To Document or Not to Document: That is the Question DPLE 182

Size: px
Start display at page:

Download "To Document or Not to Document: That is the Question DPLE 182"

Transcription

1 To Document or Not to Document: That is the Question DPLE 182

2 RLI Design Professionals is a Registered Provider with The American Institute of Architects Continuing Education Systems. Credit earned on completion of this program will be reported to CES Records for AIA members. Certificates of Completion for non-aia members are available on request. This program is registered with the AIA/CES for continuing professional education. As such, it does not include content that may be deemed or construed to be an approval or endorsement by the AIA of any material of construction or any method or manner of handling, using, distributing, or dealing in any material or product. Questions related to specific materials, methods, and services will be addressed at the conclusion of this presentation.

3 Copyright Materials This presentation is protected by US and International Copyright laws. Reproduction, distribution, display and use of the presentation without written permission of the speakers is prohibited. RLI Design Professionals

4 Course Description When organizing your file after a project is complete, what should you toss, and what should you keep? Did you ever have a project you wish you could delete by accident? Did you ever have a project drawing that went out and was later corrected, so you wish you could make the initial drawing disappear? This seminar will provide guidance on document retention policies, covering the laws and rules prohibiting the destruction of evidence including electronically-stored information.

5 Learning Objectives Participants in this session will: Gain perspective on what to document versus what notto document Consider the merits of internal versus external project communications Review the basics of a document retention policy Understand how the law applies to electronic and non-electronic information

6 Memories fade even when there is an incentive to remember accurately

7 Create the Record

8 The Record Be objective State facts only Do not record opinions or conclusions as to the cause of an incident or how it could have been avoided Put it in writing Handwritten Notes/"Speed Forms" Tapes/Transcripts Letters to clients Admissibility/Credibility

9 Fact: Opinion: Tells what actually happened; can be true or false Tells an attitude or judgment; cannot be proven true or false

10 Think Before You Write It May be Evidence One Day Private messages made public

11 Social Media Fact or Opinion facebook Pinterest LinkedIn twitter

12 FACTS opinions

13

14 Facts Contract Get it in writing Do not start project until you have a signed agreement(s) Owner Developer Subs Modify the contract in writing

15 To Document or Not to Document

16 The Dilemma Client 24/7/365 Who What Where When Why How Questions Answers

17 The Dilemma Addenda/Change Orders Original Contract Change Order

18 The Dilemma Site Visit

19 The Dilemma Site Visit

20 The Dilemma Project Dispute

21 Preserve the Record

22 Document Retention Policy What files, documents, and communications will be retained How long such files will be retained

23 All Media

24 Organization

25 Data Retention Policy Outline State the purpose of the policy Define policy users Identify the type of data that are covered by the policy Identify the length of time for retention Identify exceptions to the rule Outline the procedures for data retention Outline the procedures for data destruction

26 Retention Period The average retention period is between 3 to 7 years Strongly encouraged retention of records for projects until the expiration of the applicable statute of limitations period

27 You ve been served Immediately and automatically extended upon notice of a claim or lawsuit + Preservation letter(s) Applicable to all project employees and subs

28 Spoliation Definition: the intentional, reckless, or negligent withholding, hiding, fabricating, or destroying of evidence relevant to a legal proceeding EVIDENCE

29 Spoliation Purpose To prevent a party from undermining the discovery process by destroying unfavorable evidence The duty to exercise reasonable care to preserve relevant information upon notice of a potential claim It may be irrelevant if a breach of this duty is intentional or negligent

30 Spoliation Presumption The intentional spoliation of evidence relevant to a case raises a presumption that the evidence would have been unfavorable to the position of the spoliator. This presumption may be rebutted if the alleged spoliator shows that the evidence in question was not destroyed with fraudulent intent or purpose

31 Federal Rules of Civil Procedure Discovery/Document Production The party requesting discovery has the ability to designate the form or forms in which it wants electronically stored information produced There may be different formats for different types of electronically stored information The form of production is extremely important when exchanging electronically stored information If the responding party maintains the requested information in a searchable format in its ordinary course of business, the production should not be produced in a format that removes this feature

