<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>compliance Archives - Zasio</title>
	<atom:link href="https://zasio.com/tag/compliance/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/tag/compliance/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Wed, 25 Feb 2026 23:51:26 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>compliance Archives - Zasio</title>
	<link>https://zasio.com/tag/compliance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations</title>
		<link>https://zasio.com/information-management-cybersecurity-lessons/</link>
					<comments>https://zasio.com/information-management-cybersecurity-lessons/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 05 Jan 2026 18:32:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Laura Ames]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=7601</guid>

					<description><![CDATA[<p>As cyber threats grow more sophisticated, businesses face mounting pressure to protect sensitive data and comply with evolving regulations. In examining New York’s response, we can identify some of the challenges in adopting rigorous information management cybersecurity policies as well as the importance of doing so. Information Management Cyber Attacks on the Rise and Legislative Responses Cyber-attacks have grown increasingly frequent and severe in recent years. The landscape of modern business includes rising numbers of employees working remotely and ever more reliance on e-commerce. These facts introduce more opportunities for cyber-attacks. In addition, perpetrators of these attacks have an increasing number of sophisticated tools at their disposal including AI-assisted technologies. These data breaches come with numerous consequences for businesses from reputational harm to financial losses. According to a study performed by IBM, data breaches cost companies an average of $4.9 million worldwide and nearly double that figure in the United States. In response to these threats numerous jurisdictions across the world have introduced legislation dealing with data security. In the U.S. alone, 49 states have introduced over 800 bills dealing with cybersecurity with more than 200 of these bills going on to be adopted. In particular, New York’s amendments to [&#8230;]</p>
<p>The post <a href="https://zasio.com/information-management-cybersecurity-lessons/" data-wpel-link="internal">Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As cyber threats grow more sophisticated, businesses face mounting pressure to protect sensitive data and comply with evolving regulations. In examining New York’s response, we can identify some of the challenges in adopting rigorous information management cybersecurity policies as well as the importance of doing so.</p>
<h4>Information Management Cyber Attacks on the Rise and Legislative Responses</h4>
<p>Cyber-attacks have grown increasingly frequent and severe in recent years. The landscape of modern business includes rising numbers of employees working remotely and ever more reliance on e-commerce. These facts introduce more opportunities for cyber-attacks. In addition, perpetrators of these attacks have an increasing number of sophisticated tools at their disposal including AI-assisted technologies. These data breaches come with numerous consequences for businesses from reputational harm to financial losses. According to a <a href="https://news.bloomberglaw.com/ip-law/cybersecurity-breaches-are-increasing-business-insolvency-risks" data-wpel-link="external" rel="external noopener noreferrer">study performed by IBM</a>, data breaches cost companies an average of $4.9 million worldwide and nearly double that figure in the United States.</p>
<p>In response to these threats numerous jurisdictions across the world have introduced legislation dealing with data security. In the U.S. alone, <a href="https://www.ncsl.org/technology-and-communication/cybersecurity-2025-legislation" data-wpel-link="external" rel="external noopener noreferrer">49 states</a> have introduced over 800 bills dealing with cybersecurity with more than 200 of these bills going on to be adopted. In particular, New York’s amendments to its regulations regarding cyber security recently came into effect.</p>
<h4>What do New York’s Information Management Cybersecurity Regulations Require?</h4>
<p>New York’s 23 NYCRR Part 500 applies to entities regulated by the state’s Banking, Insurance and Financial Services laws. The latest amendments became effective on November 1 and introduced robust cybersecurity measures:</p>
<ul>
<li>Annual risk assessments and compliance certifications</li>
<li>Written cybersecurity policies</li>
<li>Access privilege controls</li>
<li>Mandatory multifactor authentication for external network access</li>
<li>Asset inventory programs to track all information system assets</li>
<li>Secure disposal of nonpublic information when no longer necessary for business operations</li>
</ul>
<h4>Potential Challenges of Compliance</h4>
<p>These requirements ensure robust security and accurate tracking of information throughout its lifecycle, safeguarding data and retaining it for the appropriate duration. To comply with these requirements, businesses must not only adopt rigorous security measures but also have knowledge of what information the business has in its systems and where it is being stored. It also requires identifying all applications and information systems that store, transfer or process information including those of third-party vendors.</p>
<p>Even businesses not subject to New York’s Part 500 can adopt proactive measures to achieve best information management cybersecurity practices and avoid risk. Implementing access controls such as strong passwords and multifactor authentication is critical to preventing unauthorized access. Beyond technical solutions, ensuring that employees receive adequate phishing and cybersecurity awareness training helps strengthen an organization&#8217;s first line of defense against threats. Finally, businesses must create an incident response plan to ensure business continuity and recovery if the worst-case scenario does happen.</p>
<h4>Final Thoughts</h4>
<p>With cyber risks increasing in number and ranging from attempts to phish individuals to advanced ransomware attacks, <a href="https://zasio.com/records-and-information-management-information-security-two-risk-mitigation-peas-in-an-information-governance-pod/" data-wpel-link="internal">cybersecurity for records and information management</a> has become a business necessity.  However, these policies and procedures can be difficult to implement with existing information systems. Beyond adopting technical controls, businesses must have complete comprehension into what data it holds, where that data resides, and what applications process it. By adopting these measures businesses ensure <a href="https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/" data-wpel-link="internal">compliance</a> with regulations, reduced cyber risks, and greater consumer confidence in cybersecurity standards.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&amp;linkname=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&amp;linkname=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&amp;linkname=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Finformation-management-cybersecurity-lessons%2F&#038;title=Adapting%20to%20Rising%20Cyber%20Threats%3A%20Lessons%20from%20New%20York%E2%80%99s%20Latest%20Regulations" data-a2a-url="https://zasio.com/information-management-cybersecurity-lessons/" data-a2a-title="Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/information-management-cybersecurity-lessons/" data-wpel-link="internal">Adapting to Rising Cyber Threats: Lessons from New York’s Latest Regulations</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/information-management-cybersecurity-lessons/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What’s Next for RIM and IG? Zasio Experts Share 2026 Trends &#038; Predictions</title>
		<link>https://zasio.com/records-management-trends-2026/</link>
					<comments>https://zasio.com/records-management-trends-2026/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 02 Jan 2026 14:06:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Zasio Staff]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[IG]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[RIM]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=7774</guid>

