<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>By Heather Rice Archives - Zasio</title>
	<atom:link href="https://zasio.com/category/heather-rice/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/category/heather-rice/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Tue, 13 Jan 2026 18:09:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>By Heather Rice Archives - Zasio</title>
	<link>https://zasio.com/category/heather-rice/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Hard Copy Resilience and Offsite Record Storage Trends: Why Physical Records Still Matter</title>
		<link>https://zasio.com/hard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter/</link>
					<comments>https://zasio.com/hard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 12 Jan 2026 18:54:30 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[physical records]]></category>
		<category><![CDATA[storage]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=7836</guid>

					<description><![CDATA[<p>In the era of cloud platforms and paperless initiatives, it’s easy to assume that physical records have become obsolete. Yet, organizations across industries continue to rely on hard copy documents as a critical part of information management. As cyber threats rise and regulatory requirements tighten, the resilience of physical records – and the evolution of offsite storage solutions – has never been more important. Despite the convenience of digitization, some records must remain in physical form. Whether for compliance, legal verification, or operational necessity, paper documents support business continuity. And when digital systems go down, physical records provide an essential backup. The Value of Physical Records Many industries require certain documents to be retained in their original form. Wet signatures, notarized contracts, and archival materials often carry legal weight that digital copies cannot replicate. Paper – when stored appropriately – can outlast many digital formats. File types, software systems, and storage devices become obsolete, but properly archived physical documents remain readable for ages. Physical records may also be vital for disaster recovery. Offsite storage ensures that critical documents remain protected from localized threats and can be retrieved quickly if primary offices are damaged or inaccessible. One threat to digital records [&#8230;]</p>
<p>The post <a href="https://zasio.com/hard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter/" data-wpel-link="internal">Hard Copy Resilience and Offsite Record Storage Trends: Why Physical Records Still Matter</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the era of cloud platforms and paperless initiatives, it’s easy to assume that <a href="https://zasio.com/technology-solutions/physical-records-management/" data-wpel-link="internal">physical records</a> have become obsolete. Yet, organizations across industries continue to rely on hard copy documents as a critical part of information management. As cyber threats rise and regulatory requirements tighten, the resilience of physical records – and the evolution of offsite storage solutions – has never been more important.</p>
<p>Despite the convenience of digitization, some records must remain in physical form. Whether for compliance, legal verification, or operational necessity, paper documents support business continuity. And when digital systems go down, physical records provide an essential backup.</p>
<h2>The Value of Physical Records</h2>
<p>Many industries require certain documents to be retained in their original form. Wet signatures, notarized contracts, and archival materials often carry legal weight that digital copies cannot replicate. Paper – when stored appropriately – can outlast many digital formats. File types, software systems, and storage devices become obsolete, but properly archived physical documents remain readable for ages.</p>
<p>Physical records may also be vital for disaster recovery. Offsite storage ensures that critical documents remain protected from localized threats and can be retrieved quickly if primary offices are damaged or inaccessible.</p>
<p>One threat to digital records is hacking. Hackers can compromise networks through various avenues, including phishing emails, outdated software, or weak or leaked credentials. Once inside, they may deploy ransomware that locks users out, halts operations, and holds data for ransom. This not only causes downtime and financial loss but also erodes customer trust. To help mitigate these risks, organizations should maintain a physical copy of <a href="https://zasio.com/records-management-disaster-plan/" data-wpel-link="internal">their business continuity and disaster recovery plan</a> onsite. This ensures your BCDR plan remains available if digital systems are compromised.</p>
<h2>Risks to Hard Copy Records</h2>
<p>Physical records are not without vulnerabilities. Physical records may be destroyed or damaged through natural disasters like fires, floods, and earthquakes. Environment also influences whether physical records remain safe. Humidity, mold, light exposure, and pests can degrade or destroy records.</p>
<p>Security threats aren’t limited to digital systems. Unauthorized access, theft, or tampering can affect physical records, as well. Locked cabinets may no longer be enough. Organizations should implement secure facilities with limited access policies and clear chain of custody procedures to prevent loss or manipulation.</p>
<h3>Trends in Offsite Record Storage Solutions</h3>
<p>Organizations are turning to advanced offsite storage providers to address physical records related risks. Key trends include:</p>
<ul>
<li><strong>Climate-Controlled Facilities and Design</strong>: Modern storage centers offer temperature and humidity regulation, fire suppression systems, and flood-resistant design to preserve document integrity and maximize longevity.</li>
<li><strong>Access and Retrieval Services</strong>: Same-day delivery, rush retrieval, and 24/7 emergency access have become standard expectations that enable organizations to request and gain access to files quickly.</li>
<li><strong>Digital Inventory Systems</strong>: Barcoding and digital portals allow organizations to view inventory, request services, and manage retention schedules without ever having to physically touch a box.</li>
<li><strong>Hybrid Storage Models – Physical + Digital</strong>: Many organizations now combine physical storage with digital access, enabling remote retrieval of scanned documents while securely storing originals offsite for compliance or preservation needs.</li>
</ul>
<h3>Modernization in Physical Records Management</h3>
<p>Advancements in technology are reshaping how organizations <a href="https://zasio.com/technology-solutions/physical-records-management/" data-wpel-link="internal">manage physical records</a>, making the process faster, smarter, and more secure.</p>
<p>Location tracking and mobile apps allow organizations to monitor inventory in real-time. Boxes can be tracked and retrievals managed from anywhere, giving teams greater control over their records.</p>
<p>AI has also transformed indexing. Instead of relying on manual categorization, AI-assisted tools automatically tag, classify, and make records searchable. This is particularly valuable in hybrid storage models where physical and digital records coexist and need to be seamlessly connected.</p>
<p>Finally, certified shredding and destruction services provide a secure way to dispose of records and ensure compliance. These services offer auditable documentation, giving organizations confidence that sensitive information has been properly destroyed.</p>
<p>Technological innovations not only help unite physical and <a href="https://zasio.com/technology-solutions/electronic-records-management/" data-wpel-link="internal">digital records systems</a>–they also elevate records management into an integrated and automation-driven process.</p>
<h2>Strategic Planning</h2>
<p>When comparing offsite storage against onsite storage or digitization, a thorough cost analysis is a must. Some typical costs to consider are:</p>
<ul>
<li>Pickup and transportation fees for moving boxes to the facility;</li>
<li>Monthly storage charges that may be calculated per box or cubic foot;</li>
<li>Retrieval and delivery fees – increased costs for rush retrievals; and</li>
<li>Destruction costs.</li>
</ul>
<p>Offsite storage can deliver long-term savings and compliance benefits, but budgeting can be complicated by fluctuations with usage and unexpected expenses. Storage fees accumulate over time, making small monthly costs add up significantly. Pricing structures between providers can also vary widely, making comparisons tricky. Organizations also need to build flexible budgets to account for unpredictable retrieval and compliance costs.</p>
<h2>Conclusion</h2>
<p>With enhanced security measures, integrated digital tools, and modern offsite storage options, physical documents remain a vital part of a <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">resilient information program</a>. By embracing technological advancements while honoring regulatory requirements and preservation needs, organizations can build a balanced, future-ready record program that safeguards both physical and digital assets.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fhard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter%2F&amp;linkname=Hard%20Copy%20Resilience%20and%20Offsite%20Record%20Storage%20Trends%3A%20Why%20Physical%20Records%20Still%20Matter" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fhard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter%2F&amp;linkname=Hard%20Copy%20Resilience%20and%20Offsite%20Record%20Storage%20Trends%3A%20Why%20Physical%20Records%20Still%20Matter" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fhard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter%2F&amp;linkname=Hard%20Copy%20Resilience%20and%20Offsite%20Record%20Storage%20Trends%3A%20Why%20Physical%20Records%20Still%20Matter" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fhard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter%2F&#038;title=Hard%20Copy%20Resilience%20and%20Offsite%20Record%20Storage%20Trends%3A%20Why%20Physical%20Records%20Still%20Matter" data-a2a-url="https://zasio.com/hard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter/" data-a2a-title="Hard Copy Resilience and Offsite Record Storage Trends: Why Physical Records Still Matter" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/hard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter/" data-wpel-link="internal">Hard Copy Resilience and Offsite Record Storage Trends: Why Physical Records Still Matter</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/hard-copy-resilience-and-offsite-record-storage-trends-why-physical-records-still-matter/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Sound of Records: Managing Audio as a Primary Record Type</title>
