Archive / Destruction / Disposal

Slides:



Advertisements
Similar presentations
OVERVIEW OF THE PURCHASING CARD PROGRAM Purpose of the card: Streamline the Purchasing procedures Simplifying a lot of steps (End user, Procurement and.
Advertisements

AS ICT. Identify suitable uses of common storage media understand the types of access and access speeds required for each use (e.g. serial/sequential,
Organise Workplace Information
STORAGE AND RETRIEVAL OF INFORMATION
Records Management at Queen’s University By Shan Jin November 2008.
Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
Recordkeeping for Good Governance Toolkit
Fe Angela M. Verzosa1 Records Retention 2 determining the length of time that the records should remain in the originating office usually influenced.
Archiving, Indexing, Retrieving reports - COLD storage What is an archive? What is an archive? Why should we archive reports? Why should we archive reports?
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
A01 - Safe Working Practices - Safety Patrol UK Safety Patrol UK are an organisation that travels to businesses to give presentations and advice on using.
Records Management at UW-Green Bay Or, I am out of space and just want to throw some things away!
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
6/2/2015 What is Responsible Care ® ? A Canadian Chemical Producers’ Association initiative to continuously improve all aspects of the chemical industry’s,
Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1st Choice Document Destruction, Inc (a member of the NAID Association) is proud to be an exclusive distributor for “The Guardian” Hard Drive Destroyer.
Instructions and forms
Clear Out Your Records: Policy and Planning Records Survey Anne Thompson Deputy Records Manager.
New Data Regulation Law 201 CMR TJX Video.
Basic Records Management. What we’ll cover Virginia Public Records Act Definitions Understanding and using the LVA General Schedules The schedule cover.
1st Choice Document Destruction (a member of the NAID Association) is proud to be an exclusive distributor for The Guardian Hard Drive Destroyer. Anyone.
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Accounting Electronic Records Management Process Your Company Name Here. Confidential. Revision # ___. Date: _____ By: _______________ 1 1. Full Access.
Managing Files for Personal Computing Part 2 – File Management.
ELECTRONIC RECYCLING ELECTRONIC EQUIPMENT RECYCLING WEB CONFERENCING RECYCLED TONER CARTRIDGES.
David N. Wozei Systems Administrator, IT Auditor.
Grateful Shred Day Wednesday, July 22 City of Oregon City.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Tampa Computer Recycling. Our Tampa computer recycling company takes responsibility of safely disposing of all older computer systems and their electronic.
Information: Policy, Strategy and Systems Module Overview
Confidentiality A Training Without the Video. Laws FERPA (1976) or the Buckley Amendment (1994) IDEA (1991) KY Safe Schools (1998)
Communication in Administration (Security)
Mobile Data Analytics v7.1 Architectural Overview Does one size fits all? Mobile Data Analytics v7.1 Disaster recovery strategiesA.
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
14 May 2014 Information Security, Information Governance and the Law – Confidence in Compliance © Contact Leonardo for reuse
Scientific data storage: How are computers involved in the following?
 The laws vary from state to state. The California Medical Association website states:  There is no general law requiring a physician to maintain records.
7 th Edition  Read-Smith, Ginn Records Management © 2002 South-Western Educational Publishing Chapter 6 Records Retention, Retrieval, and Transfer.
GETTING A GRIP ON DISPOSAL Carmela Gallo. Word origin of Disposal Disposal To dispose mid-14c., from Old.French. disposer (infl. by poser "to place"),
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 7 Storing, Retrieving, and Transferring Records 1 © 2016 Cengage Learning ®. May not be scanned,
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Administrative Policies and Procedures Revised September 2016 Deb Bartlett Joy Faerber Office of Procedures, Records, and.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
DOCUMENT AND DATA CONTROL
Selecting what to keep and what to bin
Slide Template for Module 4 Data Storage, Backup, and Security
Policies and Procedures
Records Retention NYS Magistrates’ Association
Legal and Ethical Responsibilities
Electronic Records Management Program
Backing up a Hard Disk Windows XP Tutorial 6.
Records Management New policies and procedures
Retain Data Commensurate with Value
5 ways to shred your documents securely
Records Management Compliance Training
Records Destruction presented by Records Management
The Office Procedures and Technology
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
H2.9b Maintain Information
Policies and Procedures
Good Spirit School Division
The Office Procedures and Technology
Why do we need to keep records
Presentation transcript:

Archive / Destruction / Disposal Over time, over the years, many files build up in the system. Some files are up-to-date Some are old and filling up hard disk space. To prevent system from being clogged up with old files, but we can’t delete them yet due to laws, policies. Thus we need a process called “archive”. Process, procedures are written for archive purposes. Business invoice, payroll, receipts must be kept for some years. Hard copies, soft copies. ICT managers, must make sure that storage media are safe. Are CD, DVD good for storage? Any risk?

Archive / Destruction / Disposal After several years, archives files are often re-examined for permanent destroyed. Paper files - Paper files can be shredded or burnt. - Not important / not confidential files can be recycle. Electronic files Must be treated as paper files. Can be erased, reformat .etc. Some organisation use service from other company to destroy electronic data. **** It is NOT up to employee to decide when files should be archived or destroyed. The organisation will have a procedures document outlining - What to be archived, when. - When to destroy, how (type of shredder or confetti) .

Archive / Destruction / Disposal Disposal of old equipment also is a challenge for some organisation. Why? Disposal of hard disks / backup media could cause environmental hazard. Information on hard disk can be recovered by some applications

Evaluation of data security management Integrity of data (quality, accuracy, timeliness). Security (data security is effective i.e. hw/sw ). Ease of retrieval (can be restored, timeliness) Currency of data / files (recent version is up-to-date) Example: Openness & timeliness (information system must be easy to access when required). ATO requests people account statement from Comms, ANZ .etc. It is organisation obligation to keep information system safe. It is ICT manager responsible to manage that data is safe. It is ICT personnel must follow procedures/rules/policies to keep data safe.

Evaluation of data security management Review Security management. Identify risks. Proposal for improvement where required. Page N - 5