					<description><![CDATA[<p>The information governance and records management landscape is, not surprisingly, evolving at an unprecedented pace. Organizations are navigating new challenges in data privacy, compliance, and emerging technologies, all while striving to stay efficient and secure. From AI-driven automation to the growing demand for defensible disposition and digital preservation, the coming year promises big shifts in how businesses manage information. In this blog, Zasio’s experts share their predictions for 2026. Jennifer Chadband — Senior Consultant, CRM, IGP, CIPP/E, Licensed Attorney Records and information software will continue to build momentum towards simpler, more connected ways of working. Evolving technology and tools that automate filing and disposal will make it easier than ever to manage information, freeing teams to focus on higher‑value work. A growing sense of urgency will also accelerate a big shift already underway: viewing records not merely as compliance requirements, but as resources to organize and use to improve decision‑making. In 2026, this familiar goal will be more vital than ever: build programs that are easy to follow, reduce wasted effort, and maximize the value of the information organizations already possess. Will Fletcher, General Counsel, CIPP/US/E, IGP RIM and IG professionals will intensify their focus on capturing and retaining “records of compliance” [&#8230;]</p>
<p>The post <a href="https://zasio.com/records-management-trends-2026/" data-wpel-link="internal">What’s Next for RIM and IG? Zasio Experts Share 2026 Trends &#038; Predictions</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The information governance and records management landscape is, not surprisingly, evolving at an unprecedented pace. Organizations are navigating new challenges in data privacy, compliance, and emerging technologies, all while striving to stay efficient and secure.</p>
<p>From AI-driven automation to the growing demand for defensible disposition and digital preservation, the coming year promises big shifts in how businesses manage information.</p>
<p>In this blog, Zasio’s experts share their predictions for 2026.</p>
<h3><a href="https://zasio.com/dt_team-jennifer-chadband-consulting/" data-wpel-link="internal">Jennifer Chadband</a> — Senior Consultant, CRM, IGP, CIPP/E, Licensed Attorney</h3>
<p><a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">Records and information software</a> will continue to build momentum towards simpler, more connected ways of working. Evolving technology and tools that automate filing and disposal will make it easier than ever to manage information, freeing teams to focus on higher‑value work. A growing sense of urgency will also accelerate a big shift already underway: viewing records not merely as compliance requirements, but as resources to organize and use to improve decision‑making.</p>
<p>In 2026, this familiar goal will be more vital than ever: build programs that are easy to follow, reduce wasted effort, and maximize the value of the information organizations already possess.</p>
<h3><a href="https://zasio.com/dt_team-will-fletcher/" data-wpel-link="internal">Will Fletcher</a>, General Counsel, CIPP/US/E, IGP</h3>
<p>RIM and IG professionals will intensify their focus on capturing and retaining “records of compliance” across the increasingly complex landscape of data privacy and AI regulations.</p>
<p>For data privacy, critical records of compliance include transfer impact assessments, data protection impact assessments, and evidence of DSAR compliance. For AI, they include AI impact assessments, AI architecture documentation, retention and deletion logs for AI inputs and outputs, and the policies and standards that comprise an organization’s responsible AI governance program.</p>
<p>Organizations relying on digital systems and automation must also ensure these systems can produce record outputs on demand, and preserve them for as long as necessary, whether for regulatory investigations or legal defense.</p>
<h3><a href="https://www.linkedin.com/in/warren-bean-crm-cism-63780a6" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Warren Bean</a> — VP Technology &amp; Product Development, CRM, CISM</h3>
<ul>
<li>AI agents will require management similar to human users to control identity and access management. This includes which agents can access specific data repositories, what actions they can perform, and how to verify their authenticity.</li>
<li>Governance frameworks will expand to include human oversight of AI systems and validation of LLMs and inference outcomes.</li>
<li>Archivists will have to rethink the concept of ‘provenance’—the history of records and information, including their movements and transformations–-in light of AI deepfakes.</li>
</ul>
<h3><a href="https://zasio.com/dt_team-rick-surber-consulting/" data-wpel-link="internal">Rick Surber</a>, Senior Consultant, CRM, IGP, Licensed Attorney</h3>
<p>As AI growth accelerates in 2026, phishing and other information security intrusions will become more convincing and successful. This will cause data breaches to become more common as attackers use AI to automate social engineering and scale their efforts. In response, solid information governance will matter more than ever.</p>
<p>Clear retention rules, continuity planning, strong information security practices, and well-defined response processes will be essential—not to prevent every incident, but to limit impact, speed recovery, and prevent disruptions from escalating into expensive, long-lasting problems.</p>
<h3><a href="https://www.linkedin.com/in/stephanie-martin-6116265" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Stephanie Martin</a>, Vice President of Product Management &amp; Support</h3>
<p>Privacy, security, cost, and accuracy concerns will continue to slow adoption of new AI agents, especially for smaller organizations. Large infrastructure costs and regulatory demands without parallel profits will likely accelerate the price of AI services. However, the benefits of AI will be limited if records lack quality, consistent metadata, or proper organization, making data hygiene a prerequisite for success. Accordingly, successful records management will still depend on record quality.</p>
<h3>Navigating the Future of Records &amp; Information Management in 2026</h3>
<p>Preparing for 2026 requires a strategic alignment of policy, security, and high-quality metadata. Zasio’s enterprise-grade <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">records management software</a> is specifically designed to handle these complexities, offering the automation and defensible disposition tools necessary to stay ahead of the curve.</p>
<p><a href="https://zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio today</a> to learn how our experts and technology can help you audit and optimize your RIM program for the future.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-trends-2026%2F&amp;linkname=What%E2%80%99s%20Next%20for%20RIM%20and%20IG%3F%20Zasio%20Experts%20Share%202026%20Trends%20%26%20Predictions" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-trends-2026%2F&amp;linkname=What%E2%80%99s%20Next%20for%20RIM%20and%20IG%3F%20Zasio%20Experts%20Share%202026%20Trends%20%26%20Predictions" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-trends-2026%2F&amp;linkname=What%E2%80%99s%20Next%20for%20RIM%20and%20IG%3F%20Zasio%20Experts%20Share%202026%20Trends%20%26%20Predictions" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Frecords-management-trends-2026%2F&#038;title=What%E2%80%99s%20Next%20for%20RIM%20and%20IG%3F%20Zasio%20Experts%20Share%202026%20Trends%20%26%20Predictions" data-a2a-url="https://zasio.com/records-management-trends-2026/" data-a2a-title="What’s Next for RIM and IG? Zasio Experts Share 2026 Trends &amp; Predictions" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/records-management-trends-2026/" data-wpel-link="internal">What’s Next for RIM and IG? Zasio Experts Share 2026 Trends &#038; Predictions</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/records-management-trends-2026/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Psychology of Change: Why Employees Resist RIM—And How to Overcome It</title>
		<link>https://zasio.com/employees-risisting-change-rim/</link>