		<link>https://zasio.com/managing-audio-records/</link>
					<comments>https://zasio.com/managing-audio-records/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 13:54:09 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[audio]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[records]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=6904</guid>

					<description><![CDATA[<p>In today’s digital workplace, communication is no longer confined to written emails. Audio has become a preferred and powerful form of business communication, making managing audio records more important than ever. However, many organizations still overlook the importance of managing audio records, often treating them as secondary or temporary (something organizations often delete, ignore, or leave unmanaged). This mindset has become outdated. In fact, audio is not just a byproduct of communication. Depending on its content, it could be a primary record that must be governed with the same care as any other business record. Why Managing Audio Records Is Now a Regulatory Priority The growing regulation of audio recordings stems from its rising use in business communications and the legal implications tied to privacy and consent. As more conversations occur over voice calls, virtual meetings, and voice-enabled platforms, regulators are stepping in to ensure proper governance of these communications. Meanwhile, privacy laws such as the U.S. Wiretap Act (18 U.S.C. § 2511) and state-level consent laws are placing legal obligations on organizations to obtain proper consent before recording. Furthermore, industries such as finance and healthcare have specific mandates to retain and monitor audio communications for compliance and transparency. This evolving [&#8230;]</p>
<p>The post <a href="https://zasio.com/managing-audio-records/" data-wpel-link="internal">The Sound of Records: Managing Audio as a Primary Record Type</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today’s digital workplace, communication is no longer confined to written emails. Audio has become a preferred and powerful form of business communication, making managing audio records more important than ever. However, many organizations still overlook the importance of managing audio records, often treating them as secondary or temporary (something organizations often delete, ignore, or leave unmanaged).</p>
<p>This mindset has become outdated. In fact, audio is not just a byproduct of communication. Depending on its content, it could be a primary record that must be governed with the same care as any other business record.</p>
<h3>Why Managing Audio Records Is Now a Regulatory Priority</h3>
<p>The growing regulation of audio recordings stems from its rising use in business communications and the legal implications tied to <a href="https://zasio.com/?s=privacy&amp;et_pb_searchform_submit=et_search_proccess&amp;et_pb_include_posts=yes&amp;et_pb_include_pages=yes" data-wpel-link="internal">privacy</a> and consent. As more conversations occur over voice calls, virtual meetings, and voice-enabled platforms, regulators are stepping in to ensure proper governance of these communications. Meanwhile, privacy laws such as the <a href="https://www.justice.gov/archives/jm/criminal-resource-manual-1050-scope-18-usc-2511-prohibitions" data-wpel-link="external" rel="external noopener noreferrer">U.S. Wiretap Act (18 U.S.C. § 2511)</a> and state-level consent laws are placing legal obligations on organizations to obtain proper consent before recording. Furthermore, industries such as finance and healthcare have specific mandates to retain and monitor audio communications for compliance and transparency. This evolving legal landscape emphasizes the importance of treating audio as a regulated business asset.</p>
<h3>Why Audio Matters More Than Ever</h3>
<p>The rise of remote and hybrid work has also made audio communication more popular than ever. For example, consider these common sources of audio records:</p>
<ul>
<li>Meeting Recordings: Platforms like Zoom, Microsoft Teams, and Google Meet automatically generate audio files for recorded meetings.</li>
<li>Voicemail and Voice Notes: Mobile-first teams often rely on voice messages for quick updates or instructions.</li>
<li>Podcasts and Webinars: Many organizations produce internal or external audio content that contains strategic insights or training material.</li>
<li>AI Voice Assistants: Interactions with tools like Alexa for Business or Google Assistant may be logged and stored.</li>
</ul>
<p>These audio files often contain critical business decisions or compliance-related discussions—making them just as important as written records.</p>
<h3>The Challenges of Managing Audio Records</h3>
<p>Audio records present unique challenges:</p>
<ol>
<li>Searchability: Unlike text-based documents, audio files are not typically searchable.</li>
<li>Storage and Cost: High-quality audio files can be large. Over time, this can lead to significant storage costs.</li>
<li>Retention and Classification: Determining how long to keep an audio file—and under what classification—can be difficult. Is a recorded meeting a formal record?</li>
<li>Authentication and Integrity: Audio files can be edited or manipulated. Ensuring the authenticity of a recording and verifying who said what can be complex.</li>
</ol>
<h3>New Tools and Technologies</h3>
<p>Modern records management platforms are beginning to integrate. These include:</p>
<ul>
<li>Speech-to-Text Engines: Real-time transcription and captioning.</li>
<li>Voice Recognition: Identifying individual speakers in multi-person recordings.</li>
<li>Sentiment Analysis: Detecting tone, urgency, or emotional cues in conversations.</li>
<li>Audio Fingerprinting: Verifying the authenticity and originality of audio files.</li>
</ul>
<h3>AI Summary Notes: Balancing Efficiency with Privacy</h3>
<p>Organizations are increasingly relying on AI to transcribe and summarize audio records. While these tools can improve the accessibility and usefulness of audio content, they also introduce risks if not used responsibly.</p>
<p>AI transcription and summarization tools often process sensitive information, including:</p>
<ul>
<li>Client names and project details</li>
<li>Employee identities and internal discussions</li>
<li>Confidential business strategies or intellectual property</li>
</ul>
<p>If mishandled, this data is fed into third-party AI platforms (especially those that store or use data to train their models) it can lead to unintended consequences, such as the unauthorized exposure of sensitive information, loss of control over proprietary business content, and vulnerability to regulatory non-compliance. These risks are exacerbated when organizations lack transparency into how the data is processed, where it is stored, and whether it is being reused beyond its original purpose.</p>
<p>To mitigate these risks, organizations should thoroughly consider the following safeguards:</p>
<ol>
<li>Use Enterprise-Grade AI Tools: Choose transcription and summarization platforms that offer data residency controls, enterprise agreements, and no data retention policies. Organizations should also verify that the provider does not use your data to train their models or for any other purpose besides providing the services you’ve requested.</li>
<li>Anonymize Sensitive Information: Before processing, redact or anonymize names, client identifiers, and confidential terms.</li>
<li>Implement Internal AI Models: Where possible, deploy AI tools on-premises or within a private cloud environment to maintain full control over data flow and storage.</li>
<li>Update Governance Policies: Include records management and data governance policies to include AI.</li>
<li>Train Staff on AI Ethics and Usage: Make sure employees understand the implications of using AI tools and follow protocols for handling sensitive information.</li>
</ol>
<h3>Best Practices for Managing Audio as a Record</h3>
<p>To effectively manage audio records, organizations may:</p>
<ol>
<li>Transcribe and Index: Use AI-powered transcription tools to convert speech to text. This not only makes audio content searchable but also allows for easier classification and review.</li>
<li>Apply Metadata: Tag audio files with relevant metadata such as:</li>
</ol>
<ul>
<li>Date and time of recording</li>
<li>Participants or speakers</li>
<li>Meeting or event title</li>
<li>Department or business unit</li>
<li>Retention category</li>
</ul>
<p>Metadata ensures that audio files are readily retrievable.</p>
<p>3. Define Retention Rules: Audio files should be subject to the same retention as other similar records. Retention should be based on content and purpose, not format.</p>
<p>4. Secure Storage and Access Controls: Store audio files in secure, access-controlled environments and use encryption to protect sensitive data.</p>
<p>5. Standardize Formats: Convert audio files to widely supported, long-term formats like MP3 or WAV. Avoid proprietary formats that may become obsolete or difficult to access in the future.</p>
<h3>Final Thoughts: Listening to the Future</h3>
<p>The next time you hit “record,” ask yourself: Is this just a conversation—or is it a record that needs to be managed? By embracing the sound of records, you ensure that your governance program is not only comprehensive but ready for the future.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fmanaging-audio-records%2F&amp;linkname=The%20Sound%20of%20Records%3A%20Managing%20Audio%20as%20a%20Primary%20Record%20Type" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fmanaging-audio-records%2F&amp;linkname=The%20Sound%20of%20Records%3A%20Managing%20Audio%20as%20a%20Primary%20Record%20Type" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fmanaging-audio-records%2F&amp;linkname=The%20Sound%20of%20Records%3A%20Managing%20Audio%20as%20a%20Primary%20Record%20Type" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fmanaging-audio-records%2F&#038;title=The%20Sound%20of%20Records%3A%20Managing%20Audio%20as%20a%20Primary%20Record%20Type" data-a2a-url="https://zasio.com/managing-audio-records/" data-a2a-title="The Sound of Records: Managing Audio as a Primary Record Type" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/managing-audio-records/" data-wpel-link="internal">The Sound of Records: Managing Audio as a Primary Record Type</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/managing-audio-records/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Does Dunder Mifflin Have an Approved Records Retention Schedule? RIM Portrayal in Hollywood is &#8230; Interesting</title>
