<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>By Jared Walker Archives - Zasio</title>
	<atom:link href="https://zasio.com/category/jared/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/category/jared/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Tue, 17 Mar 2026 00:15:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>By Jared Walker Archives - Zasio</title>
	<link>https://zasio.com/category/jared/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Comply or Pay Up: U.S. Financial Regulators Take Aim at Electronic Communications Recordkeeping</title>
		<link>https://zasio.com/financial-regulators-electronic-communications-recordkeeping-zasio/</link>
					<comments>https://zasio.com/financial-regulators-electronic-communications-recordkeeping-zasio/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 01 May 2023 20:11:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[electronic communications]]></category>
		<category><![CDATA[financial regulators]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=330</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/financial-regulators-electronic-communications-recordkeeping-zasio/" data-wpel-link="internal">Comply or Pay Up: U.S. Financial Regulators Take Aim at Electronic Communications Recordkeeping</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Over the past few years, and especially since the early days of COVID-19, workplaces have seen a huge increase in the use of electronic messaging and communications programs. Apps such as Zoom, WhatsApp, Microsoft Teams, and Slack are widely used for daily business and intra-office communications. This is especially true for financial businesses such as broker-dealers and traders, who routinely conduct their business and communications remotely and electronically.</p>
<p>While these modes of electronic communication provide ease and convenience, they present a robust challenge to companies when it comes to properly capturing and keeping <a href="https://zasio.com/technology-solutions/electronic-records-management/" data-wpel-link="internal">electronic communications as records</a>. This challenge is amplified for communications on personal devices. Difficulties retaining records of electronic communications were made painfully evident when in September of 2022, the <a href="https://www.zasio.com/sec-fines-electronic-communications-securities-exchange-commission/" data-wpel-link="internal">SEC fined more than a dozen financial firms over $1 billion</a> for failure to properly preserve records of their electronic “off-channel” communications.</p>
<p>Shortly after levying these sanctions, the SEC <a href="https://www.sec.gov/news/press-release/2022-187" data-wpel-link="external" rel="external noopener noreferrer">voted on Oct. 12, 2022, to adopt rule amendments</a> to the electronic recordkeeping, prompt production of records, and third-party recordkeeping service requirements applicable to broker-dealers, security-based swap dealers (SBSDs), and major security-based swap participants. The SEC explained in its press release that the amendments “are designed to modernize recordkeeping requirements given technological changes over the last two decades and to make the rule adaptable to new technologies in electronic recordkeeping.”</p>
<p>Previously, firms subject to SEC broker-dealer regulation were required to keep electronic records exclusively in a non-rewriteable, non-erasable (WORM) format. This can be challenging to comply with when preserving electronic communications (such as emails, text messages/chats, etc.), especially when they are generated from remote or personal mobile devices. <a href="https://www.sec.gov/rules/final/2022/34-96034.pdf" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">The amendments</a>, now codified in <a href="https://www.ecfr.gov/current/title-17/chapter-II/part-240/subject-group-ECFR17722751b422db3/section-240.17a-4" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">17 CFR 240.17a-4(f)(2)(i)(A)</a>, are designed to allow firms greater flexibility in how they keep such records, allowing for an “audit trail alternative.” In other words, firms will have the option to keep electronic records in a manner that allows original records to be recreated if they are altered, overwritten, or erased. This will help firms to configure their electronic recordkeeping systems to be in line with current practices and protect the authenticity and reliability of original records. Now, firms have a choice between the previously mandated WORM format or the new audit trail alternative, depending on their needs and preferences. If they choose the audit trail option, they must:</p>
<p>Preserve a record for the duration of its applicable retention period in a manner that maintains a complete time-stamped audit trail that includes:</p>
<p>(1) All modifications to and deletions of the record or any part thereof;</p>
<p>(2) The date and time of actions that create, modify, or delete the record;</p>
<p>(3) If applicable, the identity of the individual creating, modifying, or deleting the record; and</p>
<p>(4) Any other information needed to maintain an audit trail of the record in a way that maintains security, signatures, and data to ensure the authenticity and reliability of the record and will permit the re-creation of the original record if it is modified or deleted[.]</p>
<p>These rule amendments became effective Jan. 3, 2023, with a compliance date set for May 3, 2023.</p>
<p>If nothing else, the recent sanctions levied by the SEC as well as the amendments to the electronic recordkeeping requirements should signal to firms the seriousness and importance the SEC is placing on proper recordkeeping of electronic communications.  The SEC’s division of enforcement director <a href="https://www.sec.gov/news/press-release/2022-174" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">commented</a> that the sanctions: both in terms of the firms involved and the size of the penalties ordered – underscore the importance of recordkeeping requirements: they’re sacrosanct. If there are allegations of wrongdoing or misconduct, we must be able to examine a firm’s books and records to determine what happened… Other broker-dealers and asset managers who are subject to similar requirements under the federal securities laws would be well-served to self-report and self-remediate any deficiencies.</p>
<p>Given how much focus the SEC currently is putting on electronic communications recordkeeping, firms – especially those in the financial field that are under the governance of the SEC and CFTC – would be wise to review their policies regarding the use and retention of electronic communications, and make sure such policies are in line with current regulatory requirements.  Adjustments should be made as necessary to such policies to ensure consistent, company-wide compliance. A well-defined and uniformly adhered to record retention policy will go a long way to mitigate operational and legal risks, including liability for hefty fines for regulatory noncompliance.</p>
<p>As <a href="https://www.cftc.gov/PressRoom/SpeechesTestimony/johnsonstatement092722" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">CFTC Commissioner Kristin N. Johnson</a> noted in a press release: relevant technologies are evolving quickly. Today’s resolutions reveal a need for entities operating within our markets to address imminent operational challenges. Increased reliance on simple, easy-to-access but unauthorized chat and text platforms will pose a significant challenge for many types of entities operating in our markets. Internal compliance programs must adopt internal controls consistent with this new landscape. Firms must inculcate a culture of compliance at all levels of their organization to mitigate the risks associated with using unauthorized chat and text platforms.</p>
<p>Being mindful of these new and emerging communications technologies and the unique recordkeeping challenges they bring, the time to act for companies is now. With some careful planning and strategic implementation of recordkeeping policies, companies can set themselves up for long-term success and compliance, while avoiding fines, legal issues, and other potential negative consequences down the road.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">records management software</a>. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" src="https://cdn.zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Ffinancial-regulators-electronic-communications-recordkeeping-zasio%2F&amp;linkname=Comply%20or%20Pay%20Up%3A%20U.S.%20Financial%20Regulators%20Take%20Aim%20at%20Electronic%20Communications%20Recordkeeping" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Ffinancial-regulators-electronic-communications-recordkeeping-zasio%2F&amp;linkname=Comply%20or%20Pay%20Up%3A%20U.S.%20Financial%20Regulators%20Take%20Aim%20at%20Electronic%20Communications%20Recordkeeping" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Ffinancial-regulators-electronic-communications-recordkeeping-zasio%2F&amp;linkname=Comply%20or%20Pay%20Up%3A%20U.S.%20Financial%20Regulators%20Take%20Aim%20at%20Electronic%20Communications%20Recordkeeping" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Ffinancial-regulators-electronic-communications-recordkeeping-zasio%2F&#038;title=Comply%20or%20Pay%20Up%3A%20U.S.%20Financial%20Regulators%20Take%20Aim%20at%20Electronic%20Communications%20Recordkeeping" data-a2a-url="https://zasio.com/financial-regulators-electronic-communications-recordkeeping-zasio/" data-a2a-title="Comply or Pay Up: U.S. Financial Regulators Take Aim at Electronic Communications Recordkeeping" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/financial-regulators-electronic-communications-recordkeeping-zasio/" data-wpel-link="internal">Comply or Pay Up: U.S. Financial Regulators Take Aim at Electronic Communications Recordkeeping</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/financial-regulators-electronic-communications-recordkeeping-zasio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Update on the EU-U.S. Data Privacy Framework</title>