					<comments>https://zasio.com/employees-risisting-change-rim/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 31 Oct 2025 14:41:22 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Brandon Tuley]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[RIM]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=7417</guid>

					<description><![CDATA[<p>In today’s fast-paced digital landscape, organizations rely on records and information management (RIM) solutions to enhance compliance, protect data, and boost efficiency. Yet, despite these advantages, employee resistance remains common. Fortunately, with strategic change management, clear communication, and ongoing engagement, organizations can address this resistance. Understanding the Root Cause of RIM Pushback Employee pushback often stems from three factors: limited awareness, fear of change, and concerns about added workload. Many employees don’t grasp the strategic importance of RIM, particularly in compliance, risk reduction, cost savings, and efficiency. Because RIM touches every department, employees often view it as an IT or legal responsibility rather than a shared organizational responsibility. Changes to established workflows can also create discomfort and a sense of lost control. Employees may view RIM as an administrative burden without immediate benefit. Misconceptions grow when employees misunderstand the time and effort needed to classify, store, or dispose of records. While implementation can feel cumbersome, most RIM processes become streamlined or automated, reducing manual effort over time. Strategies to Overcome Resistance Overcome resistance to RIM starts with communicating its value, early stakeholder involvement, small steps, and adaptability. Communicate the Value: Employees support RIM when they understand its impact. Share real-world [&#8230;]</p>
<p>The post <a href="https://zasio.com/employees-risisting-change-rim/" data-wpel-link="internal">Psychology of Change: Why Employees Resist RIM—And How to Overcome It</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today’s fast-paced digital landscape, organizations rely on <a href="https://zasio.com/" data-wpel-link="internal">records and information management (RIM) solutions</a> to enhance compliance, protect data, and boost efficiency. Yet, despite these advantages, employee resistance remains common. Fortunately, with strategic change management, clear communication, and ongoing engagement, organizations can address this resistance.</p>
<h2>Understanding the Root Cause of RIM Pushback</h2>
<p><a href="https://pmc.ncbi.nlm.nih.gov/articles/PMC8365138/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Employee pushback</a> often stems from three factors: limited awareness, fear of change, and concerns about added workload. Many employees don’t grasp the strategic importance of RIM, particularly in compliance, risk reduction, cost savings, and efficiency. Because RIM touches every department, employees often view it as an IT or legal responsibility rather than a shared organizational responsibility.</p>
<p>Changes to established workflows can also create discomfort and a sense of lost control. Employees may view RIM as an administrative burden without immediate benefit. Misconceptions grow when employees misunderstand the time and effort needed to classify, store, or dispose of records. While implementation can feel cumbersome, most RIM processes become streamlined or automated, reducing manual effort over time.</p>
<h3>Strategies to Overcome Resistance</h3>
<p>Overcome resistance to RIM starts with communicating its value, early stakeholder involvement, small steps, and adaptability.</p>
<ul>
<li><strong>Communicate the Value:</strong> Employees support RIM when they understand its impact. Share real-world examples—such as data breaches or compliance failures—to illustrate the benefits of an effective program.</li>
<li><strong>Early Wins Build Momentum:</strong> Launch a pilot program in one department to test and refine your approach. Recognize champions who support the initiative. This encourages broader buy-in.</li>
<li><strong>Stay Flexible and Responsible:</strong> As organizational needs evolve, new requests will arise. Respond promptly to encourage collaboration.</li>
</ul>
<h3><em> </em>Metrics to Track Adherence</h3>
<p><strong><em> </em></strong>Finally, organizations should track key metrics to measure success and maintain long-term compliance. Consider these indicators:</p>
<ul>
<li><strong>Classification Accuracy:</strong> The percentage of records correctly classified, reflecting user understanding and reducing misfiling risks.</li>
<li><strong>Disposition Compliance:</strong> The volume of records disposed of according to retention policies.</li>
<li><strong>Audit Findings and Remediation:</strong> Track audit outcomes and resolution speed to evaluate control effectiveness and responsiveness.</li>
<li><strong>Training Coverage:</strong> Tracking the number of users trained on RIM policies and tools highlights the reach and effectiveness of educational efforts.</li>
</ul>
<p>These metrics provide valuable insights that informs decision-making and drives continuous improvement.</p>
<h2>Final Thoughts on Resistance to RIM</h2>
<p>Employee resistance to RIM-driven change is natural but not unstoppable. By identifying the root causes such as limited awareness, fear of change, or perceived workload increases, organizations can apply targeted change management strategies that build trust and collaboration. Clear communication, phased rollouts through pilot programs, and celebrating early successes are essential for gaining support. Pair these efforts with adherence metrics to monitor progress and ensure alignment with organizational goals. With a deliberate, inclusive approach, resistance can be transformed into lasting buy-in—allowing your organization the full benefits of a <a href="https://zasio.com/structured-problem-solving-rim-program/" data-wpel-link="internal">robust RIM program</a>.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">information governance software</a>. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Femployees-risisting-change-rim%2F&amp;linkname=Psychology%20of%20Change%3A%20Why%20Employees%20Resist%20RIM%E2%80%94And%20How%20to%20Overcome%20It" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Femployees-risisting-change-rim%2F&amp;linkname=Psychology%20of%20Change%3A%20Why%20Employees%20Resist%20RIM%E2%80%94And%20How%20to%20Overcome%20It" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Femployees-risisting-change-rim%2F&amp;linkname=Psychology%20of%20Change%3A%20Why%20Employees%20Resist%20RIM%E2%80%94And%20How%20to%20Overcome%20It" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Femployees-risisting-change-rim%2F&#038;title=Psychology%20of%20Change%3A%20Why%20Employees%20Resist%20RIM%E2%80%94And%20How%20to%20Overcome%20It" data-a2a-url="https://zasio.com/employees-risisting-change-rim/" data-a2a-title="Psychology of Change: Why Employees Resist RIM—And How to Overcome It" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/employees-risisting-change-rim/" data-wpel-link="internal">Psychology of Change: Why Employees Resist RIM—And How to Overcome It</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/employees-risisting-change-rim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Template Schmemplate: Build a Customized Records Schedule That Actually Works</title>
		<link>https://zasio.com/custom-records-retention-schedule/</link>
					<comments>https://zasio.com/custom-records-retention-schedule/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 08 Apr 2025 14:31:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[records retention schedule]]></category>
		<category><![CDATA[RRS]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=6045</guid>

