by Zasio | Nov 29, 2017 | Blog, By Jared Walker
We are in an age of unprecedented digital technology and connectivity. As a result, businesses face an ever-increasing risk of cyber-attacks and security breaches. Just glance at the news to see how frequently such incidents occur. These attacks and breaches can be...
by Zasio | Nov 15, 2017 | Blog
Employees from Peacock Foods recently filed a class action suit against their employer. The group claims the company violated the Illinois Biometric Identifier Privacy Act. The employees say the company collected their fingerprints when they clocked in and out of...
by Zasio | Oct 25, 2017 | Blog, By Rick Surber
Developing a Disaster Plan Do you have a records management disaster plan? Headlines about natural disasters provide a stark reminder that we can’t control our environment. However, if we plan for disasters and assess risks, we can help ensure business continuity if...
by Zasio | Oct 4, 2017 | Blog
Records retention is challenging for healthcare entities. The requirements are complex and there is a lack of harmony among state, federal, and accreditation requirements. State and federal regulations identify different documents you must maintain in a patient’s...
by Zasio | Sep 29, 2017 | Blog, By Jared Walker
When paper or electronic records have reached the end of their retention period, how do you appropriately destroy them? Below is a summary of common records destruction methods. Paper Records Confidential Information Shredding: Paper is cut into thin vertical strips...
by Zasio | Sep 25, 2017 | Blog
Simply removing direct and indirect personal identifiers isn’t enough to achieve de-identification of a dataset. Data controllers must also analyze the context in which the data is presented, as well as the risk of re-identification. Not only that, but technical...