		<link>https://zasio.com/update-on-the-eu-u-s-data-privacy-framework/</link>
					<comments>https://zasio.com/update-on-the-eu-u-s-data-privacy-framework/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 17 Oct 2022 20:13:35 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[CLPO]]></category>
		<category><![CDATA[EU]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[President Biden]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[Trans-Atlantic Data Privacy Framework]]></category>
		<category><![CDATA[Zasio]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=384</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/update-on-the-eu-u-s-data-privacy-framework/" data-wpel-link="internal">Update on the EU-U.S. Data Privacy Framework</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Since our <a href="https://www.zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/" data-wpel-link="internal">previous post</a> discussing plans for the European Union-U.S. Trans-Atlantic Data Privacy Framework, the United States has taken a significant step toward setting this new framework into action.</p>
<p>On Oct. 7, 2022, President Joe Biden signed an “<a href="https://www.whitehouse.gov/briefing-room/presidential-actions/2022/10/07/executive-order-on-enhancing-safeguards-for-united-states-signals-intelligence-activities/" data-wpel-link="external" rel="external noopener noreferrer">Executive Order on Enhancing Safeguards for United States Signals Intelligence Activities</a>,” which lays out steps the U.S. will take to implement its commitments under the new framework. It was the U.S.’s signals intelligence activities and a lack of adequate safeguards in place to protect personal data involved in such activities, after all, that led to the European Court of Justice’s decision to strike down the prior Privacy Shield framework in 2020. Biden’s executive order also comes after the U.S. and the EU this past March reached an agreement in principle on the new framework.</p>
<p>In a nutshell, the executive order strengthens privacy and civil liberty safeguards in the execution of U.S. signals intelligence activities. As summarized by the <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/10/07/fact-sheet-president-biden-signs-executive-order-to-implement-the-european-union-u-s-data-privacy-framework/" data-wpel-link="external" rel="external noopener noreferrer">accompanying factsheet</a>, the executive order:</p>
<ul>
<li><strong>Adds further safeguards</strong> for U.S. signals intelligence activities, including requiring that such activities be conducted only in pursuit of defined national security objectives; take into consideration the privacy and civil liberties of all persons, regardless of nationality or country of residence; and be conducted only when necessary to advance a validated intelligence priority and only to the extent and in a manner proportionate to that priority.</li>
<li><strong>Mandates handling requirements for personal information</strong> collected through signals intelligence activities and extends the responsibilities of legal, oversight, and compliance officials to ensure that appropriate actions are taken to remediate incidents of non-compliance.</li>
<li><strong>Requires U.S. Intelligence Community elements to update their policies and procedures</strong> to reflect the new privacy and civil liberties safeguards contained in the [executive order].</li>
</ul>
<p>Perhaps more notably, the executive order also provides for<strong> a two-tiered redress mechanism</strong>, in which a (“CLPO”) and ultimately, a (“DPRC”)—an independent binding authority—can adjudicate “qualifying complaints transmitted by the appropriate public authority in a qualifying state concerning the United States signals intelligence activities.” In other words, individuals can send qualifying complaints to the CLPO through appropriate public authorities if they feel their data privacy rights have been violated by the conduct of U.S. signals intelligence activities. The CLPO can then investigate, review, and order remediation as appropriate. If necessary, such cases may escalate to the DPRC, which has the authority to review CLPO determinations. This redress mechanism addresses <a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdf" data-wpel-link="external" rel="external noopener noreferrer">European Court of Justice concerns</a> over a current lack of appropriate legal recourse for data subjects seeking judicial protection of their data rights in cross-border data flows from the EU to the U.S. It is also a crucial step toward the official implementation of a new framework.</p>
<p>Cross-border data flows are essential for many U.S. and EU companies across all industries and sectors as these companies seek to grow and participate in the global digital economy. Having a new framework for transatlantic data flows will help ensure greater protection of personal data. It will also bolster trust and stability between the U.S. and EU when it comes to transatlantic data flows.</p>
<p>While the executive order is a promising development for a new framework and matters of EU-U.S. data transfers and privacy, the process has just begun. As any new framework must be a collaborative effort, the EU must sign off on it. Accordingly, the ball is now in the EU’s court, as the next step is for the European Commission to assess the proposed framework as well as the U.S.’s commitments under it. The Commission must then adopt a new adequacy determination, allowing the new framework to become operative under EU law.</p>
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> to explore how our technology solutions and consulting services can help fulfill your data privacy and information governance needs.P</div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_1 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fupdate-on-the-eu-u-s-data-privacy-framework%2F&amp;linkname=Update%20on%20the%20EU-U.S.%20Data%20Privacy%20Framework" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fupdate-on-the-eu-u-s-data-privacy-framework%2F&amp;linkname=Update%20on%20the%20EU-U.S.%20Data%20Privacy%20Framework" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fupdate-on-the-eu-u-s-data-privacy-framework%2F&amp;linkname=Update%20on%20the%20EU-U.S.%20Data%20Privacy%20Framework" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fupdate-on-the-eu-u-s-data-privacy-framework%2F&#038;title=Update%20on%20the%20EU-U.S.%20Data%20Privacy%20Framework" data-a2a-url="https://zasio.com/update-on-the-eu-u-s-data-privacy-framework/" data-a2a-title="Update on the EU-U.S. Data Privacy Framework" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/update-on-the-eu-u-s-data-privacy-framework/" data-wpel-link="internal">Update on the EU-U.S. Data Privacy Framework</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/update-on-the-eu-u-s-data-privacy-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Let’s Try This Again – Sending Personal Data Across the Pond under Privacy Shield 2.0</title>
		<link>https://zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/</link>
					<comments>https://zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 24 May 2022 19:12:13 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[EU personal data]]></category>
		<category><![CDATA[information governance consulting]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy shield]]></category>
		<category><![CDATA[privacy shield 2.0]]></category>
		<category><![CDATA[records management software]]></category>
		<category><![CDATA[Trans-Atlantic Data Privacy Framework]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=435</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/" data-wpel-link="internal">Let’s Try This Again – Sending Personal Data Across the Pond under Privacy Shield 2.0</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>On Friday, March 25<sup>th</sup>, the United States and European Commission issued a <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/25/united-states-and-european-commission-joint-statement-on-trans-atlantic-data-privacy-framework/" data-wpel-link="external" rel="external noopener noreferrer">joint statement</a> announcing their agreement in principle on a <em>Trans-Atlantic Data Privacy Framework </em>(the “Framework”). If finalized, the new framework would allow cross-border transfers of personal data from Europe to the United States.</p>
<p>This agreement is the culmination of over a year of negotiations between the U.S. and E.U. It comes after the previous trans-Atlantic data flow framework known as “Privacy Shield”—which was an arrangement allowing companies to share EU personal data to the U.S.—<a href="https://curia.europa.eu/jcms/upload/docs/application/pdf/2020-07/cp200091en.pdf" data-wpel-link="external" rel="external noopener noreferrer">was invalidated by the European Court of Justice in July 2020</a> for lack of adequate privacy protections. Specifically, the court noted that Privacy Shield did not limit the access and use of personal data by U.S. authorities for surveillance purposes in line with EU principles of necessity and proportionality. The court also found that Privacy Shield did not provide data subjects adequate redress mechanisms for improper use of their data by U.S. intelligence agencies.</p>