		<link>https://zasio.com/records-management-the-office-dunder-mifflin/</link>
					<comments>https://zasio.com/records-management-the-office-dunder-mifflin/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 23 Oct 2024 15:59:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[hollywood]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[retention schedule]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[RRS]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=5285</guid>

					<description><![CDATA[<p>In the RIM profession, you may find yourself watching movies and television through a different lens. Pop culture has shown us that mishandling records leads to some comedic and, sometimes, catastrophic results. Whether it’s accidental destruction, improper storage, or security breaches, the way Hollywood characters manage (or mismanage) their records provides valuable lessons in real-world RIM principles. Below are a few examples of where records management goes wrong—and what we can learn from it. The Office – Michael’s “Special Filing Cabinet” (Season 1, Episode 1 – “Pilot”) The pilot episode of &#8220;The Office&#8221; introduces viewers to the quirky dynamics of the Dunder Mifflin Scranton branch, setting the stage for the iconic series. In this episode, regional manager Michael Scott comedically introduces the “special filing cabinet,” AKA the trash can. After Pam receives a fax containing a meeting agenda for Michael and his boss, Michael dramatically tosses the agenda into the trash. This moment sums up the lighthearted incompetence Michael brings to his office, but also raises a serious point about the importance of proper records retention. Does Dunder Mifflin have an approved records retention schedule? What is Dunder Mifflin’s disposition policy? Throwing documents into the trash is unprofessional and potentially [&#8230;]</p>
<p>The post <a href="https://zasio.com/records-management-the-office-dunder-mifflin/" data-wpel-link="internal">Does Dunder Mifflin Have an Approved Records Retention Schedule? RIM Portrayal in Hollywood is &#8230; Interesting</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the RIM profession, you may find yourself watching movies and television through a different lens. Pop culture has shown us that mishandling records leads to some comedic and, sometimes, catastrophic results. Whether it’s accidental destruction, improper storage, or security breaches, the way Hollywood characters manage (or mismanage) their records provides valuable lessons in real-world RIM principles.</p>
<p>Below are a few examples of where records management goes wrong—and what we can learn from it.</p>
<p><strong>The Office – Michael’s “Special Filing Cabinet” (Season 1, Episode 1 – “Pilot”)</strong></p>
<p>The pilot episode of &#8220;The Office&#8221; introduces viewers to the quirky dynamics of the Dunder Mifflin Scranton branch, setting the stage for the iconic series. In this episode, regional manager Michael Scott comedically introduces the “special filing cabinet,” AKA the trash can. After Pam receives a fax containing a meeting agenda for Michael and his boss, Michael dramatically tosses the agenda into the trash. This moment sums up the lighthearted incompetence Michael brings to his office, but also raises a serious point about the importance of proper records retention.</p>
<p>Does Dunder Mifflin have an approved records retention schedule? What is Dunder Mifflin’s disposition policy? Throwing documents into the trash is unprofessional and potentially dangerous for a corporation. In a real office setting, this kind of carelessness could lead to the loss of important data, legal liabilities, or compliance violations. A well-defined retention policy ensures that documents are stored securely and properly disposed when the time comes.</p>
<p><iframe title="YouTube video player" src="https://www.youtube-nocookie.com/embed/HLZyi24Z90A?si=l5W1-5w32S3eiXZK&amp;start=245" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<p><strong>Breaking Bad – The Magnet Heist Episode (Season 5, Episode 8 – “Gliding Over All”)</strong></p>
<p>This episode of “Breaking Bad,” features a memorable scene involving a massive magnet used to erase evidence stored at a police station. Walter White and his accomplices devise a plan to eliminate evidence against them using a giant magnet to erase the contents of a laptop. While their plan works, it raises questions about how records are accessed, stored, and secured.</p>
<p>The ease with which Walter and his team access and manipulate police evidence demonstrates a critical flaw in records management: secure storage of digital records. The magnet used in this episode may not be the most common threat to electronic records, but there are countless security risks ranging from cyberattacks to physical breaches. Organizations need robust security measures to safeguard and protect the integrity of sensitive data from unauthorized access, manipulation, and destruction.</p>
<p><strong>Wolf of Wall Street</strong></p>
<p>In Martin Scorsese&#8217;s &#8220;The Wolf of Wall Street,&#8221; one of the most unforgettable scenes involves a chaotic attempted cover up of illegal activities at Stratton Oakmont by shredding physical documents. Jordan Belfort’s actions highlight the legal implications of improper document management. In real-world scenarios, businesses must adhere to compliance requirements regarding record retention and destruction. Failure to follow these regulations can result in fines, penalties, and even criminal charges, like those faced by Belfort and his accomplices.</p>
<p>There are strict legal and regulatory frameworks governing how records should be destroyed, particularly sensitive ones. When organizations face a crisis, it’s crucial to follow established policies and protocols for document retention and destruction. Hasty actions can have legal repercussions. Organizations must have a defensible deletion policy in place to ensure records are destroyed in accordance with regulatory requirements and provide an audit trail proving compliance.</p>
<p><em> </em><strong>Office Space</strong></p>
<p>In “Office Space,” Milton, the bumbling and disgruntled employee at Initech, is cast down to the basement along with stacks and boxes of documents. Milton’s frustrations result in his setting the office ablaze&#8211;chaos ensues. While this scenario is meant to be comedic, the film shows the importance of proper record storage and emergency preparedness for recordkeepers.</p>
<p>Did Initech have an emergency action plan? Storing records in inappropriate or insecure locations, such as a basement prone to flooding, fire, or other hazards, is a major risk that must not be overlooked. Organizations should have an emergency action plan for records management that includes disaster recovery, offsite backups, and risk assessments. A little planning ahead ensures that critical records remain safe, secure, and recoverable in an emergency.</p>
<p>Whether for laughs or as part of the plot, TV shows and movies provide some memorable lessons in records management. While the characters might be forgiven for their errors, and sometimes we even cheer them on, in the real world such actions can lead to severe consequences. “The Office,” “The Wolf of Wall Street,” “Breaking Bad,” and “Office Space,” teach us that there’s a lot to learn about how to manage records effectively—and what can happen when we don’t.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-the-office-dunder-mifflin%2F&amp;linkname=Does%20Dunder%20Mifflin%20Have%20an%20Approved%20Records%20Retention%20Schedule%3F%20RIM%20Portrayal%20in%20Hollywood%20is%20%E2%80%A6%20Interesting" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-the-office-dunder-mifflin%2F&amp;linkname=Does%20Dunder%20Mifflin%20Have%20an%20Approved%20Records%20Retention%20Schedule%3F%20RIM%20Portrayal%20in%20Hollywood%20is%20%E2%80%A6%20Interesting" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-the-office-dunder-mifflin%2F&amp;linkname=Does%20Dunder%20Mifflin%20Have%20an%20Approved%20Records%20Retention%20Schedule%3F%20RIM%20Portrayal%20in%20Hollywood%20is%20%E2%80%A6%20Interesting" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Frecords-management-the-office-dunder-mifflin%2F&#038;title=Does%20Dunder%20Mifflin%20Have%20an%20Approved%20Records%20Retention%20Schedule%3F%20RIM%20Portrayal%20in%20Hollywood%20is%20%E2%80%A6%20Interesting" data-a2a-url="https://zasio.com/records-management-the-office-dunder-mifflin/" data-a2a-title="Does Dunder Mifflin Have an Approved Records Retention Schedule? RIM Portrayal in Hollywood is … Interesting" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/records-management-the-office-dunder-mifflin/" data-wpel-link="internal">Does Dunder Mifflin Have an Approved Records Retention Schedule? RIM Portrayal in Hollywood is &#8230; Interesting</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/records-management-the-office-dunder-mifflin/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>From Seed to Harvest: Cultivating Your Records Life Cycle</title>
		<link>https://zasio.com/zasio-from-seed-to-harvest-cultivating-your-records-life-cycle/</link>
					<comments>https://zasio.com/zasio-from-seed-to-harvest-cultivating-your-records-life-cycle/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 24 Jun 2024 17:39:48 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[records]]></category>
		<category><![CDATA[records manager]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[RIM]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=4665</guid>

