: Introduction to Object (1) 1: Introduction to Object (1) 김동원 2003.01.20 Overview (1) The progress of abstraction Smalltalk Class & Object Interface The hidden implementation Reusing the implementation Inheritance: Reusing the interface

More information

Amicus Attorney Link Guide: Google Contacts & Calendar

Amicus Attorney Link Guide: Google Contacts & Calendar Amicus Attorney Link Guide: Google Contacts & Calendar Applies to: Amicus Attorney Premium Edition 2013/2012 Contents About the Link... 2 What you need... 2 Advantages of using the Link... 2 Administering

More information

Six Ways to Protect your Business in a Mobile World

Six Ways to Protect your Business in a Mobile World Six Ways to Protect your Business in a Mobile World Mobile technology promises big rewards In a study of how mobility benefits businesses 1 77% say it helps drive business growth 61% say it boosts productivity

More information

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when

More information

Middle District Bankruptcy Bar Association, Inc. Conference. Registration Materials June 14-15, 2018

Middle District Bankruptcy Bar Association, Inc. Conference. Registration Materials June 14-15, 2018 20th Annual Middle District Bankruptcy Bar Association, Inc. Registration Materials June 14-15, 2018 Mohegan Sun Casino & Convention Center Wilkes-Barre, PA The 20th Annual Middle District Bankruptcy Bar

More information

Document Imaging User Guide

Document Imaging User Guide Release 4.9 IMAGING TECHNOLOGY GROUP Document Imaging Systems Document Imaging User Guide IMAGING TECHNOLOGY GROUP IMIGIT tm Document Imaging User Guide Release 4.91 March 2007 Imaging Technology Group

More information

Financial CISM. Certified Information Security Manager (CISM) Download Full Version :

Financial CISM. Certified Information Security Manager (CISM) Download Full Version : Financial CISM Certified Information Security Manager (CISM) Download Full Version : http://killexams.com/pass4sure/exam-detail/cism required based on preliminary forensic investigation, but doing so as

More information

Signature Practices and Technologies for TMF An Industry Overview. Kathie Clark Wingspan Technology Vice President Product Management

Signature Practices and Technologies for TMF An Industry Overview. Kathie Clark Wingspan Technology Vice President Product Management Signature Practices and Technologies for TMF An Industry Overview Kathie Clark Wingspan Technology Vice President Product Management 1 Agenda Review of Guidance and Regulations Research Approach Results

More information

Retrospect 8 for Windows Reviewer s Guide

Retrospect 8 for Windows Reviewer s Guide Retrospect 8 for Windows Reviewer s Guide 2012 Retrospect, Inc. About this Reviewer s Guide This document provides a concise guide to understanding Retrospect 8 for Windows. While it is not designed to

More information

Kroll Ontrack VMware Forum. Survey and Report

Kroll Ontrack VMware Forum. Survey and Report Kroll Ontrack VMware Forum Survey and Report Contents I. Defining Cloud and Adoption 4 II. Risks 6 III. Challenging Recoveries with Loss 7 IV. Questions to Ask Prior to Engaging in Cloud storage Solutions

More information

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly.

Bootable duplicate: Create a bootable duplicate of your startup volume on an external hard drive, and update that duplicate regularly. Page 1 Backing up Mac How to develop a solid backup strategy, what your hardware and software choices are, how to set everything up, what pitfalls you may encounter, and how to restore your data if disaster

More information

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at

Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at Thanks! Thanks for attending this session on April 6 th, 2016 If you have any question, please contact Jim at jim@stickleyonsecurity.com Don t forget to checkout Stickley on Security and learn about our

More information

Introduction. Read on and learn some facts about backup and recovery that could protect your small business.