					<description><![CDATA[<p>Records retention software may not be the most glamorous aspect of your business. However, when used effectively, a customized records retention schedule is one of the most powerful risk mitigation tools at your disposal. And when done correctly by involving knowledgeable stakeholders to customize it, you’ll spare yourself from wheel-spinning, headaches, potential lawsuits, and risky digital hoarding tendencies. That said, here’s the catch: if you’re still relying on a template or a one-size-fits-all solution, you’re not managing your records—you’re babysitting them. Let’s break down why a customized retention schedule is, hands down, the best approach, including why templates may be unnecessarily increasing your exposure. Generic Retention Schedules: Why Your Business Is Not a Fill-In-The-Blank Exercise Just plug in your name, industry, and voilà—instant compliance, right? However, that’s incorrect. Every business has its own cocktail of legal, regulatory, and operational considerations. Whether you&#8217;re governed by HIPAA, GDPR, SEC, or just trying to keep the auditors happy, a customized retention schedule speaks your businesses’ native language, or more precisely, it’s specific dialect. It doesn’t just check boxes—it translates the rules into actions that make sense for you. Templates give you vague generalities. Customized schedules give you peace of mind. You Can’t AI [&#8230;]</p>
<p>The post <a href="https://zasio.com/custom-records-retention-schedule/" data-wpel-link="internal">Template Schmemplate: Build a Customized Records Schedule That Actually Works</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://zasio.com/technology-solutions/retention-schedule-management/" data-wpel-link="internal">Records retention software</a> may not be the most glamorous aspect of your business. However, when used effectively, a customized records retention schedule is one of the most powerful risk mitigation tools at your disposal. And when done correctly by involving knowledgeable stakeholders to customize it, you’ll spare yourself from wheel-spinning, headaches, potential lawsuits, and risky digital hoarding tendencies.</p>
<p>That said, here’s the catch: if you’re still relying on a template or a one-size-fits-all solution, you’re not managing your records—you’re babysitting them.</p>
<p>Let’s break down why a customized retention schedule is, hands down, the best approach, including why templates may be unnecessarily increasing your exposure.</p>
<h2><strong>Generic Retention Schedules: Why Your Business Is Not a Fill-In-The-Blank Exercise</strong></h2>
<p>Just plug in your name, industry, and voilà—instant compliance, right? However, that’s incorrect.</p>
<p>Every business has its own cocktail of legal, regulatory, and operational considerations. Whether you&#8217;re governed by <a href="https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html" data-wpel-link="external" rel="external noopener noreferrer">HIPAA</a>, <a href="https://zasio.com/?s=GDPR&amp;et_pb_searchform_submit=et_search_proccess&amp;et_pb_include_posts=yes&amp;et_pb_include_pages=yes" data-wpel-link="internal">GDPR</a>, SEC, or just trying to keep the auditors happy, a customized retention schedule speaks your businesses’ native language, or more precisely, it’s specific dialect. It doesn’t just check boxes—it translates the rules into actions that make sense for you.</p>
<p>Templates give you vague generalities. Customized schedules give you peace of mind.</p>
<h2><strong style="color: #333333; font-size: 26px;">You Can’t AI Common Sense</strong></h2>
<p>Sure, a template might tell you to keep invoices for seven years. But what if you operate in three countries with different tax laws, or in <a href="https://zasio.com/tax-accounting-records-retention-requirements/" data-wpel-link="internal">California</a>? Or your finance team relies on certain records to model future trends?</p>
<h3>A tailored schedule digs into the nitty-gritty:</h3>
<ul>
<li>What does your business <em>actually</em> produce?</li>
<li>Who touches the records?</li>
<li>How do workflows and processes vary by department?</li>
<li>What will work for users so it can be implemented?</li>
</ul>
<p>Templates don’t know about details like the implications of storing electronic pay slips in France, or that your HR Management application can’t delete information about active employees. Custom schedules do.</p>
<h2><strong style="color: #333333; font-size: 26px;">Hoarding Is Not a Compliance Strategy</strong></h2>
<p>A one-size-fits-all approach almost always errs on the side of “keep longer,” because generalizing prohibits detailed accuracy. But that bloated database full of stale, unnecessary records is a ticking liability creating:</p>
<ul>
<li>Bigger breach target</li>
<li>Time-consuming searches</li>
<li>Pricier storage</li>
<li>Slower systems</li>
<li>Painful e-discovery</li>
<li>Privacy sanctions</li>
</ul>
<p>A customized schedule knows what to keep, what to toss, and when to do it—no guesswork, no digital junk drawers.</p>
<h2><strong style="color: #333333; font-size: 26px;">Your Business Changes. Your Schedule Should Too.</strong></h2>
<p>Maybe you’ve merged, expanded globally, gone paperless, or started using AI to enhance processes. Your operations evolve—and a static template won’t evolve with you.</p>
<p>A <a href="https://zasio.com/custom-records-retention-schedule/" data-wpel-link="internal">custom retention schedule</a> can be agile and is more durable. It covers more initially, and grows with your systems, people, and compliance requirements. Think of your customized records retention schedule as a living document, not a relic gathering dust in your shared drive.</p>
<h2><strong style="color: #333333; font-size: 26px;">People Actually Use Things That Make Sense</strong></h2>
<p>Let’s be honest: no one’s reading that 80-page generic retention policy with joy in their heart. If you want employees to follow it, it has to feel relevant. And employees who help build it are natural champions for it.</p>
<h3>Custom schedules:</h3>
<ul>
<li>Use your org’s terminology</li>
<li>Fit into your actual systems and processes</li>
<li>Make it easy to understand who’s responsible for what</li>
<li>Lower a top hurdle- implementation</li>
<li>Already have buy-in and promotion from those who collaborated to create it.</li>
</ul>
<p>If your retention rules are intuitive, they’ll be followed. If they’re written in legal groupings from 2015, or by AI, they’ll be ignored—it’s as simple as that. And we all know that having a policy that’s ignored creates unnecessary risk, as there is documented proof that you know better.</p>
<h2><strong>Bottom Line: Templates Are for 3D printers. Not Compliance.</strong></h2>
<p>If you want your records retention strategy to be more than a liability—if you want it to reduce risk, cut costs, and support your business long-term—you need a customized records retention solution. Not a borrowed template with your logo slapped on it.</p>
<p>Don’t settle for sub-average and un-implementable. Your records (and your legal team) will thank you.</p>
<p>Want help designing a <a href="https://zasio.com/consulting-services/records-retention-schedule/" data-wpel-link="internal">retention schedule</a> that actually works for your organization? Zasio can help. We’ll build something that fits like a glove—and keeps your digital house in order. <a href="https://zasio.com/consulting-services/meet-our-researchers-consultants/" data-wpel-link="internal">Zasio’s Consulting experts</a> leverage their top industry certifications combined with legal licensures and decades of experience to efficiently collaborate with stakeholders to collect information and build customized records retention schedules specifically designed for each client.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on <a href="https://zasio.com/" data-wpel-link="internal">Information Governance solutions</a>. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcustom-records-retention-schedule%2F&amp;linkname=Template%20Schmemplate%3A%20Build%20a%20Customized%20Records%20Schedule%20That%20Actually%20Works" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcustom-records-retention-schedule%2F&amp;linkname=Template%20Schmemplate%3A%20Build%20a%20Customized%20Records%20Schedule%20That%20Actually%20Works" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcustom-records-retention-schedule%2F&amp;linkname=Template%20Schmemplate%3A%20Build%20a%20Customized%20Records%20Schedule%20That%20Actually%20Works" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcustom-records-retention-schedule%2F&#038;title=Template%20Schmemplate%3A%20Build%20a%20Customized%20Records%20Schedule%20That%20Actually%20Works" data-a2a-url="https://zasio.com/custom-records-retention-schedule/" data-a2a-title="Template Schmemplate: Build a Customized Records Schedule That Actually Works" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/custom-records-retention-schedule/" data-wpel-link="internal">Template Schmemplate: Build a Customized Records Schedule That Actually Works</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/custom-records-retention-schedule/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Play Your Way to Records Management Compliance</title>