<p>In a <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/25/fact-sheet-united-states-and-european-commission-announce-trans-atlantic-data-privacy-framework/" data-wpel-link="external" rel="external noopener noreferrer">press statement</a>, the White House outlined steps the United States will take under a new Framework (referred to by some as “Privacy Shield 2.0”) to ensure appropriate protection of EU personal data, including commitments to:</p>
<ul>
<li>Strengthen the privacy and civil liberties safeguards governing U.S. signals intelligence activities;</li>
<li>Establish a new redress mechanism with independent and binding authority; and</li>
<li>Enhance its existing rigorous and layered oversight of signals intelligence activities.</li>
</ul>
<p>President Biden stated in <a href="https://www.whitehouse.gov/briefing-room/speeches-remarks/2022/03/25/remarks-by-president-biden-and-european-commission-president-ursula-von-der-leyen-in-joint-press-statement/" data-wpel-link="external" rel="external noopener noreferrer">a joint press statement</a> that the new Framework underscores the EU/U.S. “shared commitment to privacy, to data protection, and to the rule of law” and that it will allow for “transatlantic data flows that help facilitate $7.1 trillion in economic relationships with the EU.”</p>
<p>This development in EU/U.S. data privacy cooperation is welcome news both for companies that routinely handle personal data flowing from the EU to the U.S., and EU citizens whose data is being transferred to the U.S. Under the <a href="https://ec.europa.eu/commission/presscorner/api/files/attachment/872132/Trans-Atlantic%20Data%20Privacy%20Framework.pdf.pdf" data-wpel-link="external" rel="external noopener noreferrer">Framework</a>, participating U.S. companies will have the ability to more freely facilitate EU/U.S. data flows, and EU data subjects will be able to seek redress from a “multi-layer redress mechanism,” which includes an independent data protection review court consisting of individuals outside the U.S. Government, with full authority to handle claims and oversee remedial measures.</p>
<p>The Framework is still in its preliminary stages, with few details available at this initial phase. The goal, as outlined by the <a href="https://www.whitehouse.gov/briefing-room/statements-releases/2022/03/25/united-states-and-european-commission-joint-statement-on-trans-atlantic-data-privacy-framework/" data-wpel-link="external" rel="external noopener noreferrer">joint statement</a>, is to “translate [the] arrangement into legal documents that will need to be adopted on both sides.” It will be interesting to see how this new Framework will differ from the previous Privacy Shield framework, and what measures will be implemented to accomplish the intended objectives. As the Framework continues to develop and more details are released, it is important for companies to be aware of its specific provisions, and to accurately assess how these might impact their business and the way they collect and store personal data from the E.U..</p>
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> to explore how our technology solutions and consulting services can help fulfill your data privacy and information governance needs.</p>
<p> </p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_2 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fsending-personal-data-across-the-pond-under-privacy-shield-2-0%2F&amp;linkname=Let%E2%80%99s%20Try%20This%20Again%20%E2%80%93%20Sending%20Personal%20Data%20Across%20the%20Pond%20under%20Privacy%20Shield%202.0" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fsending-personal-data-across-the-pond-under-privacy-shield-2-0%2F&amp;linkname=Let%E2%80%99s%20Try%20This%20Again%20%E2%80%93%20Sending%20Personal%20Data%20Across%20the%20Pond%20under%20Privacy%20Shield%202.0" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fsending-personal-data-across-the-pond-under-privacy-shield-2-0%2F&amp;linkname=Let%E2%80%99s%20Try%20This%20Again%20%E2%80%93%20Sending%20Personal%20Data%20Across%20the%20Pond%20under%20Privacy%20Shield%202.0" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fsending-personal-data-across-the-pond-under-privacy-shield-2-0%2F&#038;title=Let%E2%80%99s%20Try%20This%20Again%20%E2%80%93%20Sending%20Personal%20Data%20Across%20the%20Pond%20under%20Privacy%20Shield%202.0" data-a2a-url="https://zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/" data-a2a-title="Let’s Try This Again – Sending Personal Data Across the Pond under Privacy Shield 2.0" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/" data-wpel-link="internal">Let’s Try This Again – Sending Personal Data Across the Pond under Privacy Shield 2.0</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/sending-personal-data-across-the-pond-under-privacy-shield-2-0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Power to the PIPL? A Rundown of China’s New Personal Information Protection Law</title>
		<link>https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/</link>
					<comments>https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 20:20:08 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[China’s privacy laws]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[Personal Information Protection Law of the People’s Republic of China]]></category>
		<category><![CDATA[personal information rights]]></category>
		<category><![CDATA[PIPL]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[record retention consulting]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=495</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/" data-wpel-link="internal">Power to the PIPL? A Rundown of China’s New Personal Information Protection Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">On August 20, 2021, China adopted the <a href="http://www.npc.gov.cn/npc/c30834/202108/a8c4e3672c74491a80b53a172bb753fe.shtml" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Personal Information Protection Law of the People’s Republic of China</a> (“PIPL”), its first comprehensive national data privacy law and one of the most sweeping and restrictive national privacy laws to date. Modeled largely off the GDPR and set to go into effect on November 1, the PIPL regulates personal information collected or transferred both inside and outside of China. It also comes with harsh penalties for non-compliance and gives broad powers to China’s state authorities to enforce the law.</p>
<p>The PIPL is expected to significantly impact how companies (especially tech companies) do business in China. Aimed at protecting the online user data of Chinese citizens, the law will directly affect companies located in China that handle personal data. But even companies operating outside of China may be subject to the law if they provide products or services to people in China, analyze or evaluate activities of people in China, or fall under circumstances described in certain other laws or administrative regulations.</p>
<p>Without further ado, let’s quickly dive into some of the law’s major provisions:</p>
<p><strong>In General</strong></p>
<p>The PIPL defines personal information to include, similar to the GDPR, “all kinds of information related to an identified or identifiable natural person, recorded electronically or by other means, excluding anonymized information.”</p>
<p>The handling of personal information includes “collection, storage, use, processing, transmission, provision, disclosure, or deletion of personal information.”</p>
<p>Under the PIPL, personal information should only be processed for a clear and reasonable purpose, to the smallest scope possible related to that purpose, and in a method with the least impact on personal rights. Personal information processing must also follow principles of openness and transparency, as well as rules of disclosure. These general principles largely mirror <a href="https://gdpr-info.eu/art-5-gdpr/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">GDPR principles</a> of fairness, transparency, and limitations on processing of personal data.</p>
<p><strong>Personal Consent</strong></p>
<p>Personal information handlers (the PIPL equivalent of data processors under the GDPR) must obtain personal consent from the data subject to process personal information, unless the data is processed under a specific listed exception. Those exceptions include contract performance, statutory duties or obligations, public health emergencies, news reports or public interest, legally disclosed information, or other circumstances stipulated by laws and regulations.</p>
<p>Personal consent must also be obtained for any cross-border transfer of personal information (for more on this, see the section below that discusses notification requirements).</p>
<p>These express consent requirements break from the GDPR, which technically doesn’t require personal consent to use personal data unless (i) it is relied upon as one of the six legal bases to process personal data under <a href="https://gdpr.eu/article-6-how-to-process-personal-data-legally/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Article 6</a> of the GDPR, or (ii) is used as an exemption to transfer personal data abroad (in absence of one of the required transfer mechanisms laid out in <a href="https://gdpr-info.eu/chapter-5/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Chapter 5</a> of the GDPR).</p>
<p><strong>Data Retention</strong></p>
<p>Similar to the GDPR, the retention of personal information under the PIPL must be the shortest time necessary to achieve the purpose of processing. This time may vary depending on the data processed and any laws or regulations that specify specific periods.</p>
<p><strong>Notification Requirements</strong></p>
<p>Before processing personal information, personal information handlers must inform the data subject of the information being processed and the data subject’s rights concerning this information. For sensitive information, personal information handlers must also notify the data subject of the processing’s necessity.</p>