Introduction. Read on and learn some facts about backup and recovery that could protect your small business. Introduction No business can afford to lose vital company information. Small-business owners in particular must take steps to ensure that client and vendor files, company financial data and employee records

More information

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/

Chapter 1. Storage Concepts. CommVault Concepts & Design Strategies: https://www.createspace.com/ Chapter 1 Storage Concepts 4 - Storage Concepts In order to understand CommVault concepts regarding storage management we need to understand how and why we protect data, traditional backup methods, and

More information

Disaster Planning Essentials and Disaster Planning Checklist

Disaster Planning Essentials and Disaster Planning Checklist Disaster Planning Essentials and Disaster Planning Checklist BSSI2 www.bssi2.com /bssi2 L @BSSi2llc I /company/10216017 SECURITY FANATICS www.securityfanatics.com /infosecgurus L @NickAEsp I /company/16213735

More information

Information Systems Self-Inspection

Information Systems Self-Inspection Information Systems Self-Inspection Raytheon 084T3 Regina M. Saunders, FSO, NCS ISSM 4-18-07 Copyright 2007 Raytheon Company. All rights reserved. Customer Success Is Our Mission is a trademark of Raytheon

More information

Bitcoin, Security for Cloud & Big Data

Bitcoin, Security for Cloud & Big Data Bitcoin, Security for Cloud & Big Data CS 161: Computer Security Prof. David Wagner April 18, 2013 Bitcoin Public, distributed, peer-to-peer, hash-chained audit log of all transactions ( block chain ).

More information

CONFLICT OF INTEREST SYSTEMS

CONFLICT OF INTEREST SYSTEMS CONFLICT OF INTEREST SYSTEMS Conflicts of interest can lead to serious malpractice and ethical problems. To detect conflicts, a good conflicts checking system is essential. No lawyer can remember every

More information

Security Issues When Preparing for Disasters

Security Issues When Preparing for Disasters Security Issues When Preparing for Disasters Catherine Sanders Reach, Director American Bar Association Legal Technology Resource Center November 10, 2006 Today s Topics Disaster Planning Backup Security

More information

THE MARKETO USER S GDPR QUICK GUIDE. How Marketo Users Can Leverage Their MAP to Achieve GDPR Compliance

THE MARKETO USER S GDPR QUICK GUIDE. How Marketo Users Can Leverage Their MAP to Achieve GDPR Compliance THE MARKETO USER S GDPR QUICK GUIDE How Marketo Users Can Leverage Their MAP to Achieve GDPR Compliance The GDPR is coming. Will you be ready? LEVERAGING YOUR MARKETING AUTOMATION PLATFORM FOR GDPR COMPLIANCE

More information

Disaster Recovery. the BMUG guide to getting your stuff back. Introduction Recovering a single file or folder... 3

Disaster Recovery. the BMUG guide to getting your stuff back. Introduction Recovering a single file or folder... 3 Disaster Recovery the BMUG guide to getting your stuff back Introduction... 2 1. Recovering a single file or folder... 3 2. Setting up a new hard disk or system... 4 3. Recovering your files from Time

More information

A NETWORK PRIMER. An introduction to some fundamental networking concepts and the benefits of using LANtastic.

A NETWORK PRIMER. An introduction to some fundamental networking concepts and the benefits of using LANtastic. A NETWORK PRIMER An introduction to some fundamental networking concepts and the benefits of using LANtastic. COPYRIGHT 1996 Artisoft, Inc. All Rights Reserved. This information file is copyrighted with

More information

Emerging Trends in Records Management Technology. Jessie Weston, CRA 2018 MISA Conference October 11-12, 2018

Emerging Trends in Records Management Technology. Jessie Weston, CRA 2018 MISA Conference October 11-12, 2018 Emerging Trends in Records Management Technology Jessie Weston, CRA 2018 MISA Conference October 11-12, 2018 The Paperless World Source: Le Trefle ad (2013) Emerging Trends in Records Management Technology

More information

10 Golden Rules to make your Collections more profitable

10 Golden Rules to make your Collections more profitable 10 Golden Rules to make your Collections more profitable With the property market in decline and the global credit crunch, the growth of debt collection is inevitable and attorneys who want to maintain

More information

Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government

Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Best Practices for Incident Communications: Simplifying the Mass Notification Process for Government Introduction State and local governments and their supporting agencies encounter emergency situations

More information

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE

Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE Your Data Demands More NETAPP ENABLES YOU TO LEVERAGE YOUR DATA & COMPUTE FROM ANYWHERE IN ITS EARLY DAYS, NetApp s (www.netapp.com) primary goal was to build a market for network-attached storage and

More information

Refreshing Your Records Management. Tracy Rebstock, Southwest Regional Archivist

Refreshing Your Records Management. Tracy Rebstock, Southwest Regional Archivist Refreshing Your Records Management Tracy Rebstock, Southwest Regional Archivist WASBO Conference 2017 Overview What is a Public Record? Disposition Authority Records Retention Schedules Non-Archival/Archival

More information

Process that Works: liberating software projects

Process that Works: liberating software projects Process that Works: liberating software projects Gerry de Koning November 4, 1999 1999 Gerry de Koning 1999-11-04 Gerry de Koning 1 A process specification is not a process 1999-11-04 Gerry de Koning 2

More information

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH?

PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? PAPER PRIVACY AND ONLINE DATA: CAN WE HAVE BOTH? By Peter Varhol www.actian.com ignificant change has arrived in how computing and storage consumes data concerning individuals. Merchants, data collection

More information

ROBINS FREQUENTLY ASKED QUESTIONS

ROBINS FREQUENTLY ASKED QUESTIONS Table of Contents A) Initial Set Up and Logging In, including Password Issues... 2 B) Browser Problems/Filters... 6 C) Income Viewing and Reporting... 7 D) Ordering Stock... 9 E) Managing Box Sites...

More information

How to Stop Wasting Money On Your Google AdWords Campaigns

How to Stop Wasting Money On Your Google AdWords Campaigns How to Stop Wasting Money On Your Google AdWords Campaigns The search term traps that are attracting the wrong audience and how to eliminate them Written and published by Kristie McDonald Vitruvian Digital

More information

FILED: NEW YORK COUNTY CLERK 07/31/ :17 AM INDEX NO /2018 NYSCEF DOC. NO. 53 RECEIVED NYSCEF: 07/31/2018

FILED: NEW YORK COUNTY CLERK 07/31/ :17 AM INDEX NO /2018 NYSCEF DOC. NO. 53 RECEIVED NYSCEF: 07/31/2018 SUPREME COURT OF THE STATE OF NEW YORK New York County LOUIS J DESY JR Plaintiff, - against- Index No.: 651541/2018 Filed: 03/30/2018 KEN WHITMAN AKA KEN WHITMAN JR AKA WHIT WHITMAN AKA d20 Entertainment

More information

R E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu

R E F E R E N C E L I B R A R I A N. Jane Larrington Faculty Services & Reference Librarian sandiego.edu R E F E R E N C E L I B R A R I A N Jane Larrington Faculty Services & Reference Librarian jlarrington@ sandiego.edu 619.260.4766 Dangers of metadata for the uninitiated attorney Professional responsibilities

More information

Public vs private cloud for regulated entities

Public vs private cloud for regulated entities Public vs private cloud for regulated entities DC2: Restricted use The cloud is for everyone but not for everything 2 Opportunity enabler DC2: Restricted use Flexibility SAAS Public Accessibility Agility

More information

Mastering Data Abstraction or Get nit-picky on design advantages

Mastering Data Abstraction or Get nit-picky on design advantages Arizona s First University. Mastering Data Abstraction or Get nit-picky on design advantages Luke: Your not my father! Vader: You mean, You re not my father Luke: What? Vader: You used the possessive,

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Standard for Security of Information Technology Resources

Standard for Security of Information Technology Resources MARSHALL UNIVERSITY INFORMATION TECHNOLOGY COUNCIL Standard ITP-44 Standard for Security of Information Technology Resources 1 General Information: Marshall University expects all individuals using information

More information

Data Breach Preparedness & Response

Data Breach Preparedness & Response Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication

More information

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH

Data Breach Preparedness & Response. April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH Data Breach Preparedness & Response April 16, 2015 Daniel Nelson, C EH, CIPP/US Lucas Amodio, C EH 2015 Armstrong Teasdale 6 Stages of a Data Breach Response Preparation Identification Containment Eradication

More information

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide

BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide BASELINE GENERAL PRACTICE SECURITY CHECKLIST Guide Last Updated 8 March 2016 Contents Introduction... 2 1 Key point of contact... 2 2 Third Part IT Specialists... 2 3 Acceptable use of Information...