		<link>https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/</link>
					<comments>https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 24 Sep 2024 21:48:14 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jake Naylor]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[RRS]]></category>
		<guid isPermaLink="false">https://zasio.com/?p=5187</guid>

					<description><![CDATA[<p>Recently, I asked my kids to help clean up our home. After my requests repeatedly failed to motivate them to do anything, I changed tactics and made a game of it. I set a timer for 15 minutes and told them if they simply took everything that was theirs back to their rooms before it went off, we would have some ice cream. Amazingly, my kids got hustling without further complaint. We all worked together, met our goal, and enjoyed a clean house, eating delicious ice cream. Like getting kids to clean up their mess, encouraging employee compliance with records software can be challenging. In the 2023 ARMA IG Maturity Index survey, 45.1% of respondents believed their organizations lacked the essential components of an information governance program. A key element to increasing your records management program&#8217;s maturity is engaging employees and making them active participants. And a great way to engage employees is to make learning and compliance a game. Com-pliance Starts With Com-petition People naturally want to contribute to a team&#8217;s success and love to compete and win. Suppose you want to improve your organization’s success with your records management program. In that case, you can leverage that competitive [&#8230;]</p>
<p>The post <a href="https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/" data-wpel-link="internal">Play Your Way to Records Management Compliance</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Recently, I asked my kids to help clean up our home. After my requests repeatedly failed to motivate them to do anything, I changed tactics and made a game of it. I set a timer for 15 minutes and told them if they simply took everything that was theirs back to their rooms before it went off, we would have some ice cream. Amazingly, my kids got hustling without further complaint. We all worked together, met our goal, and enjoyed a clean house, eating delicious ice cream.</p>
<p>Like getting kids to clean up their mess, encouraging employee compliance with <a href="https://zasio.com/technology-solutions/physical-records-management/" data-wpel-link="internal">records software</a> can be challenging. In the 2023 ARMA IG Maturity Index survey, 45.1% of respondents believed their organizations lacked the essential components of an information governance program. A key element to increasing your records management program&#8217;s maturity is engaging employees and making them active participants. And a great way to engage employees is to make learning and compliance a game.</p>
<p><strong>Com-pliance Starts With Com-petition</strong></p>
<p>People naturally want to contribute to a team&#8217;s success and love to compete and win. Suppose you want to improve your organization’s success with your records management program. In that case, you can leverage that competitive nature by creating a friendly competition that focuses on the organizational goal of records management compliance. Creating a “gamified” training experience will develop a culture of compliance throughout your organization.</p>
<p><strong>Get In the Game</strong></p>
<p>Creating a game out of training and compliance makes it seem like it’s not even work, which makes it extremely effective. Professional services firm KPMG developed a “<a href="https://hbr.org/2023/03/does-gamified-training-get-results" data-wpel-link="external" rel="external noopener noreferrer">gamified training tool</a>” and used it with both leaders and employees to provide a better understanding of available products and services. Researchers found that the gamified training helped to increase collected fees by 25%, the number of clients by 16%, and opportunities from new clients by 22%.</p>
<p>You don’t have to build a complex tool from the ground up to enjoy similar benefits. Find minor ways to “gamify” your RRS training. For instance, you could develop a contest between departments related to RRS compliance with the following competitions to earn points:</p>
<ul>
<li>Audit random record series related to separate departments and determine which series has the lowest percentage of incorrectly assigned records in the past quarter.</li>
<li>Distribute a pop quiz to test individuals&#8217; understanding of the RRS and see which department returns the highest average score.</li>
<li>Measure the volume of records pending disposition and determine which department has the lowest percentage of outstanding records.</li>
<li>Send an email asking to identify the correct record series for a well-known organizational record and see who responds first.</li>
</ul>
<p>Make sure to provide a fun prize! The engagement rate with your training competitions increases when employees understand there is something to be won.</p>
<p><strong>Bonus Prizes: Increased Attention to Records Management and Metrics</strong></p>
<p>These smaller-scale interactions are more individually engaging than large-scale training presentations, and you can leverage that engagement by sneaking in additional training. Mix general training or informational messages with contest-related ones so your employees will eagerly anticipate all messages from the records management department.</p>
<p>You can also specifically design competitions to provide a secondary benefit of gathering metrics for your program. Tracking correctly identified records or disposition efforts provides information on accountability that you can use to find weaknesses or strengths and to understand where to focus upcoming training and improvement projects.</p>
<p><strong>In It to Win It</strong></p>
<p>As you gamify your records management training for your employees, you will find increased engagement and compliance, leading to a more successful <a href="https://zasio.com/technology-solutions/physical-records-management/" data-wpel-link="internal">records management solution</a>. Considering the benefits of higher compliance, increased attention to your program, and valuable metrics, it’s definitely a game worth playing.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">information governance software</a> topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fzasio-blog-play-your-way-to-records-management-program-compliance%2F&amp;linkname=Play%20Your%20Way%20to%20Records%20Management%20Compliance" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fzasio-blog-play-your-way-to-records-management-program-compliance%2F&amp;linkname=Play%20Your%20Way%20to%20Records%20Management%20Compliance" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fzasio-blog-play-your-way-to-records-management-program-compliance%2F&amp;linkname=Play%20Your%20Way%20to%20Records%20Management%20Compliance" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fzasio-blog-play-your-way-to-records-management-program-compliance%2F&#038;title=Play%20Your%20Way%20to%20Records%20Management%20Compliance" data-a2a-url="https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/" data-a2a-title="Play Your Way to Records Management Compliance" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/" data-wpel-link="internal">Play Your Way to Records Management Compliance</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/zasio-blog-play-your-way-to-records-management-program-compliance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Navigating Retention of Data Privacy Compliance Records</title>
		<link>https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/</link>
					<comments>https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#respond</comments>
		
		<dc:creator><![CDATA[Will Fletcher]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 16:04:42 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Will Fletcher]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1832</guid>