<p>For any information processed outside of China, a personal information handler must inform the data subject of the overseas recipient, their contact information, and certain processing information such as processing purpose, processing method, and the types of personal information being processed. The personal information handler must also obtain the individual’s specific consent to process after giving notice.</p>
<p><strong>Cross-border Transfer of Information</strong></p>
<p>Before a handler can transfer personal information outside of China, they must first meet one of the following requirements:</p>
<ul>
<li>pass a security assessment organized by the Cyberspace Administration of China (“CAC”), the country’s central internet control agency;</li>
<li>conduct a personal information protection certification;</li>
<li>form a contract with the overseas recipient that stipulates the rights and obligations of both parties, or</li>
<li>meet other conditions required by law, administrative regulations, or the CAC.</li>
</ul>
<p>Further, personal information handlers must ensure that any personal information processing by overseas recipients meets PIPL standards.</p>
<p>Also, operators of “critical information infrastructure” and personal information handlers processing personal information up to an as-of-yet unspecified threshold (which will be prescribed by the national cybersecurity and informatization department) must store the personal information collected and generated within the territory of the People’s Republic of China. This information may not leave China unless it first passes a security assessment organized by the national cybersecurity and informatization department.</p>
<p>Moreover, personal information handlers may not provide personal data stored in China to foreign judicial or law enforcement agencies without first receiving approval from a competent authority within the Chinese government. This requirement will certainly result in conflicts between Chinese authorities and non-Chinese courts as well as plenty of judicial wrangling among litigants in lawsuits involving Chinese companies.</p>
<p><strong>Individual rights</strong></p>
<p>Just like under the GDPR, data subjects in China have various rights concerning their personal information. These include the right to: know and make decisions about their information’s processing; consult and copy their personal information; request that personal information be corrected or supplemented; request deletion (in certain cases); and request the personal information processing rules of personal information handlers.</p>
<p><strong>Obligations of personal information handlers</strong></p>
<p>Personal information handlers must implement internal management systems and security measures to protect personal data. Processors of personal information up to the threshold must appoint a person in charge of personal information protection. Processors outside of China must establish designated agencies or representatives within Chinese territories to handle intra-territorial personal data processing matters.</p>
<p>Personal information handlers must also regularly conduct compliance audits as well as impact assessments for things like processing sensitive personal data, using personal data in automated decision-making, or providing information to other personal information handlers. These impact assessments must be kept for at least 3 years.</p>
<p><strong>Breach notification</strong></p>
<p>If any personal information has been leaked, tampered with, or lost, the personal information handler must immediately notify the relevant departments (the CAC or relevant departments of the State Council) and individuals performing personal information protection duties. In some cases, personal information subjects might also be notified.</p>
<p><strong>Legal Liability and Penalties</strong></p>
<p>The department performing personal information protection duties has the power to order corrections, give warnings, confiscate illegal gains, and issue fines for information processed in violation of the law. Fines can range to up to 1 million yuan for offenders who refuse to make corrections, and between 10,000 and 100,000 yuan for directly responsible persons.</p>
<p>For serious violations, fines can be issued for up to 50 million yuan or up to 5 percent of the processor’s previous year turnover. Furthermore, the department can order the suspension of a business or notify a relevant competent authority to revoke a business permit or license, in addition to issuing additional fines.</p>
<p>Moreover, foreign organizations that violate the personal information rights of Chinese citizens or harm China’s national security or public interests can be blacklisted by the CAC. This also will result in the offending organization being restricted or prohibited from possessing personal information. In addition to everything else, illegal acts will be recorded in the social credit system and publicized.</p>
<p>In some cases, where the rights and interests of many individuals have been infringed, certain entities may file a lawsuit in the people’s court. These entities include the people’s procuratorate, consumer organizations specified in the PIPL, and organizations identified by the CAC.</p>
<p><strong>Exceptions</strong></p>
<p>The law does not apply to natural persons handling personal information for personal or family affairs.</p>
<p><strong>Final Thoughts</strong></p>
<p>We have yet to see exactly how the PIPL will impact the way we conduct business generally, but it is on course to significantly affect companies large and small, both inside and outside of China. If you are doing business in China or with people in China, it may well be worth your while to proactively study up on the law, determine what type of impact it might have on your business, seek legal guidance as necessary, and prepare and implement PIPL-compliant policies and strategies to manage Chinese personal data processed within your organization. A bit of up-front planning can go a long way in giving peace of mind – not to mention helping to avoid costly legal or compliance concerns down the road.</p>
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> to explore the various software and consulting solutions we offer, to address your personal data and privacy needs.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_3 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&amp;linkname=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&amp;linkname=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&amp;linkname=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&#038;title=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" data-a2a-url="https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/" data-a2a-title="Power to the PIPL? A Rundown of China’s New Personal Information Protection Law" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/" data-wpel-link="internal">Power to the PIPL? A Rundown of China’s New Personal Information Protection Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>International Tax Record Roundup</title>
		<link>https://zasio.com/international-tax-record-roundup/</link>
					<comments>https://zasio.com/international-tax-record-roundup/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 04 May 2021 20:58:20 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[recordkeeping]]></category>
		<category><![CDATA[recordkeeping requirements]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[Tax Records]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=543</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/international-tax-record-roundup/" data-wpel-link="internal">International Tax Record Roundup</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">For US taxpayers, May 17 (Tax Day) is fast approaching, and the question is often asked – How long should I keep my tax records?</p>
<p>Here is a brief rundown of required or suggested recordkeeping periods for income tax records in the United States and other jurisdictions around the globe. These time periods do not account for business needs, industry practice, or other legal requirements or exceptions applying to various tax-related records that could potentially increase the required time to keep such records.</p>
<p><strong>United States:</strong></p>
<p>As we have <a href="https://www.zasio.com/tax-season-record-keeping/" target="_blank" rel="noopener" data-wpel-link="internal">previously discussed,</a> the general IRS-suggested records retention period for US citizens starts at three years, and fluctuates to up to seven years (and in some cases, indefinitely), depending on various circumstances and limitation periods.</p>
<p><a href="https://www.irs.gov/businesses/small-businesses-self-employed/how-long-should-i-keep-records#:~:text=Keep%20records%20for%203%20years%20from%20the%20date%20you%20filed,securities%20or%20bad%20debt%20deduction.%20Canada:" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>Canada:</strong></p>
<p>Keep supporting tax documents for six years after the end of the tax year to which they relate.</p>
<p><a href="https://www.canada.ca/en/revenue-agency/services/tax/individuals/topics/about-your-tax-return/long-should-you-keep-your-income-tax-records.html" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>Mexico:</strong></p>
<p>Keep tax and accounting records five years from the date taxes were filed or due.</p>
<p><a href="http://www.diputados.gob.mx/LeyesBiblio/ref/cff.htm" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>United Kingdom:</strong></p>
<p><em>Individuals (not carrying on a business</em>): keep records for 22 months from the end of the tax year to which the records relate.</p>
<p><em>Self-employed or in a partnership</em>: keep records for at least five years from 31 January following the tax year to which the return relates.</p>
