1 © Copyright 2009 EMC Corporation. All rights reserved. EMC CONFIDENTIAL—FOR TRAINING PURPOSES ONLY View | Annotate | Redact | Secure Name Title Date.

Slides:



Advertisements
Similar presentations
DRAWING MANAGEMENT C H A P T E R F O U R T E E N.
Advertisements

Staying In Technology’s Top Tier UCC Filings, Searches and Images.
Nalini S. Mahadevan, JD, MBA All Copyrights reserved, 2010.
July 2007 Health-e Web Entry. © ENS Inc, an INGENIX company. 2 Introduction  Before your installation appointment, complete the following: (Call your.
LinkedIn Hacks for Expert Career Seekers Reinvent Your Career Expo Brisbane Convention and Exhibition Centre Corner of Merivale and Glenelg Streets South.
Local Commerce in Social Networks in Mexico and its Regulations.
Chapter 16 Applying for Jobs
Web Pricing User Manual
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Historic Digimap Historical maps and data from the Ordnance Survey maps from the 1840s to the 1990s.
Spreadsheet Management. Field Interviews with Senior Managers by Caulkins et. al. (2007) report that Spreadsheet errors are common and have been observed.
Final Project David Arzabe M.  As the Internet spread over the world during the 1990’s, businesses started noticing opportunities for using the new technologies.
Chapter 14 Requirements and Specifications. Copyright © 2005 Pearson Addison-Wesley. All rights reserved Software Engineering The implementation.
Term Project Pick a system (discuss choice with me)  Want simple functionality, security issues, whole system (e. g., client and server side) Submit a.
LinkedIn Hacks for Expert Career Seekers Reinvent Your Career Expo Melbourne Convention and Exhibition Centre 1 Convention Centre Place, South Wharf, Melbourne,
1 © Copyright 2007 EMC Corporation. All rights reserved. EMC Documentum Information Rights Management EMC Content Management and Archiving.
SSCL COPORATE FUNCTIONAL SAFETY MANAGEMENT Chris Goring Safety Systems Consultants Ltd.
SE Document Document Control Software. SE Document SE Document is a Document Management Software System to help you meet all document control requirements.
1 © Copyright 2008 EMC Corporation. All rights reserved. EMC Documentum Trusted Content Services.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
WE PUT YOU BACK IN CONTROL OF YOUR BUSINESS. SACS CONSULTING & INVESTIGATIVE SERVICES.
PROPOSAL FOR PRELIMINARY STUDY OF MICROSOFT WORD Start.
Informative Graphics Corporation View | Annotate | Redact | Publish © 2010 Informative Graphics Corporation. All rights reserved. For internal use only.
What Can Devon on Demand Do For You?. Your User Name and Password will be ed to you when your account has been set up. Devon.
New Filing Procedures DeLong Grant Law Partners. Referencing Number System  Include these three parts in the number Client last name Date file opened.
Introducing CM ECF Case Management Electronic Case Filing February 2005.
Page 1 Keep Your Company Out of the Media Workshop Rachel Verdugo March 23, 2011 Reno, Nevada Protect and Control Your Data.
CREATING A BUSINESS CARD Commercial Photography Copyright © Texas Education Agency, All rights reserved. Images and other multimedia content used.
Introduction to Information Technology, 2 nd Edition Turban, Rainer & Potter © 2003 John Wiley & Sons, Inc. 7-1 Introduction to Information Technology.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
I-9, Immigration, E-Verify Compliance Matters. Immigration Compliance Policy  The purpose of this policy is to comply with the U.S. Immigration Law by.
Keogh and Associates Copyright 2003 Sellers, Resellers, Integrators, Consultants What Are Their Roles?? Presenter Colin Keogh Keogh and Associates.
1 © Copyright 2009 EMC Corporation. All rights reserved. ISIS and PixTools Toolkits Quickly Enabling Document Capture Solutions EMC Corporation.
Internet Big Data Solutions. Problem : Web Search Limitations Limited data sources Search engines often cater to only the most popular and less obscure.
Chapter 11 Memos, s, and Letters
Florida Information Protection Act of 2014 (FIPA).
Accelerating Development Using Open Source Software Black Duck Software Company Presentation.
1 © Copyright 2009 EMC Corporation. All rights reserved. EMC CONFIDENTIAL—FOR TRAINING PURPOSES ONLY Brava! 6.2 for Webtop Technical Overview Informative.
Informative Graphics Corporation View | Annotate | Redact | Publish © 2010 Informative Graphics Corporation. All rights reserved. For internal use only.
Copyright © 2002 by Pearson Education, Inc., publishing as Longman Publishers. All rights reserved. Chapter 15 Procedures, Processes, and Specifications.
Report task. Security risks such as hacking, viruses and id theft Security prevention such as Firewalls, SSL and general security standards The laws which.
Copyright © 2011 Verizon Foundation. All Rights Reserved. This document may be reproduced and distributed solely for uses that are both (a) educational.
© Copyright 2009 EMC Corporation. All rights reserved. Controlling Content Helps Achieve Compliance EMC & Informative Graphics Corp. EMC World 2010.
Informative Graphics Corporation View | Annotate | Redact | Publish © 2010 Informative Graphics Corporation. All rights reserved. For internal use only.
ADMINISTRATION REVISION – BLOCK 7 PREPARING AND PRESENTING INFORMATION.
1 © Copyright 2009 EMC Corporation. All rights reserved. EMC CONFIDENTIAL—FOR TRAINING PURPOSES ONLY View | Annotate | Redact | Secure Name Title Date.
United States District Court for the District of Utah Welcome to ECF Attorney Training. Please make sure you have picked up all materials located at the.
Comprehensive Health Insurance Billing, Coding, and Reimbursement Copyright ©2009 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights.
OCS-Data Import Tool (DIT) A tool designed to import OASIS files into the OCS Database Provided by OCS Education E-learning Network A tool.
Aidan Hanley, Program Coordinator San Diego County Air Pollution Control District.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Copyright © 2009, Thinking Media, a division of SAI Interactive, Inc. All rights reserved. The Career Ready 101 logo is a registered trademark and Career.
INTRODUCTION The Internet has given the opportunity to share findings and distribute knowledge from experts regardless of time and place. Communication.
Technical Writing CM1401. MEMO (Memorandum) Hard Copy - paper Soft Copy - Electronic Functional Layout Subject line, Headings at the top, no salutation,
Copyright 2013 Exostar LLC.| All Rights Reserved.| Proprietary and Confidential1 Identity Proofing Service United Technologies Corporation September 26.
Federal Regulations Federal regulations are the third primary source of American law discussed. Proposed regulations and final regulations are published.
Why is this called “the ostrich effect”?
The time to address enterprise mobility is now
Controlling Computer-Based Information Systems, Part II
ICT meeting Business needs
THE DEVELOPMENT SERVICE
Unit 4: Data Communication
Patent Information Annual Conference 2011
E-Invoicing for Network Access Customers
Does your inbox need a tune-up?
Data is a business asset.
Does your inbox need a tune-up?
Title or label as appropriate Operational and Performance Capabilities
Presentation transcript:

1 © Copyright 2009 EMC Corporation. All rights reserved. EMC CONFIDENTIAL—FOR TRAINING PURPOSES ONLY View | Annotate | Redact | Secure Name Title Date Top 10 Redaction Mistakes Not to Make

2 © Copyright 2009 EMC Corporation. All rights reserved. Who is Informative Graphics?  Founded in 1990  Leading developer of commercial software products for viewing, collaboration and redaction  Headquartered in Scottsdale, Arizona Documentum Partner since 1995 Designed for EMC Documentum 2004  Thousands of customers, millions of users worldwide View Annotate Redact Secure View Annotate Redact Secure

3 © Copyright 2009 EMC Corporation. All rights reserved. How do Redaction Errors Happen? Government agencies, private companies, law firms, and courts have all been tripped up by improper electronic redaction The most common error people make is to overlay an opaque rectangle, usually using a drawing shape, over the text to be redacted. It is possible to “lock” a PDF to prevent users from copying text, PDF is an open format, meaning Adobe shares the format with other vendors so they can read and write PDF files as well. Even when doing proper redaction, users can be tripped by not carefully searching for all variations of a search term.

4 © Copyright 2009 EMC Corporation. All rights reserved. Inadvertently expose the personal addresses of Al and Tipper Gore Redaction Mistakes Not to Make #10

5 © Copyright 2009 EMC Corporation. All rights reserved. Inadvertently sharing the details of a high-profile legal settlement Redaction Mistakes Not to Make #9

6 © Copyright 2009 EMC Corporation. All rights reserved. Expose citizens’ personal information Redaction Mistakes Not to Make #8

7 © Copyright 2009 EMC Corporation. All rights reserved. Reveal questionable actions by the President of the United States Redaction Mistakes Not to Make #7

8 © Copyright 2009 EMC Corporation. All rights reserved. Reveal unlawful surveillance program by the NSA Redaction Mistakes Not to Make #6

9 © Copyright 2009 EMC Corporation. All rights reserved. Expose weak points in international airport security Redaction Mistakes Not to Make #5

10 © Copyright 2009 EMC Corporation. All rights reserved. Fail to conceal identifying descriptions in classified CIA report Redaction Mistakes Not to Make #4

11 © Copyright 2009 EMC Corporation. All rights reserved. Expose Personal Identifying Information for Presidential Candidates and other political figures Redaction Mistakes Not to Make #3

12 © Copyright 2009 EMC Corporation. All rights reserved. Fail to redact information that could cause a threat to national security Redaction Mistakes Not to Make #2

13 © Copyright 2009 EMC Corporation. All rights reserved. Leak TSA airport screening procedures Redaction Mistakes Not to Make #1

14 © Copyright 2009 EMC Corporation. All rights reserved. How to Avoid Redaction Mistakes Follow Redaction Best Practices  Identify a Redaction Expert.  Write a Formal Redaction Policy.  Select an Output Format.  Verify Proposed Redactions Before Finalizing.  Validate the Final Redacted Document.

16 © Copyright 2009 EMC Corporation. All rights reserved. Informative Graphics Contacts Leslie Campbell Diephuis Business Development x148 Tim Wikander Application Engineer Therese Harris Vendor Marketing