					<description><![CDATA[<p>The arrival of warm weather brings many people outdoors to tend their gardens. Much like a gardener, a records manager tends their records and information. The records life cycle is like a garden’s natural life, with records being the seeds that must be carefully planted, nurtured, and harvested for their value. Create: Planting Seeds Each seed has the potential to grow into something valuable. Records managers choose what information may be valuable to the company, much like a gardener carefully chooses which seeds to plant. After the records are chosen, they are “planted” in the company’s filing system and await germination. Organize: Growth and Maintenance Once planted, seeds must have the right conditions to sprout and grow into mature plants. Similarly, records must be properly organized and stored for easy access and retrieval. Having a well-designed filing and records management system is like having good soil—it allows your records to sprout and grow to maturity. At this stage, records may be indexed or classified so employees can easily access and retrieve them. A gardener needs to water, fertilize, and prune their plants to help them thrive. As records grow, they require maintenance, an important part of the records life cycle. [&#8230;]</p>
<p>The post <a href="https://zasio.com/zasio-from-seed-to-harvest-cultivating-your-records-life-cycle/" data-wpel-link="internal">From Seed to Harvest: Cultivating Your Records Life Cycle</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The arrival of warm weather brings many people outdoors to tend their gardens. Much like a gardener, a records manager tends their records and information. The records life cycle is like a garden’s natural life, with records being the seeds that must be carefully planted, nurtured, and harvested for their value.</p>
<p><strong>Create: Planting Seeds</strong></p>
<p>Each seed has the potential to grow into something valuable. Records managers choose what information may be valuable to the company, much like a gardener carefully chooses which seeds to plant. After the records are chosen, they are “planted” in the company’s filing system and await germination.</p>
<p><strong>Organize: Growth and Maintenance</strong></p>
<p>Once planted, seeds must have the right conditions to sprout and grow into mature plants. Similarly, records must be properly organized and stored for easy access and retrieval. Having a well-designed filing and records management system is like having good soil—it allows your records to sprout and grow to maturity. At this stage, records may be indexed or classified so employees can easily access and retrieve them.</p>
<p>A gardener needs to water, fertilize, and prune their plants to help them thrive. As records grow, they require maintenance, an important part of the records life cycle. Maintenance helps preserve the integrity, accuracy, and relevance of the records management system. Just as a gardener tends to their beds, a records manager must constantly monitor, update, and protect the company’s records and information. A records manager needs to observe the company’s “weather” and adjust as business and technology needs evolve.</p>
<p><strong>Use: Harvest</strong></p>
<p>Harvest season is when you reap the benefits of your labor. The records that you’ve organized and stored are now ready for harvest and use. A well-maintained records management system makes retrieval and use of these records a breeze.</p>
<p><strong>Retention: Storage and Compost</strong></p>
<p>The records life cycle doesn’t end at harvest. Like your vegetables and fruits, records have different storage lengths. Company policies and procedures and laws and regulations all influence the lengths of your retention periods. Proper records storage ensures that they can be accessed when required.</p>
<p>David Stephens, one of the founders of Zasio’s RIM consulting division, compared a record’s life cycle to compost—if retained too long, it begins to rot. At the season’s end, gardeners may compost what’s left of their harvest. Similarly, when a record has reached its full potential and has met all the proper retention requirements, you must identify and pull those that are no longer needed. The disposition process may include deletion, disposal, or archiving depending on company policy or regulatory requirements.</p>
<p><strong>Conclusion</strong></p>
<p>The life cycle of a record resembles the growth of a garden beginning with a tiny seed to the harvest and storage of valuable information. A well-cultivated records management system may yield great rewards for those who tend it with care.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fzasio-from-seed-to-harvest-cultivating-your-records-life-cycle%2F&amp;linkname=From%20Seed%20to%20Harvest%3A%20Cultivating%20Your%20Records%20Life%20Cycle" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fzasio-from-seed-to-harvest-cultivating-your-records-life-cycle%2F&amp;linkname=From%20Seed%20to%20Harvest%3A%20Cultivating%20Your%20Records%20Life%20Cycle" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fzasio-from-seed-to-harvest-cultivating-your-records-life-cycle%2F&amp;linkname=From%20Seed%20to%20Harvest%3A%20Cultivating%20Your%20Records%20Life%20Cycle" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fzasio-from-seed-to-harvest-cultivating-your-records-life-cycle%2F&#038;title=From%20Seed%20to%20Harvest%3A%20Cultivating%20Your%20Records%20Life%20Cycle" data-a2a-url="https://zasio.com/zasio-from-seed-to-harvest-cultivating-your-records-life-cycle/" data-a2a-title="From Seed to Harvest: Cultivating Your Records Life Cycle" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/zasio-from-seed-to-harvest-cultivating-your-records-life-cycle/" data-wpel-link="internal">From Seed to Harvest: Cultivating Your Records Life Cycle</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/zasio-from-seed-to-harvest-cultivating-your-records-life-cycle/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is a Data Leak?</title>
		<link>https://zasio.com/data-leak-breach-what-is-it-zasio/</link>
					<comments>https://zasio.com/data-leak-breach-what-is-it-zasio/#respond</comments>
		
		<dc:creator><![CDATA[Heather Rice]]></dc:creator>
		<pubDate>Tue, 27 Jun 2023 20:17:23 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[breach]]></category>
		<category><![CDATA[data leak]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Zasio]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1217</guid>

					<description><![CDATA[<p>Refresh your news feed and you will often see yet another company has become the victim of a data leak. Today, most companies are storing sensitive information electronically, making data leaks a major concern.  Information security is becoming more important than ever. Data Leak vs. Data Breach So, what is a data leak? Data leaks and data breaches both involve exposure to sensitive information. The main distinction though, is data leaks are caused internally, usually unintentionally. Data breaches, on the other hand, are intentionally caused by external actors. The most frequent causes of both, however, are a lack of employee training and poor information security. Because they involve external bad actors intentionally breaching a system to attack your data, data breaches are more nefarious than data leaks. But, just because a data leak isn’t as sinister in origin doesn’t mean its consequences are any less severe. Criminals often use information from data leaks for data breaches. You may recall from your newsfeed earlier this year when Samsung became one of the higher profile examples of a company suffering a data leak.[1] In Samsung’s case, employees shared sensitive source code with ChatGPT to have the generative AI app check for errors. Employees [&#8230;]</p>
<p>The post <a href="https://zasio.com/data-leak-breach-what-is-it-zasio/" data-wpel-link="internal">What is a Data Leak?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Refresh your news feed and you will often see yet another company has become the victim of a data leak. Today, most companies are storing sensitive information electronically, making data leaks a major concern.  Information security is becoming more important than ever.</p>
<p><strong>Data Leak vs. Data Breach</strong></p>
<p>So, what is a data leak? Data leaks and data breaches both involve exposure to sensitive information. The main distinction though, is data leaks are caused internally, usually unintentionally. Data breaches, on the other hand, are intentionally caused by external actors. The most frequent causes of both, however, are a lack of employee training and poor information security.</p>
<p>Because they involve external bad actors intentionally breaching a system to attack your data, data breaches are more nefarious than data leaks. But, just because a data leak isn’t as sinister in origin doesn’t mean its consequences are any less severe. Criminals often use information from data leaks for data breaches.</p>
<p>You may recall from your newsfeed earlier this year when Samsung became one of the higher profile examples of a company suffering a data leak.<a href="https://www.zasio.com/data-leak-breach-what-is-it-zasio/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> In Samsung’s case, employees shared sensitive source code with ChatGPT to have the generative AI app check for errors. Employees also tried using ChatGPT to convert a recording of a meeting into notes. This information is now available on the internet. ChatGPT is becoming increasingly popular for summarizing documents, which becomes a concern, particularly for privacy professionals worried about exposing personal information.</p>
<p><strong>Types of Leaks</strong></p>
<ul>
<li>Confidential Information: These leaks can include a company’s financial data, trade secrets, and other proprietary business information.</li>
<li>Intellectual Property: These leaks involve a company’s patents, trademarks, copyrights, and trade secrets.</li>
<li>Personal Information: These leaks include customer and employee information. This data type typically includes names, addresses, or credit card information.</li>
</ul>
<p>All types of leaks can have devastating consequences, including damaging a company’s reputation, loss of customers, legal fees, and revenue loss, to name a few.</p>
<p><strong>Data Leak Prevention</strong></p>
<p>It is important to be proactive to prevent data leaks from happening. Here are some things companies can do:</p>
<ul>
<li>Monitor Network Traffic: Increase your network traffic monitoring. Increased monitoring may help identify suspicious activity and pinpoint security vulnerabilities.</li>
<li>Restrict Access: Sensitive or confidential data shouldn’t be accessed by those that don’t require it. Companies should only grant access to employees that require access to sensitive information and are trained to safeguard this data.</li>