<p><em>Companies</em>: typically, accounting records must be kept for six years from the end of the accounting period.</p>
<p><a href="https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/377656/rk-bk1.pdf" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>Japan:</strong></p>
<p><em>Individuals (Under the Income Tax Act</em>): generally need to keep tax records for seven years, but some documents may be stored for five years. Companies also will need to store tax and accounting records for seven years, but the Companies Act requires records to be kept for ten years, regardless of tax law requirements.</p>
<p><a href="https://j-net21.smrj.go.jp/accounts/tax/20140329_04.html%20Brazil:" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>Brazil:</strong></p>
<p>Tax records are to be kept for a general period of five years, which mirrors the standard tax limitation period.</p>
<p><a href="http://www.planalto.gov.br/ccivil_03/_Ato2015-2018/2018/Decreto/D9580.htm" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>Germany:</strong></p>
<p>Generally, taxpayers need to keep accounting and tax-related records for six years (trade or business letters sent or received, other relevant tax-related documents) or ten years (accounting records, inventories, annual financial statements, opening balance sheets, etc.).</p>
<p>Source: <a href="https://www.gesetze-im-internet.de/englisch_ao/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Fiscal Code of Germany  </a></p>
<p><strong>India:</strong></p>
<p>Accounting and tax-related records for people in a variety of professions are to be kept for six years from the end of the relevant assessment year.</p>
<p>Source:<a href="https://incometaxindia.gov.in/Pages/rules/income-tax-rules-1962.aspx" target="_blank" rel="noopener external noreferrer" data-wpel-link="external"> Income Tax Rules, Rule 6F </a></p>
<p><strong>France:</strong></p>
<p>Tax records must be kept for six years, with records of certain transactions to be kept for ten years.</p>
<p><a href="https://www.economie.gouv.fr/entreprises/delai-conservation-documents#" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p><strong>China:</strong></p>
<p>Accounting and tax records need to be kept for ten years, except as otherwise stipulated in other laws or regulations.</p>
<p><a href="http://www.china.org.cn/business/laws_regulations/2007-06/22/content_1214799.htm" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Source</a></p>
<p>It is wise to carefully consider the tax laws, regulations, and recordkeeping requirements in your jurisdiction to make sure you remain legally compliant and prepared for audits or other circumstances requiring access to these records. Proper recordkeeping along with a well-crafted records retention plan helps to avoid possible legal, compliance, or other issues down the road.</p>
<p><a href="https://www.zasio.com/about-us/contact-us/" target="_blank" rel="noopener" data-wpel-link="internal">Contact Zasio</a> today to see how our innovative products and services can meet your recordkeeping and information governance needs.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_4 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Finternational-tax-record-roundup%2F&amp;linkname=International%20Tax%20Record%20Roundup" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Finternational-tax-record-roundup%2F&amp;linkname=International%20Tax%20Record%20Roundup" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Finternational-tax-record-roundup%2F&amp;linkname=International%20Tax%20Record%20Roundup" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Finternational-tax-record-roundup%2F&#038;title=International%20Tax%20Record%20Roundup" data-a2a-url="https://zasio.com/international-tax-record-roundup/" data-a2a-title="International Tax Record Roundup" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/international-tax-record-roundup/" data-wpel-link="internal">International Tax Record Roundup</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/international-tax-record-roundup/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Protection Legislative Updates</title>
		<link>https://zasio.com/data-protection-legislative-updates/</link>
					<comments>https://zasio.com/data-protection-legislative-updates/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 05 Aug 2020 20:40:40 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[Dubai International Financial Centre (DIFC)]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Data Protection Law (LGPD)]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[legislation]]></category>
		<category><![CDATA[Personal Data Protection Act (PDPA)]]></category>
		<category><![CDATA[Personal Data Protection Law (PDPL)]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=700</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/data-protection-legislative-updates/" data-wpel-link="internal">Data Protection Legislative Updates</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Since the GDPR passed in 2018, we have seen an ongoing worldwide ripple effect, as other jurisdictions have begun passing their own data protection laws that mirror, or in many respects comply with GDPR requirements. Here are a few such new or upcoming laws worth noting:</p>
<p>&nbsp;</p>
<p><strong>Brazil – General Data Protection Law (LGPD) (Law No. 13,709/2018)</strong> – Approved in August 2018, the law originally was supposed to take effect on August 15, 2020. However, due to COVID-19 concerns, the majority of the law will not go into effect until May 2021, with the enforcement of sanctions beginning August 1, 2021. Similar in many respects to the GDPR, the LGPD is Brazil’s first comprehensive data protection law bringing clarification and consolidation to data protection requirements spread across a variety of Brazilian laws and regulations. It has the stated purpose of safeguarding “the fundamental rights of freedom and privacy and the free development of the personality of the natural person.”</p>
<p>This law sets forth the rights of data subjects and covers many of the same issues covered in the GDPR, including setting up an enforcement authority and penalties for those who don’t comply.</p>
<p>The LGPD broadly applies to natural persons as well as legal entities (including any public or private business or organization) that process personal data of people in Brazil, even if the processing entity is based outside of Brazil.</p>
<p>Link to the law (English version):  <a href="https://www.lgpdbrasil.com.br/wp-content/uploads/2019/06/LGPD-english-version.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://www.lgpdbrasil.com.br/wp-content/uploads/2019/06/LGPD-english-version.pdf</a></p>
<p>&nbsp;</p>
<p><strong>Dubai International Financial Centre (DIFC</strong>) – <strong>Dubai International Financial Centre (“DIFC”) Data Protection Law No. 5 of 2020:</strong>  In effect on July 1, 2020, this law replaces DIFC Law No. 1 of 2007. Due to COVID-19 considerations, it grants a three-month grace period for companies to start complying by October 1, 2020. This law (and its accompanying regulations) is intended to help make sure the DIFC, which is a major financial hub in the Middle East, Africa, and South Asia, stays up-to-date with data protection best practices. It incorporates various provisions from the GDPR and the CCPA (California Consumer Privacy Act) to achieve this objective. This new law also helps ensure the DIFC has adequate data protection in place to receive “adequacy” recognition from the UK and European Commission, which eases compliance requirements for personal data being transferred to the DIFC.</p>
<p>Among other things the law beefs up the accountability of data controllers and processors, clarifies enhanced rights of individuals, removes permit options for cross-border data transfer and special category personal data processing, allows data sharing between government authorities, and introduces new penalties and fines.</p>
<p>The law applies to companies both incorporated in the DIFC, and those incorporated elsewhere who process personal data in the DIFC as a part of “stable arrangements.”</p>
<p>Link to the enacted law:  <a href="https://www.difc.ae/files/6115/9358/6486/Data_Protection_Law_DIFC_Law_No.5_of_2020.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://www.difc.ae/files/6115/9358/6486/Data_Protection_Law_DIFC_Law_No.5_of_2020.pdf</a></p>
<p>&nbsp;</p>
<p><strong>Egypt – Personal Data Protection Law (“PDPL”): </strong>Passed on July 13, 2020, this law comes into effect on October 14, 2020, with its attached Executive Regulations expected to follow in April 2021. Largely modeled off the GDPR, the PDPL aims to “keep pace with the current international standard for the protection of personal data”, as stated in its preamble. It aims specifically to protect online or electronically processed personal data of persons/consumers. This law is a major development in Egypt’s data protection framework, as prior to its passage, Egypt had no specific legislation regulating the protection of personal data.</p>
<p>Taking cues from the GDPR, the PDPL law introduces a number of compliance requirements and penalty provisions for data processors and controllers, with respect to any personal data or “sensitive” data processed. It prohibits processing personal data except with the consent of the data subject or where otherwise permitted by law. It sets forth various rights of data subjects. It also appoints a data protection authority and implements significant sanctions for non-compliance.</p>
<p>The PDPL applies to Egyptian citizens and non-Egyptian citizens who reside in Egypt.</p>
<p>Link to the law (in Arabic):  <a href="https://www.cc.gov.eg/i/l/404171.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://www.cc.gov.eg/i/l/404171.pdf</a></p>
