Creating an Effective Email Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.

Slides:



Advertisements
Similar presentations
EMS Checklist (ISO model)
Advertisements

Software Quality Assurance Plan
Copyright © AIIM | All rights reserved. #AIIM The Global Community of Information Professionals aiim.org Information Management and Social Media Jesse.
ISO 9001:2000 Documentation Requirements
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
NZ’s STATE SAFETY PLAN W hat the CAA has to do to implement its SMS CAA/AIA/GAPAN South Pacific Aviation Symposium on SMS Simon Clegg General Manager -
Audit of IT Systems SARQA / DKG Scandinavian Conference, October 2002, Copenhagen Sue Gregory.
Microsoft Outlook is a tool that includes , calendaring, and tasks.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
Information Security Policies and Standards
CST 481/598 x.2.  Broad overview of policy material  What is a “process”  Tiers (not tears) Many thanks to Jeni Li.
Developing a Records & Information Retention & Disposition Program:
University of Guelph IT Security Policy Doug Blain Manager, IT Security ISC, April 27th.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Quality evaluation and improvement for Internal Audit
Philippe LE TERTRE IS Governance Consultant  Founder and managing partner of VADEGIS (company specialized in Information System Management.
Prepared by Long Island Quality Associates, Inc. ISO 9001:2000 Documentation Requirements Based on ISO/TC 176/SC 2 March 2001.
Network security policy: best practices
A Guide to Getting Started
TC176/IAF ISO 9001:2000 Auditing Practices Group.
Instructions and forms
Opportunities & Implications for Turkish Organisations & Projects
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
Chapter 4 Internal Controls McGraw-Hill/Irwin
Internal Auditing and Outsourcing
SecureAware Building an Information Security Management System.
Jesse Wilkins, CIP, CRM AIIM International February 14, 2012.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Developing an Effective Ethics Program.  The responsibility of the corporation as a moral agent  The need for organizational ethics programs  An effective.
Maintain Ethical Conduct
ISO 14001:2004, Environmental Management System
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
Quote for today “Sometimes the questions are complicated and the answers are simple” - ?? ????? “Sometimes the questions are complicated and the answers.
Mary Ott RIM Specialist NE SOS-Records Management Division March 20, 2012.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles ® Registered Trademark of ARMA International.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Electronic Records Management: A Checklist for Success Jesse Wilkins April 15, 2009.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Module 9 Configuring Messaging Policy and Compliance.
Environmental Management System Definitions
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
AET0012PPT by Dr. Anwar El-Tawil Dr. Anwar El-Tawil Director ISO Programme for Developing Countries QUALITY MANAGEMENT SYSTEM ACCORDING TO.
Module 7 Planning and Deploying Messaging Compliance.
Strategic Approaches to Improving Ethical Behavior
KELLY Technology Department Proven EXPERIENCE of Yesterday Creative SOLUTIONS for Today Innovative VISION for Tomorrow Corporate Policy and Procedures.
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
Organisational Policy
Chapter 8 Auditing in an E-commerce Environment
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Deck 5 Accounting Information Systems Romney and Steinbart Linda Batch February 2012.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
TC176/IAF ISO 9001:2000 Auditing Practices Group.
1 Vereniging van Compliance Officers The Compliance Function in Banks Amsterdam, 10 June 2004 Marc Pickeur CBFA CBFA.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
ARMA Boston Spring Seminar 2011 Jesse Wilkins, CRM.
Acceptable Use Policy (Draft)
Contents Playbook Objectives Playbook Value Details Playbook Design
IT Audit Processes and Audit
Auditing Cloud Services
Draft OECD Best Practices for Performance Budgeting
IS4550 Security Policies and Implementation
Data Management Capability Assessment Model
Job Analysis CHAPTER FOUR Screen graphics created by:
Importance of Law and Policies in the Environmental Management System
Guidance for Patient Interactions
What is IT audit? An examination of how IT systems where implemented to ensure that they meet the organization’s business needs without compromising.
Fundamental Science Practices (FSP) of the U.S. Geological Survey
Presentation transcript:

Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009

ELEMENTS OF AN POLICY 2

policy Critical requirement for effective governance Provides broad policy statements Should be included in broader communications or IT policy Lots of references and examples available 3

policy elements Every organization’s policy will be different –Public vs. private sector –Regulatory requirements, both horizontal and vertical There are some common areas that should be addressed 4

Policy elements Purpose Scope Definitions Policy statements Procedures Responsibilities References 5

Purpose and scope This policy has three purposes: 1.Establish definitions relevant to the management program 2.Describe usage policies relating to 3.Describe security and technology policies relating to Scope: This policy is applicable to the entire enterprise. 6

Definitions Uncommon terms Common terms used in an uncommon fashion Acronyms and abbreviations 7

Acceptable usage Most common element of policies today Typically addresses things NOT to do: –Obscene language or sexual content –Jokes, chain letters, business solicitation –Racial, ethnic, religious, or other slurs May address signature blocks –Standardization, URLs, pictures 8

Effective usage Guidance on writing s –Wording and punctuation –Spell check and grammar check –Effective subject lines Guidance on etiquette Guidance on addressees 9

Personal usage Whether personal usage is allowed Any limitations to personal usage Separation of personal and business usage within individual messages Personal account access 10

Ownership and stewardship Whether is considered to be owned by the organization Responsibility for stewardship of messages, both sent and received Privacy and monitoring Third-party access 11

Retention and disposition is a medium, not a record type or series messages can be records –Subject to open records/FOIA, discovery, etc. Other information objects can be records –Calendars –Read receipts/bounces 12

Legal issues can be subject to discovery Assigns responsibility for communicating legal holds Describes whether or not disclaimers will be used and how May outline privilege issues 13

Encryption and digital signatures Outlines whether encryption is allowed –What approaches available for encryption Whether digital signatures are allowed –What approaches to use 14

Mobile and remote Most often found as part of general policies for remote workers Requirements for mobile devices Requirements for web-based access Synchronization and login requirements 15

Archival Addresses whether will be archived Addresses whether personal archives will be allowed May address backups – but backups are not archives 16

Security Attachment limitations –Whether they can be sent at all –Size limitations –Content type limitations Attachments vs. links Content filtering Encryption and DRM 17

Procedures Detailed instructions for complying with policies Each of the policy statements will have one or more procedures May be specific to process, business unit, jurisdiction, application 18

Responsibilities Responsibilities for policy development and maintenance Responsibilities for compliance with policy –Managers –Users –Specialist staff 19

References List any references used to develop the policy –Internal strategic documents –Records program governance instruments –Publications 20

DEVELOPING THE POLICY 21

The policy framework Approach to developing and implementing a policy Ensures that policy development is consistent with organizational goals Ensures that policy meets legal and regulatory requirements 22

1. Get management support Policy development requires time and energy from users and stakeholders So does policy implementation Ongoing compliance will require auditing and communication None of this happens without management support 23

2. Identify stakeholders Policy should address the entire enterprise Stakeholders should include: –Business unit managers –End users –Legal, RM, IT –External customers and partners 24

What changes are being introduced? –Processes, technologies What are the desired outcomes? What behavioral changes should result? Identify the goals of the policy

4. Conduct the research Legal research Organizational research Public research –Standards and guidelines –Benchmarking Consult with similar organizations Analyze the results 26

5. Draft the policy Collaborative and iterative process There are a number of resources available to provide an policy framework These are starting points and need to be customized for your requirements 27

6. Review the policy Review by legal, HR, users Ensures it is valid Ensures it will work within existing organizational culture Change management 28

7. Approve the policy Policy is reviewed by business managers, senior management Complete revisions as necessary Approve the policy 29

8. Implement the policy Communication Training Auditing 30

Monitor for compliance with policy Solicit feedback about policy Provide refresher training as required Consider whether to retain previous versions of the policy Plan for periodic review and maintenance 9. Once the policy is live 31

Questions? 32

For more information Jesse Wilkins, erm m, emm m, ecm m Access Sciences Corporation (303) direct Twitter: jessewilkins 33