More information

UXD. using the elements: structure

UXD. using the elements: structure using the elements: structure defining structure you are here structure essentially defines how users get to a given screen and where they can go when they re done. structure also defines categories of

More information

Backup and Disaster Recovery: DIY or Buy? Presented by: Stanley Louissaint

Backup and Disaster Recovery: DIY or Buy? Presented by: Stanley Louissaint Backup and Disaster Recovery: DIY or Buy? Presented by: Stanley Louissaint Presenter Stanley Louissaint Principal and Founder, Fluid Designs Managed Service Provider Business Continuity Solutions Computer

More information

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service

12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service 12 Little-Known Facts and Insider Secrets Every Business Owner Should Know About Backing Up Their Data and Choosing a Remote Backup Service If your data is important to your business and you cannot afford

More information

Security Policy: What it is and Why - The Basics Joel S. Bowden August 14, Introduction:

Security Policy: What it is and Why - The Basics Joel S. Bowden August 14, Introduction: Security Policy: What it is and Why - The Basics Joel S. Bowden August 14, 2001 Introduction: To start off I would like to insert a quote from the GIAC Basic Security Policy Ver. 1.4 February 27, 2001.

More information

RED STAMP MAIL USER GUIDE

RED STAMP MAIL USER GUIDE RED STAMP MAIL USER GUIDE Red Stamp Mail is a web-based email client, which means that it connects to your existing email account and downloads messages from it. The messages are displayed in a simple

More information

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY

WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY WHY BUILDING SECURITY SYSTEMS NEED CONTINUOUS AVAILABILITY White Paper 2 Why Building Security Systems Need Continuous Availability Always On Is the Only Option. If All Systems Go Down, How Can You React

More information

MANAGING YOUR DOCUMENTS WITHOUT A DOCUMENT MANAGEMENT SYSTEM

MANAGING YOUR DOCUMENTS WITHOUT A DOCUMENT MANAGEMENT SYSTEM MANAGING YOUR DOCUMENTS WITHOUT A DOCUMENT MANAGEMENT SYSTEM A. Two Basic Approaches for Managing Documents and Email: The less expensive option is to create a centralized folder/file system on a shared

More information

Page 1 of 6 Bank card and cheque fraud

Page 1 of 6 Bank card and cheque fraud Page 1 of 6 happens when criminals steal your cards or chequebook and gain access to funds in your account. More about bank card and cheque fraud Criminals steal your bank cards or cheque book; or they

More information

Management: A Guide For Harvard Administrators

Management: A Guide For Harvard Administrators E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Configuring GiftWorks to Work with QuickBooks

Configuring GiftWorks to Work with QuickBooks Table of Contents INTRODUCTION... 2 HOW TO USE THIS GUIDE... 2 GETTING STARTED WITH GIFTWORKS AND QUICKBOOKS INTEGRATION... 3 Understanding GiftWorks Donations, Accounts, and Funds... 3 Configuring GiftWorks

More information

2013 edition (version 1.1)

2013 edition (version 1.1) 2013 edition (version 1.1) Contents 1 Introduction... 3 2 Signing in to your Office 365 account... 3 2.1 Acceptable Use Policy and Terms of Use... 4 3 Setting your profile and options... 4 3.1 Settings:

More information

Are You Security Aware?

Are You Security Aware? Are You Security Aware? Security breaches are on the rise... Common practices to increase security awareness and protect your information and computers Chris Duncan even in firms that have ample resources

More information

What every attorney should know about E-security Also, ESI

What every attorney should know about E-security Also, ESI What every attorney should know about E-security Also, ESI Sean Markham Esq. McCarthy Law Firm, LLC smarkham@mccarthy-lawfirm.com Why should I care about security? Because it is a good idea! and, if that

More information

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business

White Paper: Backup vs. Business Continuity. Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Backup vs. Business Continuity: Using RTO to Better Plan for Your Business Executive Summary SMBs in general don t have the same IT budgets and staffs as larger enterprises. Yet just like larger organizations

More information

Rescuing Lost Files from CDs and DVDs

Rescuing Lost Files from CDs and DVDs Rescuing Lost Files from CDs and DVDs R 200 / 1 Damaged CD? No Problem Let this Clever Software Recover Your Files! CDs and DVDs are among the most reliable types of computer disk to use for storing your