32 Spoliation Analysis Was there a duty? Actual notice not required Reasonably should know a claim may be filed Was there resulting prejudice to the other party s case? Relevancy, harmful effect, and availability of other evidence Was the evidence spoliated, intentionally or negligently? Potential defenses to spoliation: destruction in the ordinary course of business, or beyond the spoliator s control However, if the duty arose prior to destruction, such defenses will not work

33 Spoliation Remedies A party is entitled to a remedy when the spoliation hinders its ability to present its case OR defense to a case The court has broad discretion regarding appropriate sanctions Sanctions range from dismissing a case or awarding default judgment (or summary judgment) against the spoliator to a jury instruction regarding the spoliation

34 Summary

35 Summary Document FACTS. Do not document opinions. Differentiate privileged communications from nonprotected communications. Document retention policies dictate what to retain and for how long. Upon notice of a claim or document retention letter, preserve all data.

36 This concludes The American Institute of Architects Continuing Education Systems Program Alayne McDonald, Professional Development Coordinator Alison Mullins, Senior Counsel

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson

Electronic Discovery in Employment Cases: What Every Employer Needs to Know. Presented By: Shannon Cohorst Johnson Electronic Discovery in Employment Cases: What Every Employer Needs to Know Presented By: Shannon Cohorst Johnson Understand e-discovery and the latest tactics by claimants and counsel Understand your

More information

DISTRACTED DRIVING. The Biggest Issue in Driving Today

DISTRACTED DRIVING. The Biggest Issue in Driving Today DISTRACTED DRIVING The Biggest Issue in Driving Today RLI Design Professionals Design Professionals Learning Event DPLE 167 February 17, 2016 RLI Design Professionals RLI Design Professionals is a Registered

More information

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information

Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of Electronically Stored Information Presented: 35 th Annual Conference on Securities Regulation and Business Law February 7-8, 2013 Austin, Texas Justice or a Game of Gotcha? Emerging Standards Concerning Preservation (and Spoliation) of

More information

Public Records and Records Retention

Public Records and Records Retention Public Records and Records Retention Administrative Professionals Workshop July 15, 2016 Presented by: Lisa M. Freiley, Staff Counsel / PACE Administrator Agenda Public Records Law Overview. How to respond

More information

Federal Rules of Civil Procedure IT Obligations For

Federal Rules of Civil Procedure IT Obligations For Federal Rules of Civil Procedure IT Obligations For Email Message Logic is a business unit of Data Storage Corporation. 212-564-4922 www.messagelogic.net or www.datastoragecorp.com 2013 Data Storage Corporation,

More information

Proposed Spoliation Rules Would Impact Apple-Samsung Trial

Proposed Spoliation Rules Would Impact Apple-Samsung Trial Published in: Law Technology News July 31, 2012 Proposed Spoliation Rules Would Impact Apple-Samsung Trial By Henry Kelston The jury trial in the multibillion dollar patent war between Apple and Samsung

More information

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016

A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 A Privacy and Cybersecurity Primer for Nonprofits Nonprofits in the Digital Age March 9, 2016 Panelists Beverly J. Jones, Esq. Senior Vice President and Chief Legal Officer ASPCA Christin S. McMeley, CIPP-US

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

The Legal Health Record and E-Discovery: Where You Need to Be

The Legal Health Record and E-Discovery: Where You Need to Be The Legal Health Record and E-Discovery: Where You Need to Be Webinar June 9, 2009 Practical Tools for Seminar Learning Copyright 2009 American Health Information Management Association. All rights reserved.