					<description><![CDATA[<p>By Will Fletcher — Zasio Legal Counsel Data privacy law compliance is in large measure about showing your work. Five years into the swell of new comprehensive data privacy laws, privacy teams are getting used to ensuring their organization’s personal data activities are well documented. This means creating records—often lots of them. And for records managers, this means sorting out retention practices for all these new records. This article identifies some key privacy law compliance records that records managers will likely encounter, and discusses how to apply classic retention principles to determine appropriate retention periods. Types of Privacy Law Compliance Records Article 30 of the GDPR requires organizations to maintain detailed records of their processing activities. This necessitates creating written documentation of processing activities and making them available to data protection authorities. Under CCPA, as well as a growing number of U.S. state privacy laws, organizations must analyze the risks associated with their processing activities through privacy impact assessments. Other records frequently generated through privacy law compliance include data transfer impact assessments before transferring personal data across borders, responses to data subject rights requests, breach assessments and notifications, personal data audits, and privacy-by-design assessments, to name a few. Privacy law [&#8230;]</p>
<p>The post <a href="https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/" data-wpel-link="internal">Navigating Retention of Data Privacy Compliance Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>By Will Fletcher — Zasio Legal Counsel</em></p>
<p>Data privacy law compliance is in large measure about showing your work. Five years into the swell of new comprehensive data privacy laws, privacy teams are getting used to ensuring their organization’s personal data activities are well documented. This means creating records—often lots of them. And for records managers, this means sorting out retention practices for all these new records.</p>
<p>This article identifies some key privacy law compliance records that records managers will likely encounter, and discusses how to apply classic retention principles to determine appropriate retention periods.</p>
<p><strong>Types of Privacy Law Compliance Records</strong></p>
<p>Article 30 of the GDPR requires organizations to maintain detailed records of their processing activities. This necessitates creating written documentation of processing activities and making them available to data protection authorities. Under CCPA, as well as a growing number of U.S. state privacy laws, organizations must analyze the risks associated with their processing activities through privacy impact assessments. Other records frequently generated through privacy law compliance include data transfer impact assessments before transferring personal data across borders, responses to data subject rights requests, breach assessments and notifications, personal data audits, and privacy-by-design assessments, to name a few.</p>
<p>Privacy law compliance records tell your organization’s story with respect to its personal data processing activities, such as its commitment to the letter of the law, thinking through privacy risks, respecting data subject rights, and curing defects.</p>
<p><strong>Applying Basic Records Retention Principles to Privacy Compliance Records</strong></p>
<p>By now we’re well acquainted with the storage limitation principle in data privacy—keep no longer than necessary. This has sent records managers scrambling to reduce retention periods for personal data. However, applying such aggressive deletion practices to data privacy compliance records can land your organization in regulatory trouble. For these, the tried-and-true general rules of identifying applicable legal requirements, and balancing risk with business need, are still largely your best practice.</p>
<p><strong>Express Legal Retention Requirements</strong></p>
<p>While less common than for other record types, there are still a number of express legal retention requirements that apply to data privacy compliance records. Breach investigation and notice records is a good example of where some of these can be found. Under Canada’s Breach of Security Safeguards Regulation, organizations must keep breach records for at least two years after the breach.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> In Iowa, state law mandates a five-year retention period for records documenting an organization’s determination that consumer notice of a breach is not legally mandated.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a></p>
<p>Another area for express legal retention requirements is under laws governing requests by data subjects to exercise data privacy rights. Under CCPA regulations, for example, an organization must maintain records of consumer requests for at least 24 months.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> Colorado’s Privacy Act regulations obligate controllers to retain records documenting responses to their consumer data rights requests for the same period.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a></p>
<p>While the GDPR does not specify retention periods for records of processing activities under Article 30, the subject is not without legal guidance. In 2017, the Belgian Data Processing Authority recommended keeping Article 30 records of processing activities for five years after termination of the processing activity.</p>
<p>But don’t let your search for legal retention requirements stop at data privacy-specific laws and recommendations. Retention periods in broader regulatory requirements can encompass records in your privacy compliance program, and where those are longer, they should be followed.</p>
<p><strong>Where No Legal Retention Requirement Applies</strong></p>
<p>When a record isn’t subject to an express retention requirement, records managers must balance business needs and legal risks to determine an appropriate retention period. To do this, records managers must ask how long their organization may need to justify its practices. This can mean turning to applicable statutes of limitation for guidance.</p>
<p>While statutes of limitations are not legal retention requirements, they’re a good measure of the time you may be called on by data privacy regulators or consumers to show compliance. Under the CPPA, administrative actions must generally be commenced within five years. The Illinois Supreme Court also in February clarified the general statute of limitations for civil claims under the state’s Biometric Information and Privacy Act (BIPA) is five years. But oftentimes, business need necessitates retention for longer than any regulatory or legal need, so whether to use an applicable statute of limitations as your retention benchmark must be evaluated on a case-by-case basis.</p>
<p><strong>Conclusion</strong></p>
<p>When setting retention periods, it’s crucial to understand the types of records your organization generates and which laws apply to these records. But knowing an organization’s specific regulatory and jurisdictional retention requirements, as well as balancing business needs and risk to determine retention periods, is something records and information management professionals have plenty of experience doing. For data privacy records compliance, it’s a matter of applying some trusted and familiar tools to a new set of records.</p>