<li>Multifactor Identification: It is always a good policy to have strong password requirements for company employees. Implementing multifactor identification ensures that password leaks themselves don’t cause a breach.</li>
<li>Training: Employers need to train employees to recognize the tricky tactics cybercriminals use, particularly for email phishing. Suspicious emails should be reported to your company’s security team. Regular security training keeps security top-of-mind for employees.</li>
<li>Vendor Risk Assessments: Unfortunately, your vendors may not take cybersecurity seriously. Risk questionnaires can be used to determine third-party security risks. Companies should evaluate each vendor’s security risks and ensure they comply with regulatory standards.</li>
</ul>
<p><a href="https://www.zasio.com/data-leak-breach-what-is-it-zasio/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Mashable SEA. <a href="https://sea.mashable.com/tech/23047/whoops-samsung-workers-accidentally-leaked-trade-secrets-via-chatgpt" data-wpel-link="external" rel="external noopener noreferrer"><em>Whoops, Samsung Workers Accidentally Leaked Trade Secrets via ChatGPT</em></a>. April 6, 2023.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fdata-leak-breach-what-is-it-zasio%2F&amp;linkname=What%20is%20a%20Data%20Leak%3F" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fdata-leak-breach-what-is-it-zasio%2F&amp;linkname=What%20is%20a%20Data%20Leak%3F" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fdata-leak-breach-what-is-it-zasio%2F&amp;linkname=What%20is%20a%20Data%20Leak%3F" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fdata-leak-breach-what-is-it-zasio%2F&#038;title=What%20is%20a%20Data%20Leak%3F" data-a2a-url="https://zasio.com/data-leak-breach-what-is-it-zasio/" data-a2a-title="What is a Data Leak?" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/data-leak-breach-what-is-it-zasio/" data-wpel-link="internal">What is a Data Leak?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/data-leak-breach-what-is-it-zasio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Utah Becomes Newest State to Adopt Consumer Privacy Law</title>
		<link>https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/</link>
					<comments>https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 20 May 2022 19:16:53 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[consumer privacy legislation]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[record keeping software]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[UCPA]]></category>
		<category><![CDATA[Utah Consumer Privacy Act]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=438</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/" data-wpel-link="internal">Utah Becomes Newest State to Adopt Consumer Privacy Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">On March 24, 2022, the <a href="https://le.utah.gov/~2022/bills/static/SB0227.html" data-wpel-link="external" rel="external noopener noreferrer">Utah Consumer Privacy Act (UCPA)</a> was signed into law by Governor Spencer J. Cox, making Utah the fourth state, behind California, Virginia, and Colorado, to pass comprehensive consumer privacy legislation.</p>
<p><strong>The UCPA’s Applicability</strong></p>
<p><strong> </strong>The UCPA applies to entities that:</p>
<ul>
<li>conduct business in Utah or produce products and services that target Utah residents;</li>
<li>have an annual revenue of $25 million or more; and</li>
<li>either controls or processes the personal data of at least 100,000 Utah residents or derives 50% of its revenue from the sale of personal data and controls or processes the data of over 25,000 Utah residents.</li>
</ul>
<p>There are also a number of exemptions under the UCPA, including, government agencies, institutions of higher education, non-profit corporations, and entities regulated under the Health Insurance Portability and Accountability Act (HIPAA).</p>
<p><strong>What Rights Do Consumer Have Under the UCPA?</strong></p>
<p>Utah residents have the following rights under the UCPA:</p>
<ul>
<li>Access: Right to confirm whether a controller is processing the consumer’s personal data and access to that data.</li>
<li>Deletion: Right to delete the personal data provided to the controller.</li>
<li>Portability: Right to obtain copies of the personal data provided to the controller in a format that is portable, usable, and transmittable.</li>
<li>Opt-Out: Right to opt-out of the processing of personal data for targeted advertising or sale of personal data.</li>
</ul>
<p><strong>Responsibilities for Processors and Controllers</strong></p>
<p>The UCPA specifies the following responsibilities for processors and controllers:</p>
<ul>
<li>Contracts between processors and controllers shall be established before processors begin processing information on behalf of a controller. The contract should provide the instructions for processing personal data, the purpose, type of data being processed, the duration, and the rights and obligations of the parties. The contract should also ensure confidentiality by the processor in relation to the personal data being processed. Any subcontractors must also enter into a contract and abide by the same obligations as the processor.</li>
<li>Controllers shall provide consumers with a privacy notice that includes:</li>
<li>categories of personal data processed by the controller;</li>
<li>purpose of processing the personal data;</li>
<li>how consumers may exercise their rights;</li>
<li>categories of personal data that are shared with third parties;</li>
<li>categories of third parties with whom the controller shares personal data; and</li>
<li>the manner in which consumers may exercise the right to opt-out of the sale of personal data or processing for targeted advertising.</li>
<li>Establish data security practices to protect the confidentiality of personal data and reduce the risk of harm to consumers in relation to the processing of their personal data.</li>
<li>Controllers may not process data collected from a consumer without providing notice and the opportunity to opt-out of the processing.</li>
<li>Controllers may not discriminate against consumers for exercising their rights by denying goods or services, charging different prices to consumers for goods or services, or providing the consumer with a different quality of goods or services.</li>
</ul>
<p><strong>UCPA Enforcement</strong></p>
<p>The Utah attorney general has the exclusive right to enforce actions under the UCPA (i.e., consumers do not have a private right of action against business for UCPA violations). Violators of the law have a 30-day cure period upon receipt of written notification before the attorney general initiates any actions against the controller or processor. Uncured or continued violations are subject to penalties up to $7,500 per violation and may be responsible for payment of damages to the attorney general to be deposited into the Consumer Privacy Account.</p>
<p><strong>The UCPA’s Effective Date</strong></p>
<p>The UCPA becomes effective on December 31, 2023, giving businesses a grace period to adjust their operations. While this may seem far off, don’t underestimate the amount of time it can take for a business to adjust its practices to be legally compliant. Instead, contact Zasio to find out how you can help bring your business into compliance with this new law, as well as other comprehensive state privacy laws.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&amp;linkname=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&amp;linkname=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&amp;linkname=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&#038;title=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" data-a2a-url="https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/" data-a2a-title="Utah Becomes Newest State to Adopt Consumer Privacy Law" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/" data-wpel-link="internal">Utah Becomes Newest State to Adopt Consumer Privacy Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meet Our Team! Heather Rice, Senior Research Analyst, Certified Paralegal</title>
		<link>https://zasio.com/meet-our-team-heather-rice/</link>
					<comments>https://zasio.com/meet-our-team-heather-rice/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 04 Feb 2022 19:52:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=466</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/meet-our-team-heather-rice/" data-wpel-link="internal">Meet Our Team! Heather Rice, Senior Research Analyst, Certified Paralegal</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-9">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>What excites you about Zasio’s products and services? </strong></p>
<p>What excites me about our products and services is our customization. Every company’s records and information management needs are different, and our ability to provide a custom experience sets us apart from others in the industry. Zasio strives to stay up-to-date with the latest laws and regulations, trends, and industry standards. We also take pride in providing top-notch customer service.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>Tell us about your role at Zasio.</strong></p>
<p>I joined the Research Division at Zasio in July of 2018. As a Senior Research Analyst, my role is to conduct research for Zasio’s legal research database and also provide assistance to the Consulting team.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>How did you get into Information Governance research and why do you like it as a career field?</strong></p>
<p>Before joining Zasio, I worked as a paralegal and developed a love for the law. My work as a paralegal helped establish some of the skills necessary for Information Governance (IG) research, namely attention to detail and reading and interpreting complex legal documents, laws, and regulations.</p>
<p>While working in litigation, I assisted attorneys to, in essence, gather all the puzzle pieces together to provide a solution to a particular client’s legal issues. Records and information management (RIM) is much like a puzzle, and IG research is one of the puzzle pieces needed to put together a records retention schedule. Working in the IG research field allows me to search for these missing pieces, gather them together, and work with a great team to provide solutions for our client’s RIM questions. Laws and regulations are ever-changing, making IG research a challenging career that I enjoy very much.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>What are the most important things you recommend people keep in mind about RIM?</strong></p>