More information

AAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO

AAPA. Legal Issues and Record Retention. SML, Inc. Steve M. Lewis, President and CEO AAPA Legal Issues and Record Retention May 15, 2013 SML, Inc. Steve M. Lewis, President and CEO 813.205.2850 stevemlewis@msn.com www.smlinfo.net TABLE OF CONTENTS Page CORPORATE OR PUBLIC RECORDS 3 Copy

More information

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY

VIEWING AND/OR USE AND/OR COMMUNICATION IS CONSTRUED AS ACCEPTANCE OF THE TERMS OF THIS POLICY PRIVACY POLICY Last Modified: September 11, 2017 PERSONS OR PARTIES COVERED This Privacy Policy is intended to cover all visitors to this website, all subscribers to lists or newsletters associated with

More information

Atlantic Bylaw Officers Association

Atlantic Bylaw Officers Association Atlantic Bylaw Officers Association Certification Program Page 1 of 18 Table of Contents The ABOA Certification Program... 3 Introduction... 3 Pre-Requisites when Applying for Certification... 9 Experience...

More information

Healthfirst Website Privacy Policy

Healthfirst Website Privacy Policy Healthfirst Website Privacy Policy We value your relationship with us and have detailed our privacy objectives for our website below. Please be sure to read this notice as it covers the terms and conditions

More information

Policies & Medical Disclaimer

Policies & Medical Disclaimer Policies & Medical Disclaimer Money Back Guarantee Heather Woodruff Nutrition proudly stands behind its programs. To help you feel comfortable we offer a Money-Back Guarantee* If you are not absolutely

More information

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6

POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 POLICY TITLE: Record Retention and Destruction POLICY NO: 277 PAGE 1 of 6 North Gem School District No. 149 establishes the following guidelines to provide administrative direction pertaining to the retention

More information

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq.

Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Reducing ediscovery Cost and Risk with Intelligent Information Governance Dean Gonsowski, Esq. Sr. ediscovery Counsel, Symantec Today s Speaker Dean Gonsowski, Esq. Mr. Gonsowski is the Sr. ediscovery

More information

RMU-IT-SEC-01 Acceptable Use Policy

RMU-IT-SEC-01 Acceptable Use Policy 1.0 Purpose 2.0 Scope 2.1 Your Rights and Responsibilities 3.0 Policy 3.1 Acceptable Use 3.2 Fair Share of Resources 3.3 Adherence with Federal, State, and Local Laws 3.4 Other Inappropriate Activities

More information

Acceptable Use Policy

Acceptable Use Policy IT and Operations Section 100 Policy # Organizational Functional Area: Policy For: Date Originated: Date Revised: Date Board Approved: Department/Individual Responsible for Maintaining Policy: IT and Operations

More information

Internet, , and Computer Usage Policy

Internet,  , and Computer Usage Policy Important disclaimer: The policy available on this page is only an example and is furnished merely as an illustration of its category. It is not meant to be taken and used without consultation with a licensed

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy POLICY 07.01.01 Effective Date: 01/01/2015 The following are responsible for the accuracy of the information contained in this document Responsible Policy Administrator Information

More information

TERMS OF ENGAGEMENT TO PROVIDE ACCESSIBILITY CONSULTING SERVICES BY A CERTIFIED ACCESS SPECIALIST (CASp)

TERMS OF ENGAGEMENT TO PROVIDE ACCESSIBILITY CONSULTING SERVICES BY A CERTIFIED ACCESS SPECIALIST (CASp) TERMS OF ENGAGEMENT TO PROVIDE ACCESSIBILITY CONSULTING SERVICES BY A CERTIFIED ACCESS SPECIALIST (CASp) DATE OF ENGAGEMENT AGREEMENT: BETWEEN: (OWNER) AND CASp: I.LAWRENCE KALTMAN, AIA, CASp (CASp) FOR

More information

Practical Cyber Security for Architects of Small Firms (1 AIA CEU)

Practical Cyber Security for Architects of Small Firms (1 AIA CEU) Practical Cyber Security for Architects of Small Firms (1 AIA CEU) with Angela Render Thunderpaw.com 571-331-5941 Transforming Architecture LLC is a Registered Provider with The American Institute of Architects