<p>As privacy regulation expands, expect a lack of comprehensive privacy compliance recordkeeping to be a big part of regulatory actions. As a RIM professional, you can play a crucial role in ensuring your organization isn’t among those involved in these actions.</p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Breach of Security Safeguards Regulations (SOR/2018-64) (amended Nov. 1, 2018): <a href="https://laws-lois.justice.gc.ca/eng/regulations/SOR-2018-64/page-1.html#h-858504" data-wpel-link="external" rel="external noopener noreferrer">https://laws-lois.justice.gc.ca/eng/regulations/SOR-2018-64/page-1.html#h-858504</a></p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> Iowa Code 2023, Section 715C.2(6): (<a href="https://www.legis.iowa.gov/docs/code/715C.2.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://www.legis.iowa.gov/docs/code/715C.2.pdf</a>)</p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> Cal. Code Regs. tit. 11 § 7101(a).</p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> 4 CCR 904-3-6.11.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&amp;linkname=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&amp;linkname=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&amp;linkname=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&#038;title=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" data-a2a-url="https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/" data-a2a-title="Navigating Retention of Data Privacy Compliance Records" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/" data-wpel-link="internal">Navigating Retention of Data Privacy Compliance Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Instant Messaging in the Workplace and Mitigating Risks</title>
		<link>https://zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/</link>
					<comments>https://zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 27 Aug 2019 20:15:31 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber breach]]></category>
		<category><![CDATA[e-discovery]]></category>
		<category><![CDATA[IM]]></category>
		<category><![CDATA[instant message]]></category>
		<category><![CDATA[risk mitigation]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[workplace conduct]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=768</guid>

					<description><![CDATA[<p>In today’s digital age, communicating between colleagues in the workplace is easier than ever before. Instant Messaging (IM) tools such as Slack, Microsoft Teams, and Google Hangouts allow employees to quickly chat, share documents, and create meetings efficiently. While IM and traditional email platforms have similar operations, IM streamlines the process by showcasing message threads directly on the user’s screen rather than going through an inbox. For this reason, companies are increasingly choosing IM over email to perform daily tasks and improve productivity. Companies are now quickly scrambling to understand the risks associated with these tools and how to implement solutions to mitigate these risks. Common Risks Because these IM applications are so easy to use, it can be easy to ignore the legal and cyber threats they pose. A few of the most common risks include eDiscovery difficulties, vulnerability to hackers, sharing of confidential or sensitive information, and noncompliance with workplace policies. Electronic Discovery In the event of litigation, companies without IM retention policies may have to search through a large amount of information that isn’t easily searchable. If companies can’t separate these messages, they might be required to produce everything, including non-relevant or non-discoverable information, presenting the organization [&#8230;]</p>
<p>The post <a href="https://zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/" data-wpel-link="internal">Instant Messaging in the Workplace and Mitigating Risks</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today’s digital age, communicating between colleagues in the workplace is easier than ever before. Instant Messaging (IM) tools such as Slack, Microsoft Teams, and Google Hangouts allow employees to quickly chat, share documents, and create meetings efficiently. While IM and traditional email platforms have similar operations, IM streamlines the process by showcasing message threads directly on the user’s screen rather than going through an inbox. For this reason, companies are increasingly choosing IM over email to perform daily tasks and improve productivity. Companies are now quickly scrambling to understand the risks associated with these tools and how to implement solutions to mitigate these risks.</p>
<p><strong>Common Risks</strong></p>
<p>Because these IM applications are so easy to use, it can be easy to ignore the legal and cyber threats they pose. A few of the most common risks include eDiscovery difficulties, vulnerability to hackers, sharing of confidential or sensitive information, and noncompliance with workplace policies.</p>
<ol>
<li><strong>Electronic Discovery</strong></li>
</ol>
<p>In the event of litigation, companies without IM retention policies may have to search through a large amount of information that isn’t easily searchable. If companies can’t separate these messages, they might be required to produce everything, including non-relevant or non-discoverable information, presenting the organization with many unknowns and potential exposure to additional risk. Fortunately, many of these IM tools allow companies to customize their eDiscovery settings to define what data should be stored and extracted.</p>
<ol start="2">
<li><strong>Workplace Conduct and Compliance</strong></li>
</ol>
<p>Because the IM interface is visually similar to text messaging interfaces with scrolling message threads, users tend to associate the two and use them interchangeably. This can lead to employees sharing personal conversations, inappropriate content, and sometimes hostile language through IM. Not only does this decrease productivity, but it can also result in harassment and misconduct lawsuits. Companies can create strict content policies and provide training in order to prevent these workplace liabilities. Great memes and GIFs come with great responsibility.</p>
<ol start="3">
<li><strong>Security Threats</strong></li>
</ol>
<p>IM software is easily susceptible to malware, viruses, and hackers. Employees will often use IM to share documents, client data, or other sensitive company information that then becomes susceptible to these hackers. This could lead to information falling into competitors’ hands or even personal data breaches affecting employees and clients. Fortunately, companies can increase IM security by installing anti-malware software, encrypting any data sent via IM, and creating policies for information transactions.</p>
<p>One example of an IM security breach occurred in March 2015 when Slack was hacked. They were quick to reset the passwords of the impacted users and all went back to business as usual. 4 years later, in July 2019, Slack discovered that a number of user accounts linked to the 2015 hack had been compromised by a keylogging code that hackers used to read passwords as users entered them. Slack has addressed the situation and said that just around 1% of users fell into this category.<a href="https://www.zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> Although this breach was relatively small, it shows just how long security breaches can go unnoticed.</p>
<p>The information shared via IM applications is not just vulnerable to hackers but also to anyone on outside networks. IM is available to users on mobile devices and personal computers that fall outside of company firewalls and protections. If an employee accesses the IM mobile application on a public network, the information becomes overwhelmingly vulnerable. Companies should create workplace-only policies and remind employees that IM should be used for business purposes only and nothing personal. If an employee needs to communicate with the workplace while they are out of the office, they should use email, not IM.</p>
<p><strong>IM Management to Mitigate Risks</strong></p>
<p>There is no doubt that IM applications have many benefits. Companies just need to make sure that they are taking reasonable precautions and are prepared in the event of legal and cyber issues. Two of the most important defenses are record retention policies and training.</p>
<p>As a matter of policy, companies can restrict the information that may be shared or communicated on these tools. For example, they may create a prohibition on conducting business, communicating with clients, and sharing proprietary or confidential information via IM. This will force users to keep most records outside of the IM system. The remaining content in IM should then be evaluated to determine what can be categorized as a record. Once the record content has been defined, companies can alter their eDiscovery and retention settings within the IM tool. These records should be kept in accordance with the company’s records retention schedule. This will help decrease the amount of secure information stored in the application, reduce the message clutter that results from message threads, and prevent workplace litigation by improving the eDiscovery process. Most IM applications have general settings for retention policies that allow you to purge all information after a specified amount of time. This specified period should be kept as short as possible. If companies require a more detailed retention policy, they should consider incorporating specific provisions as part of their electronic records management policy.</p>