<p>Don’t forget about paper records. In a world where everything is electronic, businesses may often forget about their physical records. Onsite records are sometimes shoved into basements or storerooms and may be vulnerable to security risks due to break-ins or damage by several things, including insects, fire, flooding, etc. Frequently, physical records stored offsite are forgotten. It’s important to have a document tracking system, such as file indexing, so that businesses always know where their records are.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_single_image wpb_content_element vc_align_left">
<figure class="wpb_wrapper vc_figure">
<div class="vc_single_image-wrapper vc_box_border_grey"><img loading="lazy" decoding="async" class="vc_single_image-img attachment-large alignleft" title="Isadora" src="https://cdn.zasio.com/wp-content/uploads/2021/12/Isadora-677x1024.jpg" sizes="(max-width: 677px) 100vw, 677px" srcset="https://cdn.zasio.com/wp-content/uploads/2021/12/Isadora-677x1024.jpg 677w, https://cdn.zasio.com/wp-content/uploads/2021/12/Isadora-198x300.jpg 198w, https://cdn.zasio.com/wp-content/uploads/2021/12/Isadora.jpg 716w" alt="" width="284" height="429" data-dt-location="https://www.zasio.com/meet-our-team-heather-rice/isadora/" /></div>
</figure>
</div>
</div>
</div>
</div>
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>What is something you would like to learn?</strong></p>
<p>Portuguese! In 2018, my husband and I hosted an exchange student from Brazil. It was by far one of the best experiences of my life. Getting to learn her culture and share ours was unforgettable. One of my most cherished memories was learning to make the Brazilian dessert, Brigadeiro. Brigadeiro is a special treat, similar to chocolate truffles, traditionally served at parties and weddings. It is meant to be shared with the people you care about. She and I still share laughs about her first few days with us as we learned to communicate with each other. During her time here, she taught me some Portuguese, and listening to her talk to her family and friends across the globe made me fall in love with the language. It is a difficult language to master, but I hope to be able to speak the language when we visit her family in Brazil one day. I highly recommend hosting an exchange student! Becoming a mentor and learning from each other at the same time was a rewarding experience. She truly became a member of our family, and we still talk daily.</p>
</div>
</div>
</div>
</div>
</div>
</div></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_1 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fmeet-our-team-heather-rice%2F&amp;linkname=Meet%20Our%20Team%21%20Heather%20Rice%2C%20Senior%20Research%20Analyst%2C%20Certified%20Paralegal" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fmeet-our-team-heather-rice%2F&amp;linkname=Meet%20Our%20Team%21%20Heather%20Rice%2C%20Senior%20Research%20Analyst%2C%20Certified%20Paralegal" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fmeet-our-team-heather-rice%2F&amp;linkname=Meet%20Our%20Team%21%20Heather%20Rice%2C%20Senior%20Research%20Analyst%2C%20Certified%20Paralegal" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fmeet-our-team-heather-rice%2F&#038;title=Meet%20Our%20Team%21%20Heather%20Rice%2C%20Senior%20Research%20Analyst%2C%20Certified%20Paralegal" data-a2a-url="https://zasio.com/meet-our-team-heather-rice/" data-a2a-title="Meet Our Team! Heather Rice, Senior Research Analyst, Certified Paralegal" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/meet-our-team-heather-rice/" data-wpel-link="internal">Meet Our Team! Heather Rice, Senior Research Analyst, Certified Paralegal</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/meet-our-team-heather-rice/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>‘Tis the Season… for a Data Breach</title>
		<link>https://zasio.com/tis-the-season-for-a-data-breach/</link>
					<comments>https://zasio.com/tis-the-season-for-a-data-breach/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 02 Dec 2021 20:04:39 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[CISA]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[Cybersecurity and Infrastructure Security Agency]]></category>
		<category><![CDATA[data breach risks]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[Information Governance consulting software]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[phishing scams]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[spear-phishing]]></category>
		<category><![CDATA[whaling]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=479</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/tis-the-season-for-a-data-breach/" data-wpel-link="internal">‘Tis the Season… for a Data Breach</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">The leaves are changing color and falling to the ground, pumpkin spice is on nearly every store shelf, and the air is chilly—Yes, the holidays will soon be upon us. Before you start your holiday shopping or bring out the decorations, it’s important to remember that the holidays are prime time for data breaches and cyber theft.</p>
<p>The Cybersecurity and Infrastructure Security Agency (CISA) defines a data breach as the “unauthorized movement or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.”<a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> Each year, many large companies experience a data breach. You may not think this could happen to you, but the truth is that every company is vulnerable to hacking. According to Risk Based Security, a cyber vulnerability intelligence, data breach, and risk ratings company, the first two quarters of 2021 had 1,767 breaches. These breaches led to approximately 18.8 billion exposed records between January and June.<a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a> Data breaches can become very expensive. On top of ransom demands, you also have investigation, mitigation, and legal costs. But the biggest cost often is the loss of consumer confidence or closure of the business entirely.</p>
<p>So why do attacks often occur during the holidays? One reason is that companies often operate with a skeleton crew making it difficult to communicate with IT staff. This leads to longer response times in an attack, which allows damage to extend much further compared to an attack during normal working hours. These attacks can come in many forms so it’s important to know what they look like in the event you come across one.</p>
<p><strong>Types of Data Breaches</strong></p>
<p>Here are a few of the ways hackers may gain access to your information:</p>
<ol>
<li><strong>Phishing Scams</strong>. Phishing happens through emails or messaging applications that appear to be legitimate and attempt to exploit your trust. Examples of phishing include:</li>
</ol>
<ul>
<li>
<ul>
<li><strong>Email phishing</strong> is one of the more well-known cyber-attacks. Attackers impersonate brands and send emails that lead victims to click on links or download malicious content that installs malware on the victim’s device.</li>
<li><strong>Spear-phishing</strong> is a targeted attempt by a person disguised as a trusted individual, such as a friend, co-worker, or family member, to obtain sensitive information (think account credentials, money, or financial information). Attackers often target their victims by   looking at the victim’s personal information available on the internet, such as social media websites. The attacker requests the victim perform an unusual task hoping the victim has enough trust to perform the task without question.</li>
<li><strong>Whaling</strong> is similar to spear-phishing except it involves supposed “senior officials” at a company. In this type of phishing, scammers imitate a senior staff member after using the company’s website to obtain names and email addresses. These emails are sent to unsuspecting subordinate staff with a request, such as transferring money or reviewing a document that contains malicious content. If you don’t typically receive emails or messages from company higher ups, this should be a red flag.</li>
</ul>
</li>
</ul>
<p>2. <strong>Ransomware</strong>. Ransomware is malicious software that targets a company’s data by blocking access to their systems. According to Fortune.com, ransomware attacks grew by 150 percent in 2020. Given this increase, Fortune.com estimates damages from cybercrimes may reach $6 trillion in 2021. The FBI and CISA have noted that hackers are increasingly deploying ransomware during holidays when offices are often closed.<a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> As the hackers’ thinking goes, holiday attacks maximize damage and companies caught off guard will have little choice but to meet their demands.</p>
<ul>
<li>
<ul>
<li><strong>Non-secure Wi-Fi Connections</strong>. Since many companies still have employees working remotely, connecting to secure Wi-Fi is especially important. You should warn your employees about using public Wi-Fi connections where cyber criminals can intercept communications or setup up Wi-Fi connections that appear legitimate, but are fake and used to steal information. Employees should be extra diligent during the holidays when accessing their email or company systems remotely.</li>
</ul>
</li>
</ul>
<p><strong>How to Protect Yourself</strong></p>
<p>The reality is that we are all at risk of data breaches and cybersecurity issues; however, there are some things you can do to protect yourself and your consumers. Here are a few key examples:</p>
<ol>
<li><strong>Education</strong>. Training your employees about the importance of cybersecurity is just as important as other IT maintenance and document management protocols. Set aside some time for employee refresher courses on the importance of not opening emails, attachments, or clicking on links from unknown sources, not sending sensitive documents through personal email accounts, using secure Wi-Fi connections, and keeping track of company devices.</li>
<li><strong>Investing in cybersecurity software</strong>. The return on investment could be exponential. Also, keep all software up-to-date. Software that is out-of-date may contain weaknesses in which hackers may take advantage of. Software updates and patches work to repair these vulnerabilities and protect your data.</li>