More information

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell

TOP TRENDING THE MAGAZINE. Menu. 1 of 6 6/7/16 4:38 PM. Keep it Simple, Legal. A New Role Bridging Business and Legal at Shell Menu TOP TRENDING 1 2 3 4 5 Keep it Simple, Legal A New Role Bridging Business and Legal at Shell GC Perspectives on Legal Operations LGBT Employee Considerations Outside the United States How to Act when

More information

Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design

Professional Certification in the Commissioning Industry. Mike Eardley, PE, CCP Director of Commissioning services Cannon Design Professional Certification in the Commissioning Industry Mike Eardley, PE, CCP Director of Commissioning services Cannon Design AIA Quality Assurance The Building Commissioning Association is a Registered

More information

Records Management and Retention

Records Management and Retention Records Management and Retention Category: Governance Number: Audience: University employees and Board members Last Revised: January 29, 2017 Owner: Secretary to the Board Approved by: Board of Governors

More information

8/28/2017. What Is a Federal Record? What is Records Management?

8/28/2017. What Is a Federal Record? What is Records Management? Ramona Branch Oliver US Department of Labor What Is a Federal Record? Records include all books, papers, maps, photographs, machine-readable materials, or other documentary materials, regardless of physical

More information

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose

CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION. I. Purpose CARROLL COUNTY PUBLIC SCHOOLS ADMINISTRATIVE REGULATIONS BOARD POLICY EHB: DATA/RECORDS RETENTION I. Purpose To provide guidance to schools and administrative offices regarding the maintenance, retention,

More information

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization.

5/6/2013. Creating and preserving records that contain adequate and proper documentation of the organization. Jay Olin National Archives Ramona Branch Oliver Department of Labor ASAP 6 th Annual National Training Conference May 12-15, 15, 2013 What Is a Federal Record? Records include all books, papers, maps,

More information

Subject: University Information Technology Resource Security Policy: OUTDATED

Subject: University Information Technology Resource Security Policy: OUTDATED Policy 1-18 Rev. 2 Date: September 7, 2006 Back to Index Subject: University Information Technology Resource Security Policy: I. PURPOSE II. University Information Technology Resources are at risk from

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment

Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment Minnesota Government Data Practices Act and Litigation Holds In An Electronic Environment MACA-MCHRMA Fall Conference Ruttger s Bay Lake Lodge September 10, 2015 1 PRESENTED BY: Karen Clayton Ebert MCIT

More information

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Cybersmart Buildings: Securing Your Investments in Connectivity and Automation Jason Rosselot, CISSP, Director Product Cyber Security, Johnson Controls AIA Quality Assurance The Building Commissioning

More information

Legal Disclaimer. Copyright Notice

Legal Disclaimer. Copyright Notice Legal Disclaimer Although the information provided by Clearwater Compliance may be helpful in informing customers and others who have an interest in data privacy and security issues, it does not constitute

More information

Schedule Identity Services

Schedule Identity Services This document (this Schedule") is the Schedule for Services related to the identity management ( Identity Services ) made pursuant to the ehealth Ontario Services Agreement (the Agreement ) between ehealth

More information

Community Unit School District No. 1. School Board

Community Unit School District No. 1. School Board Community Unit School District No. 1 2:250-AP2 School Board Administrative Procedure - Protocols for Record Preservation and Development of Retention Schedules Legal Citations Each legal requirement in

More information

Components and Considerations in Building an Insider Threat Program

Components and Considerations in Building an Insider Threat Program Components and Considerations in Building an Insider Threat Program Carly Huth Insider Threat Researcher, CEWM Carly L. Huth is an insider threat researcher in the Cyber Enterprise and Workforce Management

More information

Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved.

