Does Your Storage Area Look Like This?. Or Perhaps This?

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Organise Workplace Information
The Office Procedures and Technology
Computer and Mobile Device Equipment Security Brief May 29, 2008 Presented by: Kevin G. Sutton, Chief, Information Technology Unit.
Baltic High School Classroom Connections Presentation.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
We Have Received Our New Application. What Is Our Next Step? Educate your staff about the Local Records Act.
1 State Records Center Searching and Requesting Inventory  Versatile web address:  Look for any new ‘Special.
Food Safety, Sanitation, and Storage
A dialogue with FMUG: Sensitive Data & Filemaker MIT Policy and Data Classifications ** DRAFT ** Guidelines Feedback and Discussion Tim McGovern 2 June.
Pesticide Storage, Security, and Disposal Developed by: Pesticide Education Program.
Unit 3 Records Management.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Fraud and Identity Theft Test Review. Who should you contact if you are a victim of identity theft?
Environmental Safety Measures for Pesticides in Retailer Shops.
If you use your computer more than a few hours per day, we suggest you not to turn off your computer at the end of the day. Instead turn off only the.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
TENNESSEE SECRETARY OF STATE TRE HARGETT THE DIVISION OF RECORDS MANAGEMENT PRESENTS tn.gov/sos/rmd OPERATIONS TRAINING.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Managing Your Records And The “Local Records Act”
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Drowning in a Sea of Paper Document Archiving with Technology Presented by: Yvonne J. Gilbert Data Management Specialist Chester County IU #24 (610)
7. Care for computer systems,. secondary storage media and
Clear Out Your Records: Policy and Planning Records Survey Anne Thompson Deputy Records Manager.
Chapter 8 Storage of Business Records Copyright © 2011, 2006 Mosby, Inc., an affiliate of Elsevier. All rights reserved.
Discovering Computers Fundamentals, Third Edition CGS 1000 Introduction to Computers and Technology Fall 2006.
RECORDS BASICS Utah Municipal Clerks Association Annual Conference – September 2013.
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Securing Information in the Higher Education Office.
Security and backups GCSE ICT.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Legal Division CSAA Insurance Group, a AAA Insurer Protecting Your Identity: What to Know, What to Do 2015 Risky Business Week.
Identity Theft What is Identity Theft?  Identity theft is a serious crime. Identity theft happens when someone uses information about you without your.
Drowning in a Sea of Paper Document Archiving With Technology Presented by Arthur J. Staerk AccuScan
CDs and DVDs  Are types of optical storage media that consists of a flat, round, portable disc made of metal plastic and lacquer.  Store software, data,
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
Storage.  Explain what a storage device is  Define the two storage operations  Define what a hard disk is and list the types  Define what a CD and.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
The Flow of Food: Storage
You. are at risk for the fastest growing crimes crime.
Personal data protection in research projects
ANNUAL HIPAA AND INFORMATION SECURITY EDUCATION. KEY TERMS  HIPAA - Health Insurance Portability and Accountability Act. The primary goal of the law.
Physical Security Concerns for LAN Management By: Derek McQuillen.
Outcome 2 Requirements for installing sanitary appliances Unit 207: Sanitation.
Information Management and the Departing Employee.
Computer Security Sample security policy Dr Alexei Vernitski.
Recognizing and correcting hazards
Protecting PHI & PII 12/30/2017 6:45 AM
Lecture-16(B) Taking Protective Measures
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Does Your Storage Area Look Like This?
Mysale Information Classification 101
Protecting Yourself from Fraud including Identity Theft
Privileged Communications
Classifying s presented by Records Management
The Office Procedures and Technology
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Identity Theft Samuel H. Slater.
School of Medicine Orientation Information Security Training
Presentation transcript:

Does Your Storage Area Look Like This?

Or Perhaps This?

Just Imagine You Receive A Request To View Records Under The Freedom Of Information Act And Your Records Were Stored Like Those In Pictures You Just Saw So how should we store our records?

What Is The Ideal Temperature & Humidity For Records Storage? The ideal temperature and humidity for records storage is 64 degrees Fahrenheit with a variance of only 3 degrees in a 30 day period and a humidity of 40% plus or minus 3% in a 30 day period

Storing Blueprints

Blueprints Blueprints can fade rapidly if exposed to office lights. If at all possible store flat or vertically in specially designed map/blueprint cabinets.

