ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.

Slides:



Advertisements
Similar presentations
The Impact of Auditing on Records Management Risk and Compliance Susan B. Whitmire, CRM, FAI Manager, Enterprise Records and Information Management BlueCross.
Advertisements

What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Audit of IT Systems SARQA / DKG Scandinavian Conference, October 2002, Copenhagen Sue Gregory.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
Information Security Policies and Standards
Developing a Records & Information Retention & Disposition Program:
Prepared by Long Island Quality Associates, Inc. ISO 9001:2000 Documentation Requirements Based on ISO/TC 176/SC 2 March 2001.
Network security policy: best practices
A Guide to Getting Started
TC176/IAF ISO 9001:2000 Auditing Practices Group.
Chapter 4 Internal Controls McGraw-Hill/Irwin
ISA–The Instrumentation, Systems, and Automation Society SP99 Work Group 2 TR#2 “Second Edition” Long Beach Meeting April 28, 2004.
Jesse Wilkins, CIP, CRM AIIM International February 14, 2012.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
Quote for today “Sometimes the questions are complicated and the answers are simple” - ?? ????? “Sometimes the questions are complicated and the answers.
Mary Ott RIM Specialist NE SOS-Records Management Division March 20, 2012.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Module 9 Configuring Messaging Policy and Compliance.
Environmental Management System Definitions
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
1 15 quality goals for requirements  Justified  Correct  Complete  Consistent  Unambiguous  Feasible  Abstract  Traceable  Delimited  Interfaced.
Module 7 Planning and Deploying Messaging Compliance.
Organisational Policy
Chapter 8 Auditing in an E-commerce Environment
TC176/IAF ISO 9001:2000 Auditing Practices Group.
Workshop on Accreditation of Bodies Certifying Medical Devices Kiev, November 2014.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
Organizations of all types and sizes face a range of risks that can affect the achievement of their objectives. Organization's activities Strategic initiatives.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
School Leadership Evaluation System Orientation SY12-13 Evaluation Systems Office, HR Dr. Michael Shanahan, CHRO.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
Compliance Management System. Intelex System Overview Focus Modules: –Permits Management –Monitoring & Measurement –Training Management –Document Control.
Framework Policy on Continuing Care in First Nations Communities of Quebec Conference on clients with decreasing independence May 10, 2017.
Michael J. Novak ASQ Section 0511 Meeting, February 8, 2017
Retention Breakout Session
Acceptable Use Policy (Draft)
Contents Playbook Objectives Playbook Value Details Playbook Design
Steve Barfoot, President Advantage International Registrar, Inc.
Audit of predetermined objectives
IT Audit Processes and Audit
Chapter 4 Internal Controls McGraw-Hill/Irwin
Understanding the Principles and Their Effect on the Audit
Policy & Procedure Writing
Auditing Cloud Services
Prepared by Rand E Winters, Jr. ASR Senior Auditor October 2014
Training Course on Integrated Management System for Regulatory Body
CMMI – Staged Representation
Setting Actuarial Standards
Privacy Project Framework & Structure
IS4550 Security Policies and Implementation
CBP Program – Business Etiquette
Digital Stewardship Curriculum
Job Analysis CHAPTER FOUR Screen graphics created by:
Importance of Law and Policies in the Environmental Management System
2019 Meeting 1 Northern Ontario Safety Group.
IS4680 Security Auditing for Compliance
Teacher Tips BSBWHS405 Contribute to Implementing and maintaining WHS Management Systems May 2017.
Guidance for Patient Interactions
What is IT audit? An examination of how IT systems where implemented to ensure that they meet the organization’s business needs without compromising.
SPR-B Research Coordination Webinar
Briefing to the Portfolio Committee on Police Audit outcomes of the Police portfolio for the financial year 13 October 2015.
Changes in ISO The following are the changes in ISO In most cases, the 1996 wording is not provided. Not all changes are listed. For example,
Introduction to the PACS Security
Radiopharmaceutical Production
Presentation transcript:

ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM

2  Developing an policy  Identifying and classifying messages as records  Managing the inbox better – by managing less  Better collaboration WITHOUT

4  policy elements  Policy statements  The policy development framework

6  Every organization’s policy will be different ◦ Public vs. private sector ◦ Regulatory requirements, both horizontal and vertical  There are some common areas that should be addressed  Lots of references and examples available

7  Purpose  Scope  Responsibilities  Definitions  Policy statements  References

8 This policy has three purposes: 1. Establish definitions relevant to the management program 2. Describe usage policies relating to 3. Describe security and technology policies relating to Scope: This policy is applicable to the entire enterprise.

9  Responsibilities for policy development and maintenance  Responsibilities for policy administration  Responsibilities for compliance with policy

10  Uncommon terms  Common terms used in an uncommon fashion  Acronyms and abbreviations

11  Many different elements available  Detailed in the next section

12  List any references used to develop the policy ◦ Internal strategic documents ◦ Records program governance instruments ◦ Statutes and regulations ◦ Publications ◦ Examples and templates

13  Detailed instructions for complying with policies ◦ Often separate document(s)  Each of the policy statements will have one or more procedures  May be specific to process, business unit, jurisdiction, and/or application

15  Most common element of policies today  Typically addresses things NOT to do: ◦ Obscene language or sexual content ◦ Jokes, chain letters, business solicitation ◦ Racial, ethnic, religious, or other slurs  May address signature blocks ◦ Standardization, URLs, pictures

16  Guidance on writing s ◦ Wording and punctuation ◦ Spell check and grammar check ◦ Effective subject lines  Guidance on etiquette  Guidance on addressees

17  Whether personal usage is allowed  Any limitations to personal usage  Separation of personal and business usage within individual messages  Personal account access

18  Whether is considered to be owned by the organization  Responsibility for stewardship of messages, both sent and received  Privacy and monitoring  Third-party access

19  is a medium, not a record type or series  messages can be records  Other information objects that might need to be treated as records ◦ Read receipts ◦ Bounced messages

20  can be subject to discovery  Assigns responsibility for communicating legal holds  Describes whether or not disclaimers will be used and how  May outline privilege issues

21  Outlines whether encryption is allowed ◦ What approaches to use  Whether digital signatures are allowed ◦ What approaches to use

22  Most often found as part of general policies for remote workers  Requirements for mobile devices  Requirements for web-based access  Synchronization and login requirements

23  Addresses whether will be archived  Addresses whether personal archives will be allowed  May address backups – but backups are not archives  May also address public or managed folders

24  Attachment limitations ◦ Whether they can be sent at all ◦ Size limitations ◦ Content type limitations  Attachments vs. links  Content filtering  Encryption and DRM

26  Approach to developing and implementing a policy  Ensures that policy development is consistent with organizational goals  Ensures that policy meets legal and regulatory requirements

27  Policy development requires time and energy from users and stakeholders  So does policy implementation  Ongoing compliance will require auditing and communication  None of this happens without management support

28  Policy should address the entire enterprise  Stakeholders should include: ◦ Business unit managers ◦ End users ◦ Legal, RM, IT ◦ External customers and partners

29  What changes are being introduced? ◦ Processes, technologies  What are the desired outcomes?  What behavioral changes should result?

30  Legal research  Organizational research  Public research ◦ Standards and guidelines ◦ Benchmarking  Consult with similarorganizations  Analyze the results

31  Collaborative and iterative process  There are a number of resources available to provide an policy framework  These are starting points and need to be customized for your requirements

32  Review by legal, HR, users  Ensures it is valid  Ensures it will work within existing organizational culture  Change management

33  Policy is reviewed by business managers, senior management  Complete revisions as necessary  Approve the policy

34  Communication  Training  Auditing

35  Monitor for compliance with policy  Solicit feedback about policy  Provide refresher training as required  Consider whether to retain previous versions of the policy  Plan for periodic review and maintenance

36