Litigation Hold Protecting your privacy and the campus www.csus.edu/security/LH.

Slides:



Advertisements
Similar presentations
Pennsylvania BANNER Users Group 2007 Disaster Recover For The Financial Aid Environment.
Advertisements

Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Orgainizing Your Digital Documents. What is a File Structure Organizing your files Server space .
SCCC Technology & Information Systems. Technology Support Academic Academic –Campus Educational Technology Units (ETUs) –Teaching & Learning Centers –Distance.
Student, Faculty, and Staff Data Availability and Protection What’s the Back-Up Plan? (for academic computing) Sponsored by.
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
Litigation Holds: Don’t Live in Fear of Spoliation Jason CISO – University of Connecticut October 30, 2014 Information Security Office.
Tarrant County College Connect Grapevine-Colleyville ISD.
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (FACTA)- RED FLAG RULES University of Washington Red Flag Rules Protecting Against Identity Fraud.
Part 2 of Evil Lurking in Websites Data Security at the University of Wisconsin Oshkosh.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
Welcome Overview of this Session Introduction The Migration –Active Directory (replacing Novell) – & Calendar – from iPlanet to Outlook –Network.
New Staff Orientation Kay Carlisi Instructional Computing Coordinator.
5TH ANNUAL BUILDING EMERGENCY PLAN SUMMIT Campus Emergency Preparedness & Planning Office 205 South Martin Jischke Drive (765) Ron Wright, Director.
Developing a Records & Information Retention & Disposition Program:
August 9, 2005 UCCSC IT Security at the University of California A New Initiative Jacqueline Craig. Director of Policy Information Resources and.
Faculty and Librarian Collaboration: Implementing the Information Management Competency Holly Heller-Ross and Trudi Jacobson.
Service Learning Risk Management – Process and Roles December 13, 2006 Presented by: Season Eckardt, CSU Chancellor’s Office Jeannie Kim-Han, CSU Fullerton.
Investigating Allegations of Staff Sexual Misconduct With Inmates Action Planning Work Guide The American University, Washington College of Law National.
Buffalo State College Internal Control Program Presented to: Buffalo State College Line Staff Delivered by: BSC IC Program & Department Managers.
Copyright Anthony K. Holden, This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial,
Conflict Resolution and the Alternative Dispute Resolution (ADR) Initiative Carol Bray CCR Liaison for EGC.
ICPL Institute for Computer Policy & Law H. David Lambert Vice President for Information Services and Chief Information Officer Georgetown University e-Discovery:
Records Management Overview. Why? It’s the Law It’s the Law It’s University Policy It’s University Policy Fiscal and Legal Compliance Fiscal and Legal.
Challenges of Securing Clinical Data in a Cloud- centric World Patty Furukawa – Assistant Dean for IT University of California-Irvine School of Law Doug.
Electronic Discovery refers to the discovery of electronic documents and data…including , web pages, word processing files, computer databases, and.
Portal User Group Meeting March 9, Agenda  Introduction  Guest Presentation – Website Accessibility Michelle Laramie, David Bergmann, Jolene Nemeth.
Funding Finding Grants & Tapping Campus Resources.
How to evaluate ICT use for small organisations Session 2.
Information Technology & Communications Sensitive Data Use, Storage & Security Meeting Background Data Breach on February 18, 2014 Security Meeting with.
United States Department of Agriculture Food Safety and Inspection Service February William C. Smith Assistant Administrator Office of Program.
Dangerous Documents. Legal Compliances State and federal laws Contractual obligations Subject to an affirmative legal duty to establish and maintain certain.
Preventing and Responding to Sexual Misconduct: Sexual Harassment and Sexual Violence.
PCI Compliance Update Presented by: Jeff Gassaway, Information Security Officer – CISSP Lucas Walker, Information Security Analyst – GSEC 1.
Information Security Training for People who Supervise Computer Users.
Understanding Our Roles As Advisors MCC Campus Center.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
1 © 2000 John Urrutia. All rights reserved. 2 Welcome to CIS WELCOME WELCOME W E L C O M E.
DELETING TEMPORARY FILES 1.Click “Start” -> “Search” -> “All Files and Folder”. 2.In “All or Part of the file name” box enter “*.tmp” and click “Search”.
End-of-Term Course Evaluation SETE Fall 2013 Campus Wide Trial.
DATA IT Senate Data Governance Membership IT Senate Data Governance Committee Membership Annie Burgad, Senior Programmer, Central IT Julie Cannon, Director.
E-discovery Discussion. 2 Policies and Procedures Do you have a set of e-discovery policies and procedures? – Who is the lead for e-discovery efforts.
Managing Electronic Mail ( ) Audrey Terry KDLA.
Managing Resources for Learning  Insecure – can be lost, copied, deleted  Susceptible to damage and loss  Personal storage  Useful for transfer of.
Building a Culture of Research Ethics in the Ontario Colleges OTTE ROSENKRANTZ PHD.
and Collaboration Services TIF Update July 30, 2014.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
University Retention Schedule Training. Introduction to the University Retention Schedule.
What ICT specialists need to know about information and records Christine Johnston.
St Bernadette RC Primary School WELCOME.
Registrar RML Training Records Management Assistance (281) Records Management 1.
Why ECM from Microsoft ? Single Solution for end-to-end content management Office integration drives broad user adoption Integrated solution reduces deployment.
IT Department Introduction
Occupational Health Services
Leveraging the Data Map – A Case Study November 15, 2016
Best Practices for a Staff Meeting
INFORMATION TECHNOLOGY
Portal User Group Meeting
Confidentiality October 14, 2005.
Red Flags Rule An Introduction County College of Morris
Litigation Holds: Don’t Live in Fear of Spoliation
RECORDS AND INFORMATION
IT & Security Training Skills.
Get to Know Your “W” Drive
BACHELOR’S THESIS DEFENSE
Enforcement Climate Congressional Oversight U.S. Attorney’s Offices
GDPR (General Data Protection Regulations) -What do we know about it?
Presentation transcript:

Litigation Hold Protecting your privacy and the campus

Introduction Information Security Office MissionMission –Protect privacy of your data –Protect the campus from liability Role in Litigation HoldRole in Litigation Hold –Provide support –Provide consistent process –Provide tools

Issues Expectation of privacyExpectation of privacy Gathering dataGathering data Inconsistent means of storing dataInconsistent means of storing data Volume of dataVolume of data –Time –Cost Future litigation holdsFuture litigation holds

Recommendations What you can do: Down side to keeping everythingDown side to keeping everything Understand what you need to keepUnderstand what you need to keep – Delete expired dataDelete expired data –(unless you are part of a litigation hold) Preserve data that may be relevant to a litigationPreserve data that may be relevant to a litigation Organize your into foldersOrganize your into folders Move data off workstation and onto institutional file shareMove data off workstation and onto institutional file share Use personal account for non-work issuesUse personal account for non-work issues

Recommendations What colleges and program centers can do: –Standardized policy and procedures –Standardized implementations File share (U, N and P drives)File share (U, N and P drives) –Attend trainings –Encourage faculty and staff to attend trainings

Thank you CommentsComments QuestionsQuestions RecommendationRecommendation Jeff Williams, Information Security Officer Ext ,