Circling the Wagons. How to Implement an Effective Litigation Hold. Copyright 2006 IE Discovery, Inc. All rights reserved. Circling the Wagons How to Implement an Effective Litigation Hold Copyright 2006 IE Discovery, Inc. All rights reserved. Agenda Importance of Document Retention Plan Litigation Hold Best Practices Case

More information

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit

Development of your Company s Record Information System and Disaster Preparedness. The National Emergency Management Summit Development of your Company s Record Information System and Disaster Preparedness The National Emergency Management Summit Thomas D. Anthony Frost Brown Todd LLC Attorneys at Law 201 E. Fifth Street Cincinnati,

More information

Records Information Management

Records Information Management Information Systems Sciences Records Information Management Region V Spring Conference March 26, 2015 Was I supposed to keep that 1 Where did we store that 2 Space Issues. Need storage space for a classroom

More information

DATA PROCESSING AGREEMENT

DATA PROCESSING AGREEMENT DATA PROCESSING AGREEMENT This Data Processing Agreement ( DPA ) is entered into between: A. The company stated in the Subscription Agreement (as defined below) ( Data Controller ) and B. Umbraco A/S Haubergsvej

More information

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES

PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES PGTelco Internet TERMS OF SERVICE AND ACCEPTABLE USE POLICIES Thank you for choosing a PGTelco Internet as your internet service provider. PGTelco Internet is an affiliate of The Prairie Grove Telephone

More information

Security and Privacy Breach Notification

Security and Privacy Breach Notification Security and Privacy Breach Notification Version Approval Date Owner 1.1 May 17, 2017 Privacy Officer 1. Purpose To ensure that the HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) maintains

More information

The Event Request form is located under the News & Events tab on the SABA website. 2

The Event Request form is located under the News & Events tab on the SABA website. 2 SABA Communications Policy Proposal P. 1 Revised December 18, 2015 Erin Boren Background The San Antonio Bar Association s Communications Policy was first adopted by SABA s Executive Board and Board of

More information

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case.

E-DISCOVERY. The process in which electronic data is sought, located, secured, using it as evidence in a civil or criminal legal case. E-DISCOVERY The process in which electronic data is sought, located, secured, and analyzed with the intent of using it as evidence in a civil or criminal legal case. I. Guidance Regarding the Amended Federal

More information

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax

Page 1 of Matthews Mint Hill Road, Suite C; Matthews, NC Phone Fax 1. PURPOSE The Loss Prevention Foundation, ( the foundation, LPF, the examiner ) makes high-stakes retail loss prevention certification Exams publicly available for the purpose of earning certification

More information

University Policies and Procedures ELECTRONIC MAIL POLICY

University Policies and Procedures ELECTRONIC MAIL POLICY University Policies and Procedures 10-03.00 ELECTRONIC MAIL POLICY I. Policy Statement: All students, faculty and staff members are issued a Towson University (the University ) e-mail address and must

More information

BAUMIT LIFE CHALLENGE THE PUBLIC VOTING

BAUMIT LIFE CHALLENGE THE PUBLIC VOTING BAUMIT LIFE CHALLENGE THE PUBLIC VOTING Baumit Life Challenge is a competition for the best façade throughout Europe. All objects will be judged in 6 categories by a high calibre panel of independent experts.

More information

CLEANING OUT THE DATA CLOSET

CLEANING OUT THE DATA CLOSET 2 Moderator Hon. Andrew Jennifer Aaron Brett Peck Feldman Laliberte Tarr DLA Piper DLA Piper Zapproved Caesars 3 What is defensible deletion? What does the law say? How do we get started? What if something

More information

Red Flags/Identity Theft Prevention Policy: Purpose

Red Flags/Identity Theft Prevention Policy: Purpose Red Flags/Identity Theft Prevention Policy: 200.3 Purpose Employees and students depend on Morehouse College ( Morehouse ) to properly protect their personal non-public information, which is gathered and

More information

Data Compromise Notice Procedure Summary and Guide

Data Compromise Notice Procedure Summary and Guide Data Compromise Notice Procedure Summary and Guide Various federal and state laws require notification of the breach of security or compromise of personally identifiable data. No single federal law or

More information

Credentials and Marks Policy

Credentials and Marks Policy Credentials and Marks Policy Table of Contents Credential and Trademark Use Policy... 3 Introduction... 3 Section A: BOC-Certified Practitioner Credentials and Marks... 4 Section B: BOC-Accredited Facility

More information

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )?

