To Document or Not to Document: That is the Question DPLE 182
|
|
- Jemima Ball
- 5 years ago
- Views:
Transcription
1 To Document or Not to Document: That is the Question DPLE 182
2 RLI Design Professionals is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on completion of this program will be reported to CES Records for AIA members. Certificates of Completion for non-aia members are available on request. This program is registered with the AIA/CES for continuing professional education. As such, it does not include content that may be deemed or construed to be an approval or endorsement by the AIA of any material of construction or any method or manner of handling, using, distributing, or dealing in any material or product. Questions related to specific materials, methods, and services will be addressed at the conclusion of this presentation.
3 Copyright Materials This presentation is protected by US and International Copyright laws. Reproduction, distribution, display and use of the presentation without written permission of the speakers is prohibited. RLI Design Professionals
4 Course Description When organizing your file after a project is complete, what should you toss, and what should you keep? Did you ever have a project you wish you could delete by accident? Did you ever have a project drawing that went out and was later corrected, so you wish you could make the initial drawing disappear? This seminar will provide guidance on document retention policies, covering the laws and rules prohibiting the destruction of evidence including electronically-stored information.
5 Learning Objectives Participants in this session will: Gain perspective on what to document versus what notto document Consider the merits of internal versus external project communications Review the basics of a document retention policy Understand how the law applies to electronic and non-electronic information
6 Memories fade even when there is an incentive to remember accurately
7 Create the Record
8 The Record Be objective State facts only Do not record opinions or conclusions as to the cause of an incident or how it could have been avoided Put it in writing Handwritten Notes/"Speed Forms" Tapes/Transcripts Letters to clients Admissibility/Credibility
9 Fact: Opinion: Tells what actually happened; can be true or false Tells an attitude or judgment; cannot be proven true or false
10 Think Before You Write It May be Evidence One Day Private messages made public
11 Social Media Fact or Opinion facebook Pinterest LinkedIn twitter
12 FACTS opinions
13
14 Facts Contract Get it in writing Do not start project until you have a signed agreement(s) Owner Developer Subs Modify the contract in writing
15 To Document or Not to Document
16 The Dilemma Client 24/7/365 Who What Where When Why How Questions Answers
17 The Dilemma Addenda/Change Orders Original Contract Change Order
18 The Dilemma Site Visit
19 The Dilemma Site Visit
20 The Dilemma Project Dispute
21 Preserve the Record
22 Document Retention Policy What files, documents, and communications will be retained How long such files will be retained
23 All Media
24 Organization
25 Data Retention Policy Outline State the purpose of the policy Define policy users Identify the type of data that are covered by the policy Identify the length of time for retention Identify exceptions to the rule Outline the procedures for data retention Outline the procedures for data destruction
26 Retention Period The average retention period is between 3 to 7 years Strongly encouraged retention of records for projects until the expiration of the applicable statute of limitations period
27 You ve been served Immediately and automatically extended upon notice of a claim or lawsuit + Preservation letter(s) Applicable to all project employees and subs
28 Spoliation Definition: the intentional, reckless, or negligent withholding, hiding, fabricating, or destroying of evidence relevant to a legal proceeding EVIDENCE
29 Spoliation Purpose To prevent a party from undermining the discovery process by destroying unfavorable evidence The duty to exercise reasonable care to preserve relevant information upon notice of a potential claim It may be irrelevant if a breach of this duty is intentional or negligent
30 Spoliation Presumption The intentional spoliation of evidence relevant to a case raises a presumption that the evidence would have been unfavorable to the position of the spoliator. This presumption may be rebutted if the alleged spoliator shows that the evidence in question was not destroyed with fraudulent intent or purpose
31 Federal Rules of Civil Procedure Discovery/Document Production The party requesting discovery has the ability to designate the form or forms in which it wants electronically stored information produced There may be different formats for different types of electronically stored information The form of production is extremely important when exchanging electronically stored information If the responding party maintains the requested information in a searchable format in its ordinary course of business, the production should not be produced in a format that removes this feature
32 Spoliation Analysis Was there a duty? Actual notice not required Reasonably should know a claim may be filed Was there resulting prejudice to the other party s case? Relevancy, harmful effect, and availability of other evidence Was the evidence spoliated, intentionally or negligently? Potential defenses to spoliation: destruction in the ordinary course of business, or beyond the spoliator s control However, if the duty arose prior to destruction, such defenses will not work
33 Spoliation Remedies A party is entitled to a remedy when the spoliation hinders its ability to present its case OR defense to a case The court has broad discretion regarding appropriate sanctions Sanctions range from dismissing a case or awarding default judgment (or summary judgment) against the spoliator to a jury instruction regarding the spoliation
34 Summary
35 Summary Document FACTS. Do not document opinions. Differentiate privileged communications from nonprotected communications. Document retention policies dictate what to retain and for how long. Upon notice of a claim or document retention letter, preserve all data.