Temperature and Humidity Large swings in temperature and humidity can take years off the life of your records. So if you cannot store your records in a room with the ideal conditions, at least try to keep the temperature and humidity stable.

Effects of Humidity High humidity can cause mold spores to activate; hot and dry conditions can result in brittle documents.

Tips on Records Storage Take pro-active measures to prevent future damages to your records:

Storage of Records in Basements If you must store records in a basement that might have seepage, place the records in boxes on shelves or on pallets if possible.

Storing Records on Pallets Plastic pallets are preferable; however, sometimes you can find free wooden pallets that can be covered with inexpensive plastic sheeting.

Storage of Records on Basement Floors If you cannot afford pallets or shelving units that would keep records off of a damp floor, loosely wrap the outside of the boxes with clear plastic. If the boxes do get wet, take the records out of the damp boxes as soon as possible.

Chemicals & Hazardous Materials Never store records near hazardous chemicals or flammable materials, that if spilled would stain or otherwise damage your records.

Records Storage Attics can easily reach a temperature of 100 degrees in the summer months in Illinois. If at all possible store records in another location. Also, attics frequently have mice and sometimes bird droppings.

Records Storage If records are stored in areas where the roof leaks on occasion, cover the tops of the boxes or filing cabinets with plastic. If at all possible do not store records near water heaters.

What Is A Good Storage Box Size? A box that will hold approximately 1 cubic foot of records is ideal. Typical box dimensions of a 1 cubic foot box are: 15" x 12" x 10". Boxes with lids and cut- outs for handles are preferred.

Storing Records In Cubic Foot Size Boxes Legal size documents can be filed upright alongside the 15" side of the box Letter-size documents can be filed upright along the 12" side of the box.

Where Can I Buy The 1 Cu. Ft. Boxes? Local Government Agencies may purchase the 1 cubic feet boxes from the Illinois Department of Corrections, Division of Industries (click on the link for Industries)

Buying 1 Cu. Ft. Boxes Under the State Purchasing Act and the Illinois Municipal Code, purchases from Illinois Correctional Industries may be made without obtaining competitive bids. All Industries' products may be purchased using a State of Illinois Order For Delivery Form. The form is o n the Department of Corrections website in Microsoft Word and in Adobe Acrobat.

Storing Heavier Materials Materials of lesser dimensions such as 5" x 8" or 4" x 6" cards and microfilm reels can also be stored in the standard 1 cu. ft. storage box Be careful not to fill it above the handles when packing microfilm or heavier materials.

The Importance Of A Good Box Label Record Series Title Beginning & Ending Dates Box Content List Disposal Date Local Records Commission Application # & Item # For the Series

Where Is The Best Place For The Box Label? It is important to place the box labels on the end, so that they can be read when stacked instead of on the lid or the wider side of the box.

Sample Box Label

Box Listings It is important to prepare a box listing before putting records into a storage area, so that you can easily retrieve a record if need be at a future date.

Box Listing Office:CafeteriaDate: 7/6/05 Box No.DatesTitleItem #Disposal Date Retention Period /03-02/04Health Dept. Inspection Reports 4June Yrs /04-06/05Health Dept. Inspection Reports 4June Yrs Lunch Tickets27June Yrs.

Confidential Records Information security is not limited to paper documents. When disposing of records which could be used for identity theft or violate privacy laws use a cross- cut multi-media shredder which can shred cd’s, floppy disks, and paper or you might opt to incinerate if there are no city ordinances restricting such.

Shredders The single greatest deterrent to identity theft is probably a shredder. There are now some inexpensive shredders out on the market, that will put multiple holes into cd’s that need to be disposed of.

CONFIDENTIAL RECORDS Whenever possible store in a locked room or cabinet.

Electronic Records Protect your computer records – i.e. with firewalls, anti-spy software, passwords etc. Store back up records off-site. Could someone use a thumb drive to copy records off of the computer you have available to the public?

Electronic Records Storage Take care with portable devices such as “Blackberries” If found could someone hack into your system or gain confidential company information.

Electronic Records Storage Do not leave cd’s, thumb drives, or other record media with confidential information where they could easily be stolen.

McAfee and Carnegie Mellon University Study Lost and stolen mobile devices are seen as the greatest security concern, with 40 percent of organizations having devices lost or stolen, with half of those containing critical business data. Fewer than half of device users back up their mobile data more frequently than on a weekly basis. Half of device users keep passwords, PIN codes or credit card details on mobile devices.