<p>&nbsp;</p>
<p><strong>Thailand – Personal Data Protection Act (PDPA) B.E. 2562:</strong> This law was passed on May 28, 2019, but has granted deferred compliance for certain data controllers (as enumerated in the Royal Decree on Agencies and Business Not Subject to the PDPA B.E. 2563) until May 31, 2021, giving organizations another year to come into compliance with the law. The law aims to protect data owners (similar to “data subjects” referred to in the GDPR) in Thailand and applies to data processors located both inside and outside of Thailand, that process personal data of individuals in Thailand.</p>
<p>Most provisions in the PDPA are similar to GDPR requirements. It includes various requirements such as setting forth lawful purposes for the processing of personal data, rights of data owners, obligations of data controllers, restrictions on cross border data transfer, breach notification requirements, and penalties for non-compliance. The PDPA also sets up a Personal Data Protection Committee (PDPC) to enforce and provide guidance for the PDPA.</p>
<p>Link to the law:  <a href="https://www.etda.or.th/app/webroot/content_files/13/files/The%20Personal%20Data%20Protection%20Act.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://www.etda.or.th/app/webroot/content_files/13/files/The%20Personal%20Data%20Protection%20Act.pdf</a></p>
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> today to see how our host of software solutions and consulting services can help you stay compliant with your data retention policies and practices.</p>
<div><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_5 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fdata-protection-legislative-updates%2F&amp;linkname=Data%20Protection%20Legislative%20Updates" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fdata-protection-legislative-updates%2F&amp;linkname=Data%20Protection%20Legislative%20Updates" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fdata-protection-legislative-updates%2F&amp;linkname=Data%20Protection%20Legislative%20Updates" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fdata-protection-legislative-updates%2F&#038;title=Data%20Protection%20Legislative%20Updates" data-a2a-url="https://zasio.com/data-protection-legislative-updates/" data-a2a-title="Data Protection Legislative Updates" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/data-protection-legislative-updates/" data-wpel-link="internal">Data Protection Legislative Updates</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/data-protection-legislative-updates/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Pandemics and Personal Data</title>
		<link>https://zasio.com/pandemics-and-personal-data/</link>
					<comments>https://zasio.com/pandemics-and-personal-data/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 19:14:05 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[contact tracing]]></category>
		<category><![CDATA[Coronavirus]]></category>
		<category><![CDATA[COVID-19]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[health data]]></category>
		<category><![CDATA[HIPPA]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[pandemic]]></category>
		<category><![CDATA[personal data]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=731</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/pandemics-and-personal-data/" data-wpel-link="internal">Pandemics and Personal Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">In light of the COVID-19 (coronavirus) viral disease <a href="https://www.who.int/dg/speeches/detail/who-director-general-s-opening-remarks-at-the-media-briefing-on-covid-19---11-march-2020" data-wpel-link="external" rel="external noopener noreferrer">officially being classified as a pandemic</a>, nations around the world are grappling with how to best manage and prevent further spreading of the disease. One such measure we see being taken, especially in early stages of the fight, is <a href="https://www.who.int/features/qa/contact-tracing/en/" data-wpel-link="external" rel="external noopener noreferrer">contact tracing</a>, where persons infected with the virus and those they have been in contact with are closely monitored, to help predict and prevent further transmission of the disease.</p>
<p>While contact tracing can be vital to helping control the spread of a disease, it can also raise significant personal data concerns. During this process, information is gathered and potentially shared amongst employers, health officials and government agencies. This might include information such as a person’s health data, address, family members, employment details, travel schedules, and even personal contacts. To what extent can this personal information be gathered? Is consent required? How long will it be kept? What rights and protections does an individual have regarding such data that has been collected?</p>
<p>As things currently stand, here is a snapshot of how several governments are dealing with data protection concerns with respect to COVID-19 data gathering:</p>
<p><strong>European Union</strong></p>
<p>Generally, members of the EU are required to comply with the <a href="https://gdpr-info.eu/" data-wpel-link="external" rel="external noopener noreferrer">GDPR</a>. However, <a href="https://gdpr-info.eu/art-6-gdpr/" data-wpel-link="external" rel="external noopener noreferrer">Article 6</a> of the law allows for processing of data without consent in special cases, including cases where “processing is necessary for the performance of a task carried out in the public interest…” <a href="https://gdpr-info.eu/art-9-gdpr/" data-wpel-link="external" rel="external noopener noreferrer">Article 9</a> prohibits processing of many categories of personal data (such as race, ethnicity, genetic and health) unless a specific exception is met. One such exception is when processing is “necessary for reasons of public interest in the area of public health, such as protecting against serious cross-border threats to health…”</p>
<p>As COVID-19 and GDPR priorities begin to intersect, we are starting to see data protection authorities in EU countries issue data processing guidance and even pass emergency measures allowing for data processing by governmental personnel in order to track and combat the disease.</p>
<p>Italy’s civil protection department passed <a href="http://www.protezionecivile.gov.it/amministrazione-trasparente/provvedimenti/dettaglio/-/asset_publisher/default/content/ocdpc-n-630-del-3-febbraio-2020-primi-interventi-urgenti-di-protezione-civile-in-relazione-all-emergenza-relativa-al-rischio-sanitario-connesso-all-in" data-wpel-link="external" rel="external noopener noreferrer">Decree 630 of 3 February 2020</a>, (these provisions also being included in <a href="https://www.gazzettaufficiale.it/eli/id/2020/03/09/20G00030/SG" data-wpel-link="external" rel="external noopener noreferrer">Decree-Law 14 of 9 March 2020</a>) which essentially suspends certain data protection rights in order for various entities to process personal data in carrying out civil protection activities to fight the disease. This is effective until July 30, 2020, unless otherwise provided for.</p>
<p>France’s CNIL issued <a href="https://www.cnil.fr/fr/coronavirus-covid-19-les-rappels-de-la-cnil-sur-la-collecte-de-donnees-personnelles" data-wpel-link="external" rel="external noopener noreferrer">guidance</a> outlining what organizations and employers can and can’t do, with respect to processing personal data during the coronavirus crisis .</p>
<p>Ireland’s Data Protection Commission issued <a href="https://dataprotection.ie/en/news-media/blogs/data-protection-and-covid-19" data-wpel-link="external" rel="external noopener noreferrer">supervisory guidance</a> on March 6, outlining rights and obligations of personal data processing by governments and organizations (including employers) during the crisis.</p>
<p>In Denmark, the DPA published brief <a href="https://www.datatilsynet.dk/presse-og-nyheder/nyhedsarkiv/2020/mar/hvordan-er-det-med-gdpr-og-coronavirus/" data-wpel-link="external" rel="external noopener noreferrer">guidance</a> on personal data that is justifiable for employers to collect and share, in connection with the coronavirus.</p>
<p><strong>China</strong></p>
<p>To help protect personal data during the coronavirus outbreak, The National Health Commission of China and the PRC Cyberspace Administration of China (CAC) have issued notices and <a href="http://www.cac.gov.cn/2020-02/09/c_1582791585580220.htm" data-wpel-link="external" rel="external noopener noreferrer">circulars</a> providing guidance and outlining requirements with respect to the collection and management of personal data. Among other things, the guidance emphasizes the importance of protecting personal data according to Chinese laws and regulations, and it discusses parameters for collecting data pursuant to epidemic prevention and mitigation efforts.</p>
<p><strong>Singapore</strong></p>
<p>The Personal Data Protection commission issued an <a href="https://www.pdpc.gov.sg/Advisory-on-CUD-for-COVID-19" data-wpel-link="external" rel="external noopener noreferrer">advisory</a> concerning personal data that organizations may collect without consent for purposes of COVID-19 contact tracing.</p>
<p><strong>United States</strong></p>
<p>Currently there is no comprehensive federal-level data protection law, but there are several federal and state laws that address data privacy and protection. With the COVID-19 situation continuing to evolve, we are seeing <a href="https://www.hhs.gov/sites/default/files/february-2020-hipaa-and-novel-coronavirus.pdf" data-wpel-link="external" rel="external noopener noreferrer">bulletins</a>, <a href="https://www.hhs.gov/sites/default/files/hipaa-and-covid-19-limited-hipaa-waiver-bulletin-508.pdf" data-wpel-link="external" rel="external noopener noreferrer">waivers</a>, and other documents and notices being released at the federal level, addressing issues of HIPAA privacy and the coronavirus.</p>