<li><strong>Implement a strict password policy</strong>. Strong passwords should be used by everyone, whether you’re an employee or a consumer. Do not reuse passwords or use passwords that contain information that can be public knowledge (for example, your birthday, a pet’s name, or a child’s name). Passwords should contain a variety of characters, numbers, and upper and lowercase letters.</li>
<li><strong>Use two-factor authentication</strong>, especially for remote access. Two-factor authentication provides another security layer that makes it more difficult for hackers to login and use your accounts because the hackers will need another piece of information other than your username and password. This often comes in the form of an SMS code sent to your phone or a code provided by an authenticator app.</li>
</ol>
<p><strong>Conclusion</strong></p>
<p>Holidays are great; we all want to enjoy them. After all, who doesn’t love shopping and decorating while sipping on a hot pumpkin spiced beverage. But a data breach may put an end to your holiday spirit. Educating yourself and your employees about ways to prevent against cyber-attacks is not only the best defense against such attacks, but also the best way to and ensure peace of mind during the holidays and beyond. <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> today to explore the software and consulting solutions we offer, to address your information governance needs.</p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Cybersecurity and Infrastructure Security Agency, National Initiative for Cybersecurity Careers and Studies, Cybersecurity Glossary, available at: <a href="https://niccs.cisa.gov/about-niccs/cybersecurity-glossary" data-wpel-link="external" rel="external noopener noreferrer">https://niccs.cisa.gov/about-niccs/cybersecurity-glossary</a> (accessed October 21, 2021).</p>
<p><a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> Risk Based Security. “2021 Mid Year Report.” 2021, https://pages.riskbasedsecurity.com/hubfs/Reports/2021/2021%20Mid%20Year%20Data%20Breach%20QuickView%20Report.pdf</p>
<p><a href="https://www.zasio.com/tis-the-season-for-a-data-breach/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> Alsever, Jennifer. “Why company hacks tend to happen over holiday weekends.”6 July 2021, https://fortune.com/2021/07/06/why-company-hacks-tend-to-happen-over-holiday-weekends/</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_2 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&amp;linkname=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&amp;linkname=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&amp;linkname=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Ftis-the-season-for-a-data-breach%2F&#038;title=%E2%80%98Tis%20the%20Season%E2%80%A6%20for%20a%20Data%20Breach" data-a2a-url="https://zasio.com/tis-the-season-for-a-data-breach/" data-a2a-title="‘Tis the Season… for a Data Breach" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/tis-the-season-for-a-data-breach/" data-wpel-link="internal">‘Tis the Season… for a Data Breach</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/tis-the-season-for-a-data-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Spring Cleaning Your Records</title>
		<link>https://zasio.com/spring-cleaning-your-records/</link>
					<comments>https://zasio.com/spring-cleaning-your-records/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 26 Apr 2021 21:03:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<category><![CDATA[information management]]></category>
		<category><![CDATA[records and information management month]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[spring cleaning]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=550</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/spring-cleaning-your-records/" data-wpel-link="internal">Spring Cleaning Your Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Spring is in the air–birds are chirping, flowers are starting to bloom, and the trees are starting to come alive again. The sun is out, it’s time to open the windows, bring out the cleaning supplies, and start spring cleaning. You clean and declutter your house come springtime, so why not spring clean your records?</p>
<p>April is Records and Information Management Month, a celebration of the value of organizing and maintaining records and data. But the end of April doesn’t mean that you should shove those records into a closet and close the door until next spring. It’s important to give your records attention throughout the year, but sometimes we all need that extra boost to get us motivated. Spring is an excellent time to review your organization’s approach to recordkeeping. Here are a few tips to kick your spring records cleaning into high gear.</p>
<p><strong>Plan Ahead – Evaluate Your Organization’s Needs and Know Your Risk</strong></p>
<p>Much like gathering the cleaning supplies you need to get the job done, it’s important to assess the situation before you take a deep dive and start tossing records with reckless abandon (or throwing them haphazardly into that filing cabinet down the hall). Assess your organization’s need for records management and call in reinforcements if needed. Does your organization already have a records retention schedule? Does this schedule work for your organization or does it need tweaking? Do you know if your schedule is compliant with local laws and regulations?</p>
<p>It is now easier than ever to create large amounts of records and data. Electronic records have further complicated records retention and opened organizations to new kinds of risk. The move to electronic records may have also pushed your organization to move their old paper records to offsite storage, where they are out-of-sight and out-of-mind. However, offsite records are still subject to discovery should your organization find itself in the middle of a lawsuit. Make sure to include offsite records in your evaluation.</p>
<p><strong>Inventory – Everything Should have its Place</strong></p>
<p>You have a game plan, now what? When you begin spring cleaning your home, you don’t just move stuff around on the shelf or simply take stuff out of one closet and put it into another. Pulling things out and taking inventory of what you have makes organizing much easier. Everything should have its place. Records management is no different. It is easier to move forward with a plan when you know exactly what you have.</p>
<p>Do you know what records you have? More importantly, do you know where they are located? Electronic records and the ability to work from anywhere allows us to create and save records everywhere, oftentimes in multiple places. Employees may keep these records in the most convenient, but not always the best, place to store them. Records need to be accessible to others who may need them. Not knowing where your records are stored may put them at risk for incidental deletion or destruction. Start by reaching out to all departments or business units to determine what types of records they have and where they are stored. It is also good practice to figure out how long a business unit may need a particular record (just be sure these retention periods are also in compliance with local laws and regulations). This inventory will make it much easier to map out a plan for where to store records so that they are accessible. It might also help to identify potential consolidations to your retention schedule by grouping similar records with similar retention periods.</p>
<p><strong>Declutter – Top to Bottom</strong></p>
<p>Spring cleaning can be an arduous task. Having everyone pitch in makes the project run much smoother, quicker, and more efficiently. When it comes time to implement your records management plan, it’s important to make sure that you have everyone in the organization on board, starting from the top. Creating inventories brings all business units together by letting each unit play a role in developing the inventory and creating a roadmap for where records are stored. Direction and support from the top of the organization gives employees permission to take time out of their day and play an active role in managing their own records. Decluttering and organizing records are no easy tasks and will take, in some cases, a great deal of time. Employees who help create a records management plan that works for them will likely be enticed to maintain their records and follow the plan.</p>
<p>So, open your windows up and take a breath of fresh air knowing that your organization’s records and information are well on their way to being organized and compliant. When there is a plan to have “a place for everything and everything in its place”, and no “clutter,” your organization will run more efficiently. If you need additional tips or help cleaning up your records, please <a href="https://www.zasio.com/about-us/contact-us/" target="_blank" rel="noopener" data-wpel-link="internal">reach out to Zasio</a>.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_3 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fspring-cleaning-your-records%2F&amp;linkname=Spring%20Cleaning%20Your%20Records" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fspring-cleaning-your-records%2F&amp;linkname=Spring%20Cleaning%20Your%20Records" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fspring-cleaning-your-records%2F&amp;linkname=Spring%20Cleaning%20Your%20Records" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fspring-cleaning-your-records%2F&#038;title=Spring%20Cleaning%20Your%20Records" data-a2a-url="https://zasio.com/spring-cleaning-your-records/" data-a2a-title="Spring Cleaning Your Records" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/spring-cleaning-your-records/" data-wpel-link="internal">Spring Cleaning Your Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/spring-cleaning-your-records/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>New Changes to the European Union’s Medical Device and In Vitro Diagnostic Device Regulations</title>
		<link>https://zasio.com/new-changes-european-union-medical-device-regulations/</link>
					<comments>https://zasio.com/new-changes-european-union-medical-device-regulations/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 12 Oct 2020 21:51:30 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[data management]]></category>
		<category><![CDATA[data retention]]></category>