3/13/2018. Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What is Electronically Stored Information ( ESI )? Legal Hold Notices, the Duty to Preserve, and Electronically Stored Information ( ESI ) What Every In-House Attorney Needs to Know Presented by Mike Seitz, Attorney at Spencer Fane LLP March 14, 2018 What

More information

Hallmark Solutions Limited PRIVACY NOTICE

Hallmark Solutions Limited PRIVACY NOTICE Hallmark Solutions Limited PRIVACY NOTICE Who We Are Hallmark Solutions Limited specialise in the delivery of IT related projects, including consultancy, project management, software development and training.

More information

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems.

Effective security is a team effort involving the participation and support of everyone who handles Company information and information systems. BACKED BY REFERENCE GUIDE Acceptable Use Policy GENERAL GUIDANCE NOTE: This sample policy is not legal advice or a substitute for consultation with qualified legal counsel. Laws vary from country to country.

More information

Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at

Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at Please comply with the Lean Construction Institute s Usage Policies and Attribution Guidelines at http://www.leanconstruction.org/usage.pdf when using this file. Thank you. Provider Name: Lean Construction

More information

Conjure Network LLC Privacy Policy

Conjure Network LLC Privacy Policy Conjure Network LLC Privacy Policy Effective September 28, 2018 Conjure Network LLC ( Conjure, us, we, or our ) operates http://www.conjure.network (the Site or Website ). This Privacy Policy (the Policy

More information

Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act

Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act Privacy, Cyber Threats and Risk Mitigation Mitigating Liability Through the SAFETY Act Joe DePaul, Senior Vice President Brian Finch, Partner April 9, 2015 Pillsbury Winthrop Shaw Pittman LLP The Threat

More information

Privacy Notice Q-UK-PO02

Privacy Notice Q-UK-PO02 1. Scope 1.1. This informs users about the nature, extent, and purpose of the collection and use of personal data by Colt Group Limited and Colt International Limited ( Colt or the Company ). This governs

More information

Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER

Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER Farmingdale State College Records Management Training PRESENTED BY DOROTHY HUGHES INTERNAL CONTROL OFFICER AND RECORDS MANAGEMENT OFFICER SUNY Records Retention and Disposition Policy - 6609 Retention

More information

Records Retention Training

Records Retention Training Records Retention Training Purpose LSUHSC-NO must comply with state and federal records retention requirements in order to provide appropriate access to state information to the public and to limit the

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Acceptable Use Policy (AUP)

Acceptable Use Policy (AUP) Acceptable Use Policy (AUP) Questions regarding this policy and complaints of violations of this policy by PLAINS INTERNET users can be directed to support@plainsinternet.com. Introduction Plains Internet

More information

Transport Exchange Group Ltd Complaints procedure 2018

Transport Exchange Group Ltd Complaints procedure 2018 Transport Exchange Group Ltd Complaints procedure 2018 We take complaints about our work, staff and levels of service very seriously. If you are not satisfied, please follow our process for raising a formal

More information

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1

Catalent Inc. Privacy Policy v.1 Effective Date: May 25, 2018 Page 1 Catalent, Inc. Privacy Policy, effective May 25, 2018 1. This Policy This Privacy Policy (this Policy ) is issued by Catalent, Inc. on behalf of itself and its domestic and international subsidiaries and

More information

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents

Policy Summary: This guidance outlines ACAOM s policy and procedures for managing documents. Table of Contents Policy Title: Approved By: ACAOM Commissioners History: Policy Implementation Date: 28 October 2016 Last Updated: Related Policies: ACAOM -Records Retention Schedule References: Responsible Official: ACAOM

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

Building Information Modeling and Digital Data Exhibit

Building Information Modeling and Digital Data Exhibit Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following

More information

YADTEL - Privacy Information INFORMATION WE COLLECT

YADTEL - Privacy Information INFORMATION WE COLLECT YADTEL - Privacy Information As a customer of Yadtel, you are entitled to know what we do with personal information about you that we receive. We consider our treatment of such information to be a part