<p>As the COVID-19 situation continues to roll out, it will be interesting to see how governments handle the balance between persona data rights and public need to access and use such data to mitigate large-scale health crises such as pandemics.</p>
<p>Bringing this down to a company level – at all times, and especially in times of widespread public health emergencies when it is possible if not likely that personal data might be processed or shared, it is important for businesses to understand their jurisdictional data protection laws and rules. Also crucial is the need for companies to be forthwith and transparent with their clients and employees about what, when, and how personal or sensitive data is being processed. A robust information governance program that is already in place can significantly help in these efforts.</p>
<p>For your current information governance and data compliance needs, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a> today.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_6 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fpandemics-and-personal-data%2F&amp;linkname=Pandemics%20and%20Personal%20Data" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fpandemics-and-personal-data%2F&amp;linkname=Pandemics%20and%20Personal%20Data" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fpandemics-and-personal-data%2F&amp;linkname=Pandemics%20and%20Personal%20Data" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fpandemics-and-personal-data%2F&#038;title=Pandemics%20and%20Personal%20Data" data-a2a-url="https://zasio.com/pandemics-and-personal-data/" data-a2a-title="Pandemics and Personal Data" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/pandemics-and-personal-data/" data-wpel-link="internal">Pandemics and Personal Data</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/pandemics-and-personal-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Molecular-Based Data Storage</title>
		<link>https://zasio.com/molecular-based-data-storage/</link>
					<comments>https://zasio.com/molecular-based-data-storage/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 04 Oct 2019 20:12:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[data storage]]></category>
		<category><![CDATA[DNA storage]]></category>
		<category><![CDATA[emerging technology]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[metabolite data storage]]></category>
		<category><![CDATA[metabolites]]></category>
		<category><![CDATA[Molecular-based data storage]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=765</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/molecular-based-data-storage/" data-wpel-link="internal">Molecular-Based Data Storage</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">As technology continues to advance at a dizzying pace in nearly every aspect of our lives, this holds true for data storage solutions as well. Coming down the pipeline are some big (or, more accurately – minuscule) and exciting developments in the ways we store our digital data!</p>
<p><strong>DNA storage</strong></p>
<p>In a prior post, we <a href="https://www.zasio.com/dna-based-storage-the-future-of-data-archiving/" data-wpel-link="internal">discussed the fascinating possibilities of storing data on strands of DNA</a>. The basic rundown of the process involves digital data being chopped up and stored as synthetic DNA molecules in sequenced strands. These strands are synthesized into actual DNA, which can be preserved for long periods of time (potentially thousands, or even a million years). DNA sequences are encoded with location markers for the data, allowing one to later reorder, convert and retrieve the data from the pool of stored DNA.</p>
<p>While the ability to realistically use this technology is perhaps years away, it is not science fiction, and scientists <a href="https://www.scientificamerican.com/article/dna-data-storage-is-closer-than-you-think/" data-wpel-link="external" rel="external noopener noreferrer">currently are developing and advancing the technology</a>.</p>
<p><strong>Metabolite data storage</strong></p>
<p>DNA isn’t the only thing competing to replace hard drives, however. Let’s get even more microscopic! Even smaller and simpler molecules, known as metabolites, have shown the ability to store and allow for extraction of digital data. Metabolites are sugars, amino acids, and other molecules used by people and other living things to metabolize, or digest food. The idea is that these molecules are significantly smaller than DNA strands and with a large variety of such molecules, they can represent small amounts of data in a denser way than DNA. The presence or absence of certain metabolites in a mixture would act as binary 1s and 0s, allowing one to encode various types of data.</p>
<p>This was demonstrated recently by a research team from Brown University, who <a href="https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0217364" data-wpel-link="external" rel="external noopener noreferrer">successfully stored and retrieved pictures of an anchor, an Egyptian cat, and an ibex, using solutions containing 6 different metabolites.</a> After encoding the pictures using the binary process of utilizing the presence or absence of the metabolites in the solutions, the team was then able to reconstruct the data with close to 100% accuracy.</p>
<p>While use of this technology, like DNA storage, is still in its infancy, it holds huge potential. Similar to DNA storage, metabolite or molecular storage allows data to be stored for potentially long periods of time, in a stable format. Data would be more secure from threats such as data breaches or environmental disasters, as it could be stored offline rather than in the cloud, and the molecules would be more resistant to extreme physical forces (such as temperature or pressure) than current data storage technology.</p>
<p>Aside from metabolites, <a href="https://pubs.acs.org/doi/10.1021/acscentsci.9b00210" data-wpel-link="external" rel="external noopener noreferrer">similar molecular data storage research is being done using peptides</a> (short chains of amino acids), with encouraging results.</p>
<p>These emerging technologies point to an intriguing future for data storage. It will be interesting to see what technologies develop the quickest for feasible consumer use, and how long it will take us to get there.</p>
<p>For your current information governance and data compliance needs, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a> today.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_7 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fmolecular-based-data-storage%2F&amp;linkname=Molecular-Based%20Data%20Storage" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fmolecular-based-data-storage%2F&amp;linkname=Molecular-Based%20Data%20Storage" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fmolecular-based-data-storage%2F&amp;linkname=Molecular-Based%20Data%20Storage" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fmolecular-based-data-storage%2F&#038;title=Molecular-Based%20Data%20Storage" data-a2a-url="https://zasio.com/molecular-based-data-storage/" data-a2a-title="Molecular-Based Data Storage" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/molecular-based-data-storage/" data-wpel-link="internal">Molecular-Based Data Storage</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/molecular-based-data-storage/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Leveraging Google for More Effective Legal Research</title>
		<link>https://zasio.com/leveraging-google-for-more-effective-legal-research/</link>
					<comments>https://zasio.com/leveraging-google-for-more-effective-legal-research/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 30 May 2019 21:19:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[advanced search operators]]></category>
		<category><![CDATA[chrome]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[google search]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[legal research]]></category>
		<category><![CDATA[Research]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=789</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/leveraging-google-for-more-effective-legal-research/" data-wpel-link="internal">Leveraging Google for More Effective Legal Research</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Need to do some legal research? Are you having trouble locating a specific requirement, page or article on a website? Here are a couple of ways to leverage Google and its tools to make your life easier and your research more effective:</p>
<p><strong>Use advanced search operators</strong></p>
<p>We all know and have used Google to search for things, and by-and-large, it is a powerful and sophisticated search engine that gets the job done. If you want to take your searches to the next level, however, it is all about “search operators.” Search operators are special characters or commands used in a search query to expand on simple text searches. Depending on the operators used, search results can be streamlined, focused and limited in many ways. For our purposes, let’s focus on one such search operator – the “site” operator.</p>
<p>Say you are looking for specific data retention requirements or hard-to-find information on a particular website. Maybe you aren’t getting good results using the website’s search function, or, heaven forbid, the website doesn’t even have a built-in search function! Time to put Google’s search engine to work, using the “site” operator.</p>
<p>On the main Google search page, type in your search term, followed by a space, and then type <em>site:website URL</em> (or a URL file path, if you want to search in a more specific area of the website).</p>