		<category><![CDATA[documentation]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<category><![CDATA[In Vitro]]></category>
		<category><![CDATA[In Vitro Diagnostic]]></category>
		<category><![CDATA[medical device regulations]]></category>
		<category><![CDATA[regulations]]></category>
		<category><![CDATA[retention periods]]></category>
		<category><![CDATA[technical documentation]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=597</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/new-changes-european-union-medical-device-regulations/" data-wpel-link="internal">New Changes to the European Union’s Medical Device and In Vitro Diagnostic Device Regulations</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">On May 26, 2020, the European Union enacted new regulations concerning medical and in vitro diagnostic devices—a move that should cause manufacturers, clinical trial sponsors, investigators, and other regulated parties involved in medical device development, manufacture, and distribution in the EU to take notice. These new regulations replace existing directives and bring about many changes, including important changes to records retention periods.</p>
<p>Medical Device Directive 93/42/EEC has been replaced by Medical Device Regulations (EU) 2017/745. This regulation applies to both implantable medical devices and non-implantable medical devices.</p>
<p>In Vitro Diagnostics Regulations (EU) 2017/746 replaces In Vitro Diagnostic Medical Devices Directive 98/79/EC. Although this new regulation is not fully effective until 2022, certain articles are already in force.</p>
<p>Below is a summary of the changes to the retention periods and new requirements that are included in these regulations.</p>
<p><strong>Details of Changes to Retention Periods</strong></p>
<p><strong> </strong><u>Medical Device Regulations (EU) 2017/745:</u></p>
<ul>
<li>Technical documentation, declarations of conformity, and any relevant certificates: For manufacturers, authorized representatives, or importers of medical devices, the retention period for these documents has been increased from 5 to 10 years after the last device has been placed on the market. When these documents relate to implantable devices, the retention period is 15 years after the last device has been placed on the market (the same as under the prior directives).<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn1" name="_ednref1" data-wpel-link="internal">[i]</a></li>
<li>For persons combining medical devices with other devices: The retention period for records compatibility, packaging, and internal monitoring verification statements has been increased from 5 to 10 years after the last device has been placed on the market, or 15 years after the last implantable device has been placed on the market, whichever period is longer.<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn2" name="_ednref2" data-wpel-link="internal">[ii]</a></li>
<li>Economic operators (including manufacturers, authorized representatives, importers, and distributors) of medical devices: These parties are responsible for keeping supply chain records for the same 10-year and 15-year requirements described in Article (10)(8) of the new regulations.<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn3" name="_ednref3" data-wpel-link="internal">[iii]</a></li>
<li>(Annex IX)(7) and (Annex X)(7) require manufacturers (or their authorized representatives) to keep EU declarations of conformity, quality management system documentation, data and records which arise from procedures for monitoring, verifying, validating, and controlling design, technical documentation, and similar records for a period of 10 years after the last device has been placed on the market. This retention period also applies to decisions and reports from the notified body. This is an increase of 5 years to the retention period. These same documents, as they relate to implantable devices, must be kept for 15 years after the last device has been placed on the market.</li>
<li>(Annex XI)(9), (10.5), (17) and (18.4) require a 10-year retention period for medical devices and a 15-year retention period for implantable medical devices for the following records: EU declarations of conformity, quality management system documentation, post-market surveillance system documentation, decisions and reports from the notified body, manufacturing process documentation, and EU product verification certificates, among other similar records.</li>
<li>Manufacturers or authorized representatives of custom-made devices must retain statements containing specifics which identify the device, the intended use of the device, characteristics of the product (as indicated by prescription), and general safety and performance requirements, along with similar information, for 10 years after the device has been placed on the market. This same information must be kept for 15 years if it relates to implantable devices.<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn4" name="_ednref4" data-wpel-link="internal">[iv]</a></li>
<li>Lastly, sponsors of clinical trials for medical devices must retain documentation, including application forms, investigators’ brochures and performance study plans, for 10 years after the device’s clinical investigation has ended. If the device is placed on the market, these documents must be kept for 10 years after the last device has been placed on the market. The retention period for implantable devices is 15 years.<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn5" name="_ednref5" data-wpel-link="internal">[v]</a></li>
</ul>
<p><u>In Vitro Diagnostic Regulations (EU) 2017/746:</u></p>
<ul>
<li>Technical documentation, declarations of conformity, and copies of all relevant certificates: Manufacturers, authorized representatives, and importers of in vitro diagnostic devices must now retain these documents for 10 years after the last device has been placed on the market. This change increases the retention period by five years.<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn6" name="_ednref6" data-wpel-link="internal">[vi]</a></li>
<li>Economic operators (including manufacturers, authorized representatives, importers and distributors) of in vitro diagnostic devices are responsible for keeping supply chain records for the 10-year retention period noted in Article (10)(7) of these new regulations.<a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_edn7" name="_ednref7" data-wpel-link="internal">[vii]</a></li>
<li>(Annex IX)(6), (Annex X)(6) and (Annex XI)(6) require manufacturers (or their authorized representatives) to keep the following records for 10 years after the last device has been placed on the market:</li>
<li>
<ul>
<li>any EU declaration of conformity;</li>
<li>quality management system documentation;</li>
<li>documentation of procedures and techniques for monitoring, verifying, validating and controlling design;</li>
<li>technical documentation;</li>
<li>copies of EU type-examination certificates; and</li>
<li>certain similar documents.</li>
</ul>
</li>
<li>Lastly, (Annex XIV)(Chap II)(3) requires sponsors of clinical trials for in vitro diagnostic medical devices to keep application forms, investigators’ brochures, and performance study plans (along with similar documents) for 10 years after the end of any clinical performance study. If the device is placed on the market, the retention period becomes 10 years after the last device has been placed on the market.</li>
</ul>
<p><strong>Impacts from These Changes</strong><strong> </strong></p>
<p>If you are regulated by the European Union, be sure to update your retention periods for the relevant categories of records. If you need assistance in setting up or updating your retention schedule, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a>.</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref1" name="_edn1" data-wpel-link="internal">[i]</a> Medical Device Regulations (EU) 2017/745 (10)(8), (11)(3)(b) and (13)(9).</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref2" name="_edn2" data-wpel-link="internal">[ii]</a> Id<em>.</em> at (22)(5).</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref3" name="_edn3" data-wpel-link="internal">[iii]</a> Id. at (25).</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref4" name="_edn4" data-wpel-link="internal">[iv]</a> Id. at (Annex XIII)(4).</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref5" name="_edn5" data-wpel-link="internal">[v]</a> Id. at (Annex XV)(Chap III)(3).</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref6" name="_edn6" data-wpel-link="internal">[vi]</a> In Vitro Diagnostic Regulations (EU) 2017/746 (10)(7), (11)(3)(b) and (13)(9).</p>
<p><a href="https://www.zasio.com/new-changes-european-union-medical-device-regulations/#_ednref7" name="_edn7" data-wpel-link="internal">[vii]</a> Id. at (22).</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_4 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fnew-changes-european-union-medical-device-regulations%2F&amp;linkname=New%20Changes%20to%20the%20European%20Union%E2%80%99s%20Medical%20Device%20and%20In%20Vitro%20Diagnostic%20Device%20Regulations" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fnew-changes-european-union-medical-device-regulations%2F&amp;linkname=New%20Changes%20to%20the%20European%20Union%E2%80%99s%20Medical%20Device%20and%20In%20Vitro%20Diagnostic%20Device%20Regulations" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fnew-changes-european-union-medical-device-regulations%2F&amp;linkname=New%20Changes%20to%20the%20European%20Union%E2%80%99s%20Medical%20Device%20and%20In%20Vitro%20Diagnostic%20Device%20Regulations" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fnew-changes-european-union-medical-device-regulations%2F&#038;title=New%20Changes%20to%20the%20European%20Union%E2%80%99s%20Medical%20Device%20and%20In%20Vitro%20Diagnostic%20Device%20Regulations" data-a2a-url="https://zasio.com/new-changes-european-union-medical-device-regulations/" data-a2a-title="New Changes to the European Union’s Medical Device and In Vitro Diagnostic Device Regulations" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/new-changes-european-union-medical-device-regulations/" data-wpel-link="internal">New Changes to the European Union’s Medical Device and In Vitro Diagnostic Device Regulations</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/new-changes-european-union-medical-device-regulations/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