36 This concludes The American Institute of Architects Continuing Education Systems Program Alayne McDonald, Professional Development Coordinator Alison Mullins, Senior Counsel
Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson
Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your
More informationDISTRACTED DRIVING. The Biggest Issue in Driving Today
DISTRACTED DRIVING The Biggest Issue in Driving Today RLI Design Professionals Design Professionals Learning Event DPLE 167 February 17, 2016 RLI Design Professionals RLI Design Professionals is a Registered
More informationJustice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information
Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of
More informationPublic Records and Records Retention
Public Records and Records Retention Administrative Professionals Workshop July 15, 2016 Presented by: Lisa M. Freiley, Staff Counsel / PACE Administrator Agenda Public Records Law Overview. How to respond
More informationFederal Rules of Civil Procedure IT Obligations For
Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,
More informationProposed Spoliation Rules Would Impact Apple-Samsung Trial
Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung
More informationA Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016
A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US
More informationLegal, Ethical, and Professional Issues in Information Security
Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN
More informationThe Legal Health Record and E-Discovery: Where You Need to Be
The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.
More informationAAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO
AAPA Legal Issues and Record Retention May 15, 2013 SML, Inc. Steve M. Lewis, President and CEO 813.205.2850 stevemlewis@msn.com www.smlinfo.net TABLE OF CONTENTS Page CORPORATE OR PUBLIC RECORDS 3 Copy
More informationVIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY
PRIVACY POLICY Last Modified: September 11, 2017 PERSONS OR PARTIES COVERED This Privacy Policy is intended to cover all visitors to this website, all subscribers to lists or newsletters associated with
More informationAtlantic Bylaw Officers Association
Atlantic Bylaw Officers Association Certification Program Page 1 of 18 Table of Contents The ABOA Certification Program... 3 Introduction... 3 Pre-Requisites when Applying for Certification... 9 Experience...
More informationHealthfirst Website Privacy Policy
Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions
More informationPolicies & Medical Disclaimer
Policies & Medical Disclaimer Money Back Guarantee Heather Woodruff Nutrition proudly stands behind its programs. To help you feel comfortable we offer a Money-Back Guarantee* If you are not absolutely
More informationPOLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6
POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention
More informationReducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.
Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Sr. ediscovery Counsel, Symantec Today s Speaker Dean Gonsowski, Esq. Mr. Gonsowski is the Sr. ediscovery
More informationRMU-IT-SEC-01 Acceptable Use Policy
1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities
More informationAcceptable Use Policy
IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations
More informationInternet, , and Computer Usage Policy
Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed
More informationFederated Authentication for E-Infrastructures
Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended
More informationAcceptable Use Policy
Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information
More informationTERMS OF ENGAGEMENT TO PROVIDE ACCESSIBILITY CONSULTING SERVICES BY A CERTIFIED ACCESS SPECIALIST (CASp)
TERMS OF ENGAGEMENT TO PROVIDE ACCESSIBILITY CONSULTING SERVICES BY A CERTIFIED ACCESS SPECIALIST (CASp) DATE OF ENGAGEMENT AGREEMENT: BETWEEN: (OWNER) AND CASp: I.LAWRENCE KALTMAN, AIA, CASp (CASp) FOR
More informationPractical Cyber Security for Architects of Small Firms (1 AIA CEU)
Practical Cyber Security for Architects of Small Firms (1 AIA CEU) with Angela Render Thunderpaw.com 571-331-5941 Transforming Architecture LLC is a Registered Provider with The American Institute of Architects
More informationTOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell
Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when
More informationProfessional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design
Professional Certification in the Commissioning Industry Mike Eardley, PE, CCP Director of Commissioning services Cannon Design AIA Quality Assurance The Building Commissioning Association is a Registered
More informationRecords Management and Retention
Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors
More information8/28/2017. What Is a Federal Record? What is Records Management?
Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical
More informationCARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose
CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,
More information5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.
Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,
More informationSubject: University Information Technology Resource Security Policy: OUTDATED
Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from
More informationFederated authentication for e-infrastructures
Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction
More informationMinnesota Government Data Practices Act and Litigation Holds In An Electronic Environment
Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment MACA-MCHRMA Fall Conference Ruttger s Bay Lake Lodge September 10, 2015 1 PRESENTED BY: Karen Clayton Ebert MCIT
More informationCybersmart Buildings: Securing Your Investments in Connectivity and Automation
Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning
More informationLegal Disclaimer. Copyright Notice
Legal Disclaimer Although the information provided by Clearwater Compliance may be helpful in informing customers and others who have an interest in data privacy and security issues, it does not constitute
More informationSchedule Identity Services
This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth
More informationCommunity Unit School District No. 1. School Board
Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in
More informationComponents and Considerations in Building an Insider Threat Program
Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management
More informationCircling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.
Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case
More informationDevelopment of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit
Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,
More informationRecords Information Management
Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom
More informationDATA PROCESSING AGREEMENT
DATA PROCESSING AGREEMENT This Data Processing Agreement ( DPA ) is entered into between: A. The company stated in the Subscription Agreement (as defined below) ( Data Controller ) and B. Umbraco A/S Haubergsvej
More informationPGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES
PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone
More informationSecurity and Privacy Breach Notification
Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains
More informationThe Event Request form is located under the News & Events tab on the SABA website. 2
SABA Communications Policy Proposal P. 1 Revised December 18, 2015 Erin Boren Background The San Antonio Bar Association s Communications Policy was first adopted by SABA s Executive Board and Board of
More informationE-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.
E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal
More informationPage 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax
1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification
More informationUniversity Policies and Procedures ELECTRONIC MAIL POLICY
University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must
More informationBAUMIT LIFE CHALLENGE THE PUBLIC VOTING
BAUMIT LIFE CHALLENGE THE PUBLIC VOTING Baumit Life Challenge is a competition for the best façade throughout Europe. All objects will be judged in 6 categories by a high calibre panel of independent experts.
More informationCLEANING OUT THE DATA CLOSET
2 Moderator Hon. Andrew Jennifer Aaron Brett Peck Feldman Laliberte Tarr DLA Piper DLA Piper Zapproved Caesars 3 What is defensible deletion? What does the law say? How do we get started? What if something
More informationRed Flags/Identity Theft Prevention Policy: Purpose
Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and
More informationData Compromise Notice Procedure Summary and Guide
Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or
More informationCredentials and Marks Policy
Credentials and Marks Policy Table of Contents Credential and Trademark Use Policy... 3 Introduction... 3 Section A: BOC-Certified Practitioner Credentials and Marks... 4 Section B: BOC-Accredited Facility
More information3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?
Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What
More informationHallmark Solutions Limited PRIVACY NOTICE
Hallmark Solutions Limited PRIVACY NOTICE Who We Are Hallmark Solutions Limited specialise in the delivery of IT related projects, including consultancy, project management, software development and training.
More informationEffective security is a team effort involving the participation and support of everyone who handles Company information and information systems.
BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.
More informationPlease comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at
Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at http://www.leanconstruction.org/usage.pdf when using this file. Thank you. Provider Name: Lean Construction
More informationConjure Network LLC Privacy Policy
Conjure Network LLC Privacy Policy Effective September 28, 2018 Conjure Network LLC ( Conjure, us, we, or our ) operates http://www.conjure.network (the Site or Website ). This Privacy Policy (the Policy
More informationPrivacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act
Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act Joe DePaul, Senior Vice President Brian Finch, Partner April 9, 2015 Pillsbury Winthrop Shaw Pittman LLP The Threat
More informationPrivacy Notice Q-UK-PO02
1. Scope 1.1. This informs users about the nature, extent, and purpose of the collection and use of personal data by Colt Group Limited and Colt International Limited ( Colt or the Company ). This governs
More informationFarmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER
Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER SUNY Records Retention and Disposition Policy - 6609 Retention
More informationRecords Retention Training
Records Retention Training Purpose LSUHSC-NO must comply with state and federal records retention requirements in order to provide appropriate access to state information to the public and to limit the
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More information2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY
2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on
More informationAcceptable Use Policy (AUP)
Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet
More informationTransport Exchange Group Ltd Complaints procedure 2018
Transport Exchange Group Ltd Complaints procedure 2018 We take complaints about our work, staff and levels of service very seriously. If you are not satisfied, please follow our process for raising a formal
More informationCatalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1
Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and
More informationPolicy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents
Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM
More informationThe HIPAA Omnibus Rule
The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed
More informationBuilding Information Modeling and Digital Data Exhibit
Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following
More informationYADTEL - Privacy Information INFORMATION WE COLLECT
YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part
More informationTo clarify the types of information we collect upon your permission and the purposes and methods for processing of them;
Piri Privacy Policy Last Updated: 17.05.2018 Hello and Welcome to our Privacy Policy! This Privacy Policy of Piri Yazılım Mühendislik ve Ticaret A.Ş. (We will call it Piri, We or Us in the text from now
More informationDoD SBIR/STTR Training
CERTIFICATION February 16, 2016 1 What are Certifications? Certifications are mandatory agreements by the small business concern (SBC) submitting a proposal to SBIR/STTR to certify that they fit all of
More informationInstructions: Request for Documents
Instructions: Request for Documents These forms were prepared by the Justice & Diversity Center, a nonprofit organization, and are not official court forms. Checklist This packet provides a general form
More informationEmergency Nurses Association Privacy Policy
Emergency Nurses Association Privacy Policy The Emergency Nurses Association ( ENA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service while respecting your
More informationBYOD (Bring Your Own Device): Employee-owned Technology in the Workplace
BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information
More informationData Processing Agreement
Data Processing Agreement Merchant (the "Data Controller") and Nets (the "Data Processor") (separately referred to as a Party and collectively the Parties ) have concluded this DATA PROCESSING AGREEMENT
More informationPrivacy Policy GENERAL
Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More information2018 Certified Paralegal Examination FAQs
2018 Certified Paralegal Examination FAQs Contents When will the examination be administered?... 2 Will I receive my score at the testing center for the initial testing window?... 2 What are the examination
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationFirst name: Address for correspondence (including postcode): Occupation: Daytime phone no: Mobile: Home phone no: address:
TPO Complaints Form A copy of this form and attachments will be sent to the registered form TPO ref This is the form you need to complete if you want The Property Ombudsman to look at your complaint. Remember
More informationChecklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery
Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules
More informationRUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology
RUTGERS POLICY Section: 70.2.8 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Acceptable Use Formerly Book: 95-01-09-05:00 Approval Authority:
More information4. Save as expressly set out herein no license is granted in respect of any intellectual property rights vested in F1000 or other third parties.
Legal information The website F1000.com is operated by Faculty of 1000 Limited, a company registered in England and Wales with Company Number 3739756, with registered offices at Middlesex House, 34-42
More informationManaging Your Record Retention Policy Safely
Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients
More informationSpree Privacy Policy
Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you
More informationADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)
ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of
More informationAll other forms of social media are prohibited unless reviewed and approved prior to use by designated SFA Compliance Principal.
VI.1.5. Social Media Social media is a form of electronic communication that allows individuals to create, share or exchange information and ideas with others in virtual communities and networks. When
More informationPrivacy Notice. General Information Protection Regulation ( GDPR )
Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise
More informationSolv3D Privacy Policy
Solv3D Inc. ( Solv3D, We, Us, or Our ) is committed to transparency in the collection and use of your personal information. The Privacy Policy below describes how we collect and use personal information,
More informationTrends in Data Center Energy Efficiency
Trends in Data Center Energy Efficiency Presented by: Todd Boucher Better Building by Design 2012 1 Efficiency Vermont is a Registered Provider with The American Institute of Architects Continuing Education
More informationAmerican Dental Hygienists Association Privacy Policy
American Dental Hygienists Association Privacy Policy The American Dental Hygienists Association ( ADHA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service
More informationData Protection Policy
Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please
More informationLPI Approved Training Partner (LPI ATP) Program Agreement
The following agreement is herewith concluded between: - hereinafter Partner - and Open Source Certification GmbH, LPI Central Europe, Karthäuserstraße 8, 34117 Kassel, Germany, (hereafter, LPI CE ) Preamble
More information2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;
WEBSITE USAGE TERMS AND CONDITIONS Acceptable Usage Terms 1. Introduction 1.1 By accessing the UCS Technology Services website, web pages or any part thereof for any reason whatsoever, the User agrees
More informationNUCONNECT INTERNET ACCEPTABLE USE POLICY
NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage
More informationCAREERBUILDER.COM - PRIVACY POLICY
Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder
More informationCOMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH
COMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH 1. CBD Facebook Branch Commercial Bank of Dubai psc (hereinafter "CBD"), allows access and
More informationInformation Security Incident Response Plan
Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,
More informationHire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers
Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,
More information