More information

To clarify the types of information we collect upon your permission and the purposes and methods for processing of them;

To clarify the types of information we collect upon your permission and the purposes and methods for processing of them; Piri Privacy Policy Last Updated: 17.05.2018 Hello and Welcome to our Privacy Policy! This Privacy Policy of Piri Yazılım Mühendislik ve Ticaret A.Ş. (We will call it Piri, We or Us in the text from now

More information

DoD SBIR/STTR Training

DoD SBIR/STTR Training CERTIFICATION February 16, 2016 1 What are Certifications? Certifications are mandatory agreements by the small business concern (SBC) submitting a proposal to SBIR/STTR to certify that they fit all of

More information

Instructions: Request for Documents

Instructions: Request for Documents Instructions: Request for Documents These forms were prepared by the Justice & Diversity Center, a nonprofit organization, and are not official court forms. Checklist This packet provides a general form

More information

Emergency Nurses Association Privacy Policy

Emergency Nurses Association Privacy Policy Emergency Nurses Association Privacy Policy The Emergency Nurses Association ( ENA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service while respecting your

More information

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace

BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace BYOD (Bring Your Own Device): Employee-owned Technology in the Workplace MCHRMA Spring Conference April 4, 2014 PRESENTED BY: Sonya Guggemos MCIT Staff Counsel for Risk Control sguggemos@mcit.org The information

More information

Data Processing Agreement

Data Processing Agreement Data Processing Agreement Merchant (the "Data Controller") and Nets (the "Data Processor") (separately referred to as a Party and collectively the Parties ) have concluded this DATA PROCESSING AGREEMENT

More information

Privacy Policy GENERAL

Privacy Policy GENERAL Privacy Policy GENERAL This document sets out what information Springhill Care Group Ltd collects from visitors, how it uses the information, how it protects the information and your rights. Springhill

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

2018 Certified Paralegal Examination FAQs

2018 Certified Paralegal Examination FAQs 2018 Certified Paralegal Examination FAQs Contents When will the examination be administered?... 2 Will I receive my score at the testing center for the initial testing window?... 2 What are the examination

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

First name: Address for correspondence (including postcode): Occupation: Daytime phone no: Mobile: Home phone no: address:

First name: Address for correspondence (including postcode): Occupation: Daytime phone no: Mobile: Home phone no:  address: TPO Complaints Form A copy of this form and attachments will be sent to the registered form TPO ref This is the form you need to complete if you want The Property Ombudsman to look at your complaint. Remember

More information

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery

Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery Checklist for Rule 16(c) Pretrial Conference for Computer-Based Discovery To aid and advance the ability for a litigation to successfully employ computer-based discovery, Rule 16(c) of the Federal Rules

More information

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology

RUTGERS POLICY. Section Title: Legacy UMDNJ policies associated with Information Technology RUTGERS POLICY Section: 70.2.8 Section Title: Legacy UMDNJ policies associated with Information Technology Policy Name: Information Security: Acceptable Use Formerly Book: 95-01-09-05:00 Approval Authority:

More information

4. Save as expressly set out herein no license is granted in respect of any intellectual property rights vested in F1000 or other third parties.

4. Save as expressly set out herein no license is granted in respect of any intellectual property rights vested in F1000 or other third parties. Legal information The website F1000.com is operated by Faculty of 1000 Limited, a company registered in England and Wales with Company Number 3739756, with registered offices at Middlesex House, 34-42

More information

Managing Your Record Retention Policy Safely

Managing Your Record Retention Policy Safely Managing Your Record Retention Policy Safely Client and counsel have a duty to preserve materials with potential evidentiary value. The preceding discussion told us about the duties of lawyers and clients

More information

Spree Privacy Policy

Spree Privacy Policy Spree Privacy Policy Effective as at 21 November 2018 Introduction Spree respects your privacy and it is important to us that you have an enjoyable experience buying and selling with us but also that you

More information

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads)

ADMINISTRATIVE POLICY NO ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) ADMINISTRATIVE POLICY NO. 13-01 ISSUING MUNICIPAL EQUIPMENT (Computer, Lap Tops, Notebooks, ipads) I. POLICY ISSUANCE This policy provides uniform guidelines and policies on the issuance and return of

More information

All other forms of social media are prohibited unless reviewed and approved prior to use by designated SFA Compliance Principal.