<p>So, for example, you are on Zasio’s website and are searching for certain information mentioning the term “GDPR.” On Google, type the following: <em>gdpr site:https://zasio.com</em></p>
<p>Or if you are searching for pages containing an exact phrase, such as “GDPR compliance,” type: <em>“gdpr compliance” site:www.zasio.com</em></p>
<p>The results will pull up all found pages with the term “GDPR” (or “GDPR compliance” as the case may be) from the specified website (in this case – https://zasio.com), helping you to better locate what you are looking for, without having to wade through thousands of results on unrelated websites.</p>
<p>Also, as you can see, adding quotes around a phrase or grouping of words forces an exact search for that specific phrase or snippet of text. This holds true for any general Google searching, regardless of whether advanced search operators are used or not.</p>
<p>There are <a href="https://booleanstrings.com/2018/03/08/the-full-list-of-google-advanced-search-operators/" target="_blank" rel="noopener noreferrer external" data-wpel-link="external"><u>many other search operators</u></a> and other <a href="https://www.themuse.com/advice/these-google-search-hacks-are-going-to-change-your-life-or-at-the-very-least-make-it-easier" target="_blank" rel="noopener noreferrer external" data-wpel-link="external"><u>search hacks</u></a> that can be used in Google, to help you expand your search abilities and narrow your search results in a variety of ways.</p>
<p><strong>Use web browser extensions</strong></p>
<p>Browser extensions or “add-ons” are small pieces of software that attach to and customize a web browser, giving it additional capabilities and features. There are thousands of extensions (many free) that accomplish all sorts of things, but here we will focus on the Pearls extension.</p>
<p><u>Pearls extension</u><strong>—</strong>The Pearls extension is available as a <a href="https://chrome.google.com/webstore/detail/pearls-extension/mccffpojdcohdkefnbfhfdcklpcagdlc?hl=en" target="_blank" rel="noopener noreferrer external" data-wpel-link="external"><u>free extension for the Chrome web browser</u></a>. Essentially, this tool automatically highlights pre-defined search terms on a webpage. While you can always manually perform keyword searches one-at-a-time using CTRL+F, with this extension a webpage will automatically highlight your pre-selected terms, without you needing to do anything. This saves a lot of time searching through a large law, regulation, or web page, as you can quickly hone in visually on the pertinent or desired information. This tool allows you to save lists of search terms for both specific web pages and generally. It works best for HTML-based pages but does not currently work on pdf documents. Chrome, as well as Firefox, has a variety of similar and additional search tool-related add-ons, that might prove useful in your web search efforts.</p>
<p>We have just scratched the surface of Google’s capabilities, but these tips are a great starting point to help you more effectively use Google to your advantage. For further solutions regarding your legal research, information governance and data compliance needs, <a href="https://www.zasio.com/about-us/contact-us/" target="_blank" rel="noopener noreferrer" data-wpel-link="internal"><u>contact Zasio</u></a> today.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_8 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fleveraging-google-for-more-effective-legal-research%2F&amp;linkname=Leveraging%20Google%20for%20More%20Effective%20Legal%20Research" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fleveraging-google-for-more-effective-legal-research%2F&amp;linkname=Leveraging%20Google%20for%20More%20Effective%20Legal%20Research" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fleveraging-google-for-more-effective-legal-research%2F&amp;linkname=Leveraging%20Google%20for%20More%20Effective%20Legal%20Research" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fleveraging-google-for-more-effective-legal-research%2F&#038;title=Leveraging%20Google%20for%20More%20Effective%20Legal%20Research" data-a2a-url="https://zasio.com/leveraging-google-for-more-effective-legal-research/" data-a2a-title="Leveraging Google for More Effective Legal Research" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/leveraging-google-for-more-effective-legal-research/" data-wpel-link="internal">Leveraging Google for More Effective Legal Research</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/leveraging-google-for-more-effective-legal-research/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>5 Tips for a More Secure Password</title>
		<link>https://zasio.com/5-tips-secure-password/</link>
					<comments>https://zasio.com/5-tips-secure-password/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 29 Nov 2017 21:58:57 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[multi-factor authentication]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[password manager]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[security breach]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=968</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/5-tips-secure-password/" data-wpel-link="internal">5 Tips for a More Secure Password</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">We are in an age of unprecedented digital technology and connectivity. As a result, businesses face an ever-increasing risk of cyber-attacks and security breaches. Just glance at the news to see how frequently such incidents occur. These attacks and breaches can be extremely costly and debilitate a business’s vitality and reputation. One of the most commonly exploited areas of a security system is the password. Attacks on passwords can occur physically on-site or through online brute-force attacks.</p>
<p>Consider the following five points to create and maintain a more secure password:</p>
<ul>
<li><strong>Keep it long</strong>: The length of a password is much more important than its complexity. A lengthy password takes much longer to crack than a shorter one, even if a short password has complex characters. Experts suggest a <a href="https://www.wired.com/2016/05/password-tips-experts/" data-wpel-link="external" rel="external noopener noreferrer">minimum length of between 12 to 15 characters</a>. Avoid single words. It may help to use a phrase or sentence to reach a beneficial length.</li>
<li><strong>Add some complexity:</strong> While length is key, adding complexity to your password (such as uppercase letters, numbers, dashes, spaces, and other special characters) will strengthen it. Complexity adds an additional obstacle for would-be hackers. Hackers look for simple words, phrases, and patterns. As noted above, consider using a pass-phrase instead of a word. This adds to both the complexity of the password and your ability to remember it.</li>
<li><strong>Make it unique:</strong> Don’t use personal data, general details about your life, or any information that could be reasonably guessed in your passwords. Avoid common words and phrases, such as common dictionary words, sequential letters or numbers, the word “password,” etc. As a general rule, stay away from <a href="https://en.wikipedia.org/wiki/List_of_the_most_common_passwords" data-wpel-link="external" rel="external noopener noreferrer">these commonly used passwords</a>.</li>
<li><strong>Switch it up:</strong> Don’t use the same password for every account/login point. If you use multiple passwords, make sure your passwords are sufficiently different from each other. While there is debate as to <a href="https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes" data-wpel-link="external" rel="external noopener noreferrer">how often you should change a password</a> (especially in the case of a strong/complex password), consider changing it periodically, or as directed by your IT manager. Consider changing it if you suspect that your password is compromised, if you use the same password on multiple accounts, if you use a shared password, if your password seems weak, or you just feel it’s time to change it.</li>
<li><strong>Store it securely:</strong> Consider using a password manager program or app to store or manage your passwords—especially if you use multiple or complex passwords. Avoid writing down your passwords. For an extra layer of security, you might also look for multi-factor authentication.</li>
</ul>
<p>Creating a strong password is just the start of securing your information against data intrusions and cyber-attacks. Depending on the needs of your organization, you should implement sound data protection procedures and policies as part of your information governance program to better protect yourself and your business.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_9 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2F5-tips-secure-password%2F&amp;linkname=5%20Tips%20for%20a%20More%20Secure%20Password" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2F5-tips-secure-password%2F&amp;linkname=5%20Tips%20for%20a%20More%20Secure%20Password" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2F5-tips-secure-password%2F&amp;linkname=5%20Tips%20for%20a%20More%20Secure%20Password" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2F5-tips-secure-password%2F&#038;title=5%20Tips%20for%20a%20More%20Secure%20Password" data-a2a-url="https://zasio.com/5-tips-secure-password/" data-a2a-title="5 Tips for a More Secure Password" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/5-tips-secure-password/" data-wpel-link="internal">5 Tips for a More Secure Password</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/5-tips-secure-password/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