More information

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019

E-Security policy. Ormiston Academies Trust. James Miller OAT DPO. Approved by Exec, July Release date July Next release date July 2019 Ormiston Academies Trust E-Security policy Date adopted: Autumn Term 2018 Next review date: Autumn Term 2019 Policy type Author Statutory James Miller OAT DPO Approved by Exec, July 2018 Release date July

More information

The security challenge in a mobile world

The security challenge in a mobile world The security challenge in a mobile world Contents Executive summary 2 Executive summary 3 Controlling devices and data from the cloud 4 Managing mobile devices - Overview - How it works with MDM - Scenario

More information

2016 All Rights Reserved

2016 All Rights Reserved 2016 All Rights Reserved Table of Contents Chapter 1: The Truth About Safelists What is a Safelist Safelist myths busted Chapter 2: Getting Started What to look for before you join a Safelist Best Safelists

More information

Video Compression Secrets - Smaller Files, Better Quality UPDATED (Oct 15)

Video Compression Secrets - Smaller Files, Better Quality UPDATED (Oct 15) Video Compression Secrets - Smaller Files, Better Quality UPDATED (Oct 15) by Stephen Haskin, October 19, 2015 The best codec to keep file sizes small is Windows Media (WMV). Microsoft has done an excellent

More information

Provided as an educational service by: Introduction

Provided as an educational service by: Introduction DPC TECHNOLOGY THE GUIDE DISASTER PLANNING ESSENTIALS CLAY ARCHER DPC TECHNOLOGY Provided as an educational service by: Clay Archer, CEO DPC Technology 7845 Baymeadows Way, Jacksonville, FL 32256 (844)

More information

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention

More information

DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com

DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com DreamFactory Customer Privacy and Security Whitepaper Delivering Secure Applications on Salesforce.com By Bill Appleton, CTO, DreamFactory Software billappleton@dreamfactory.com Introduction DreamFactory

More information

CLIENT INTAKE - CONFLICT OF INTEREST

CLIENT INTAKE - CONFLICT OF INTEREST CLIENT INTAKE - CONFLICT OF INTEREST SAMPLE INTAKE SHEET I CONFLICT OF INTEREST FORM Initial Client Consultation Interview Form The purpose of an initial consultation is for the attorney to understand

More information

Amicus Attorney - PCLaw Link Guide

Amicus Attorney - PCLaw Link Guide Amicus Attorney - PCLaw Link Guide Applies to: Amicus Attorney Small Firm Edition 2011/2010/2009/2008 (or Amicus Small Firm) Contents About the Link... 1 What you need... 2 What is Exchanged in the Amicus

More information

Undeliverable As Addressed Mail Best Practices & Solutions

Undeliverable As Addressed Mail Best Practices & Solutions SAN ANTONIO 2018 Undeliverable As Addressed Mail Best Practices & Solutions Kai Fisher May 7 th, 2018 Topics Best Practices in Address Quality It s All About That Data Base That s a Lot of Data Know Your

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Record Retention Policies: How Long Do We Keep This Record? Pari J. Swift, CRM, Senior Records Manager

Record Retention Policies: How Long Do We Keep This Record? Pari J. Swift, CRM, Senior Records Manager Record Retention Policies: How Long Do We Keep This Record? Pari J. Swift, CRM, Senior Records Manager No Records Management? Every 12 seconds 1 document is lost. 28,800 seconds (8 hour day)/12 =2400 documents

More information

Project 4: ATM Design and Implementation

Project 4: ATM Design and Implementation University of Maryland CMSC414 Computer and Network Security (Spring 2015) Instructor: Dave Levin (project originally created by Jonathan Katz) Updated April 30, 9:00am: Valid user names are now at most

More information

RECORDS WWU: . WWU Archives & Records Management Tony Kurtz x3124 Rachel Thompson x6654

RECORDS WWU:  . WWU Archives & Records Management Tony Kurtz x3124 Rachel Thompson x6654 RECORDS MANAGEMENT @ WWU: E-MAIL WWU Archives & Records Management Tony Kurtz x3124 Rachel Thompson x6654 What's a Public Record? RCW 40.14 requires all public records to be kept according to an approved

More information