All other forms of social media are prohibited unless reviewed and approved prior to use by designated SFA Compliance Principal. VI.1.5. Social Media Social media is a form of electronic communication that allows individuals to create, share or exchange information and ideas with others in virtual communities and networks. When

More information

Privacy Notice. General Information Protection Regulation ( GDPR )

Privacy Notice. General Information Protection Regulation ( GDPR ) Privacy Notice General Information Protection Regulation ( GDPR ) Please read the following information carefully. This privacy notice contains information about the information collected, stored and otherwise

More information

Solv3D Privacy Policy

Solv3D Privacy Policy Solv3D Inc. ( Solv3D, We, Us, or Our ) is committed to transparency in the collection and use of your personal information. The Privacy Policy below describes how we collect and use personal information,

More information

Trends in Data Center Energy Efficiency

Trends in Data Center Energy Efficiency Trends in Data Center Energy Efficiency Presented by: Todd Boucher Better Building by Design 2012 1 Efficiency Vermont is a Registered Provider with The American Institute of Architects Continuing Education

More information

American Dental Hygienists Association Privacy Policy

American Dental Hygienists Association Privacy Policy American Dental Hygienists Association Privacy Policy The American Dental Hygienists Association ( ADHA, we, or us ) has created and posted this privacy policy in an effort to maintain efficient service

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Addressing the General Data Protection Regulation (GDPR) 2018 [EU] and the Data Protection Act (DPA) 2018 [UK] For information on this Policy or to request Subject Access please

More information

LPI Approved Training Partner (LPI ATP) Program Agreement

LPI Approved Training Partner (LPI ATP) Program Agreement The following agreement is herewith concluded between: - hereinafter Partner - and Open Source Certification GmbH, LPI Central Europe, Karthäuserstraße 8, 34117 Kassel, Germany, (hereafter, LPI CE ) Preamble

More information

2.1 Website means operated and owned by UCS Technology Services, including any page, part of element thereof;

2.1 Website means   operated and owned by UCS Technology Services, including any page, part of element thereof; WEBSITE USAGE TERMS AND CONDITIONS Acceptable Usage Terms 1. Introduction 1.1 By accessing the UCS Technology Services website, web pages or any part thereof for any reason whatsoever, the User agrees

More information

NUCONNECT INTERNET ACCEPTABLE USE POLICY

NUCONNECT INTERNET ACCEPTABLE USE POLICY NUCONNECT INTERNET ACCEPTABLE USE POLICY This Acceptable Use Policy ( AUP ) applies to NUconnect Internet and related services ("Services ) delivered by Newport Utilities. This policy is designed to encourage

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

COMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH

COMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH COMMERCIAL BANK OF DUBAI PSC GENERAL CONDITIONS OF ACCESS AND USE OF COMMERCIAL BANK OF DUBAI FACEBOOK BRANCH 1. CBD Facebook Branch Commercial Bank of Dubai psc (hereinafter "CBD"), allows access and

More information

Information Security Incident Response Plan

Information Security Incident Response Plan Information Security Incident Response Plan Purpose It is the objective of the university to maintain secure systems and data. In order to comply with federal, state, and local law and contractual obligations,

More information

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers

Hire Counsel + ACEDS. Unified Team, National Footprint Offices. ediscovery Centers Unified Team, National Footprint Offices Boston, MA Charlotte, NC Chicago, IL Darien, CT Los Angeles, CA Miami, FL Morrisville, NC New York, NY Philadelphia, PA San Francisco, CA Southfield, MI Washington,

More information