Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International (www.arma.org)

Slides:



Advertisements
Similar presentations
The Impact of Auditing on Records Management Risk and Compliance Susan B. Whitmire, CRM, FAI Manager, Enterprise Records and Information Management BlueCross.
Advertisements

Introduction to Records Management Policy
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Records and Information Management: An Overview. What are Records? Records - Any recorded information regardless of physical form/characteristics or storage.
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
Alaska Chapter of ARMA International Presented by: Dawn Kewan, ARMA Board Member & Treasurer February 6, 2014 Based on Generally Accepted Recordkeeping.
How a Large Company Used the Principles to Establish its Corporate Information Governance Robin Woolen, MBA, IGP President / Principal.
John L. Baines OIT Security and Compliance Retention: Preserving Public Records.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Record management Responsibilities for departing senior officials
RECORDS MANAGEMENT City of Oregon City “ That was then… this is now!”
Anglican Province of Canada Privacy Policy. Commitment to Privacy The Privacy Policy, including the Web Privacy Statement, is the Anglican Province of.
Fe Angela M. Verzosa1 Vital Records Management. 2 Vital Records Management The objective is to prevent the loss of information which is critical to the.
Created May 2, Division of Public Health Managing Records What is a Record? What is a Records Retention & Disposition Schedule? Why is this Important?
Database Auditing Models Dr. Gabriel. 2 Auditing Overview Audit examines: documentation that reflects (from business or individuals); actions, practices,
Chapter 7 Database Auditing Models
The Principles: How we incorporated them into our Business Process by Lawrie Barroner.
Control environment and control activities. Day II Session III and IV.
Why Records Management
Architecture of information systems Document managment system Peter Záhorák.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Compliance Presented by: Marty McNulty, ARMA Board Member.
Electronic Records Management: What Management Needs to Know May 2009.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
HIPAA PRIVACY AND SECURITY AWARENESS.
Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles ® Registered Trademark of ARMA International.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Assess Your Organization's Information Governance using the Generally Accepted Recordkeeping ® Principles September,
M a k i n g w o r k e r s ’ c o m p w o r k ® Content Management & Records Retention “A RIM Perspective” Nancy M. Maglothin, Records and Information Manager.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
1.Summary of Needs Analysis 2.Summary of Action Plan 3.Systems Analysis between Microsoft SharePoint® and OpenText Content Server 4.System Recommendation.
Understanding HIPAA (Health Insurandce Portability and Accountability Act)
The right item, right place, right time. DLA Privacy Act Code of Fair Information Principles.
Information Security Training for People who Supervise Computer Users.
LI 849: Records and Information Management Prof. David Steward SLIM, Emporia State University Doug Frazier, Jonathan Falk, Mindy Brunkhardt November 18,
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
Tad and Terry Legal Issues in ILP. 28 CFR Part 23 The federal rule that governs or provides guidance for these issues. § 23.3 Applicability: These policy.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
ISO/IEC 27001:2013 Annex A.8 Asset management
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
An Introduction to the Privacy Act Privacy Act 1993 Promotes and protects individual privacy Is concerned with the privacy of information about people.
Generally Accepted Recordkeeping Principles Generally Accepted Recordkeeping Principles ® Registered Trademark of ARMA International.
Generally Accepted Recordkeeping Principles: The Principle of Transparency Alaska Chapter of ARMA International Presented by: Tara Carey, ARMA Board Member.
A New Standard for Disposal Mark Crookston Senior Advisor Appraisal Government Recordkeeping Group.
RIM Presentation Records & Info Management by Sandra M. Taggart.
© University of Reading Lee Shailer 06 June 2016 Data Protection the basics.
RECORDS MANAGEMENT TRAINING City of Oregon City. INTRODUCTION TO RECORDS MANAGEMENT
Maximizing the Value of Information Information Governance As A Strategic Framework Presenter: Margaret Hermesmeyer, MLIS, IGP, CRM Division Chief Information.
Presenters: Margaret Hermesmeyer, MLIS, CRMKevin Waldrup, MBA, CRM Chief, Records Management Division Records Management Administrator Office of the Attorney.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
1. Internal control system
RECORDS MANAGEMENT TRAINING City of Oregon City. INTRODUCTION TO RECORDS MANAGEMENT.
UW-Madison Guidelines for Managing the Records of Departing Employees*
Providing Access to Your Data: Handling sensitive data
Electronic Records Management Program
Records Management Compliance Training
RECORDS AND INFORMATION
Good Spirit School Division
Information Governance Part 2
Presentation transcript:

Principle of Protection By C’Les Jensema About ARMA International and the Generally Accepted Recordkeeping Principles® ARMA International ( is a not-for-profit professional association and the authority on information governance. Formed in 1955, ARMA International is the oldest and largest association for the information management profession with a current international membership of more than 10,000. It provides education, publications, and information on the efficient maintenance, retrieval, and preservation of vital information created in public and private organizations in all sectors of the economy. It also publishes Information Management magazine, and the Generally Accepted Recordkeeping Principles®. More information about the Principles can be found at

Presentation Outline Favorite Quote Strategic and Tactical Principles Principle of Protection Definition Protection Principle in Detail Protection Principle Auditing Checklist

John Montaña, J.D. quote Excerpt from his presentation titled “Leveraging GARP to Achieve Organizational Excellence” ARMA Int’l San Francisco Preconference November 6, 2010 What will [the Principles] do for you? ◦ Executive level issues  Executives don’t care about RIM details, but they do care about complying with generally accepted principles ◦ Executive level understanding  The Principles are short and sweet  For the Records Manager - “The details are your problem.”

Strategic and Tactical Principles Strategic Principles – overall snapshot ◦ Accountability ◦ Transparency ◦ Compliance Tactical or Localized Principles – specific to key repositories, requires resources ◦ Integrity ◦ Protection ◦ Availability ◦ Retention ◦ Disposition

Principle of Protection A recordkeeping program shall be constructed to ensure a reasonable level of protection to records and information that are private, confidential, privileged, secret, or essential to business continuity.

Protection Justifications & Life Cycle Considerations Information protection is mandated by laws, regulations, or corporate governance, and It is necessary to ensure that information critical to an organization’s continued operation during or after a crisis is available. A recordkeeping program must ensure that appropriate protection controls are applied to information from the moment it is created to the moment it undergoes final disposition. Therefore, every system that generates, stores, and uses information should be examined with the protection principle in mind to ensure that appropriate controls are applied to such systems.

Protection Controls Information protection takes multiple forms. ◦ First, each system utilized must have an appropriate security structure so only personnel with the appropriate level of security or clearance can gain access to the information. This includes electronic systems as well as physical systems. This also requires that as personnel change jobs, their access controls are changed appropriately and immediately. ◦ Second, this requires protecting information from “leaking” outside the organization. Again, this may take various forms – from preventing the physical files from leaving the premises by various mechanical and electronic means to ensuring that electronic information cannot be ed, downloaded, or otherwise proliferated by people with legitimate access to the system. Sometimes, this information should not even be sent by – even among parties who have access to it – because such an exchange can jeopardize its security. An organization must also safeguard its sensitive records from becoming available on social networking sites and chat rooms by employees who may either inadvertently or maliciously post it there. It is prudent to have such safeguards clearly defined in organizational policy and, if necessary, to monitor sites for any postings that may violate this rule.

Protection Exceptions & Final Disposition There may be instances when it may be necessary to allow security clearance exceptions. For example, outside counsel engaged to assist with a litigation action may need to access records that they otherwise would not be cleared to access. Security and confidentiality must be integral parts of the final disposition processing of the information. Whether the final disposition is an accession to an archive, transfer to another organization, or preservation for permanent storage or destruction, the procedures must consider the principle of protection in defining the process. For example, confidential employee paper files should be handled for disposition only by employees with appropriate clearance and must be shredded or otherwise destroyed in an unrecoverable manner. Classified government records must retain their classification for the appropriate number of years even if they are transferred to an archive.

Protection Auditing Finally, an organization’s audit program must have a clear process to ascertain whether sensitive information is being handled in accordance with the outlined policies of protection.

Checklist Security Classification Policy Access Control P&P Confidential and Privacy Policy Vital Records P&P Business Continuity Plan Disaster Recovery Plan Annual Training Annual Audits and follow up on findings