<p>However, none of these practices will be beneficial unless the company trains its employees. Companies should implement IM policy training upon hire, as well as annually or semi-annually to ensure that it sticks. Employees need to understand how to use IM appropriately, where to use it, and why it matters. They must understand that in today’s digital age, workplace gossip has moved from the water cooler to IM and this can be dangerous for everyone. When in doubt, don’t send it out. Utilizing all of these practices and precautions could save the company money, time, and stress. Never underestimate the power of an IM record retention schedule.</p>
<p>For assistance with IM record retention schedules, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a> today.</p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Whittaker, Z. (July 18, 2019). Slack resets user passwords after 2015 data breach. <em>Tech Crunch</em>. Retrieved from <a href="https://techcrunch.com/2019/07/18/slack-password-breach/" data-wpel-link="external" rel="external noopener noreferrer">https://techcrunch.com/2019/07/18/slack-password-breach/</a></p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Finstant-messaging-in-the-workplace-and-mitigating-risk%2F&amp;linkname=Instant%20Messaging%20in%20the%20Workplace%20and%20Mitigating%20Risks" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Finstant-messaging-in-the-workplace-and-mitigating-risk%2F&amp;linkname=Instant%20Messaging%20in%20the%20Workplace%20and%20Mitigating%20Risks" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Finstant-messaging-in-the-workplace-and-mitigating-risk%2F&amp;linkname=Instant%20Messaging%20in%20the%20Workplace%20and%20Mitigating%20Risks" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Finstant-messaging-in-the-workplace-and-mitigating-risk%2F&#038;title=Instant%20Messaging%20in%20the%20Workplace%20and%20Mitigating%20Risks" data-a2a-url="https://zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/" data-a2a-title="Instant Messaging in the Workplace and Mitigating Risks" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/" data-wpel-link="internal">Instant Messaging in the Workplace and Mitigating Risks</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/instant-messaging-in-the-workplace-and-mitigating-risk/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Tips to Prevent Hoarding of Documents</title>
		<link>https://zasio.com/tips-to-prevent-hoarding-of-documents/</link>
					<comments>https://zasio.com/tips-to-prevent-hoarding-of-documents/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 18 Mar 2019 21:38:36 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[cyber attacks]]></category>
		<category><![CDATA[Cyber security]]></category>
		<category><![CDATA[cyber-theft]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[hidden data]]></category>
		<category><![CDATA[Versatile Enterprise]]></category>
		<category><![CDATA[versatile retention]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=808</guid>

					<description><![CDATA[<p>I recently saw a commercial for the show “Hoarders,” which depicts the real-life struggles of people who suffer from compulsive hoarding disorder. Each hour-long episode profiles two people on the verge of a personal crisis, all caused by the fact that they are unable to part with even the tiniest possessions, and the cumulative effect becomes a mountain of junk and garbage overtaking their home or apartment. It occurred to me that organizations have a similar hoarding problem when it comes to documents, which is amplified by the number of employees who keep copies and versions regardless of what kind of archival tools or records retention program is in place. After putting hours of effort and consideration working on, let’s say, a 35-page assessment and formal proposal, you can bet that most folks tuck an extra copy away on their hard drive or a file share somewhere…and probably print out a paper copy too, just to be safe. Employees often have hoarder’s mindset, keeping copies and versions regardless of what kind of archival tools or records retention program is in place. Sense of Ownership That sense of ownership and the desire to avoid reinventing the wheel makes perfect sense, but [&#8230;]</p>
<p>The post <a href="https://zasio.com/tips-to-prevent-hoarding-of-documents/" data-wpel-link="internal">Tips to Prevent Hoarding of Documents</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>I recently saw a commercial for the show “Hoarders,” which depicts the real-life struggles of people who suffer from compulsive hoarding disorder. Each hour-long episode profiles two people on the verge of a personal crisis, all caused by the fact that they are unable to part with even the tiniest possessions, and the cumulative effect becomes a mountain of junk and garbage overtaking their home or apartment.</p>
<p>It occurred to me that organizations have a similar hoarding problem when it comes to documents, which is amplified by the number of employees who keep copies and versions regardless of what kind of archival tools or records retention program is in place. After putting hours of effort and consideration working on, let’s say, a 35-page assessment and formal proposal, you can bet that most folks tuck an extra copy away on their hard drive or a file share somewhere…and probably print out a paper copy too, just to be safe.</p>
<blockquote><p><strong><em>Employees often have hoarder’s mindset, keeping copies and versions regardless of what kind of archival tools or records retention program is in place.</em></strong></p></blockquote>
<p><strong>Sense of Ownership</strong></p>
<p>That sense of ownership and the desire to avoid reinventing the wheel makes perfect sense, but all those hoarded documents have a downside because the information can pose an unseen risk to the organization. And the liability grows when people have a “keep everything” approach to records management, especially as the volume, velocity, and variety of content that every organization must manage continues to grow and evolve in this age of Digital Transformation.</p>
<p><strong>Just Keep Everything</strong></p>
<p>While digital transformation may seem like it’s all about collecting more and more data, the truth is not all data is good data and there is a great deal of liability for the company when it over-retains. For example, not having visibility into what an employee saves is a cause for concern, because you don’t know what type of information is being preserved by the employee and whether or not it falls within a proper retention schedule. And if they are holding onto a record for a longer period of time than they need to – regardless of the company retention policy – that information is still subject to disclosure through discovery, or any type of compliance audit, or other types of regulatory and legal proceedings.</p>
<p><strong>You Don’t Know What You Don’t Know</strong></p>
<p>Information security and data loss prevention (DLP) is also a pressing matter, especially as the number of cyber incidents continues to rise. If documents are hoarded by employees, organizations lack visibility into critical facts such as what is being over-retained, where it is being stored, who has access rights, and the appropriateness of the security applied to the content. If past incidents played out before the public is any indication, the hidden information represents a treasure trove of data for hackers looking for security loopholes.</p>
<p><strong>Costs and Risks</strong></p>
<p>The costs and risks are substantial, including fines for over-retention of certain documents and information (e.g., personal data). There are litigation costs that come into play through e-discovery, and very real exposure in court by virtue of what you are now compelled to disclose. Additionally, the harm to the organization’s reputation, loss of public trust, and impact on current and future business opportunities cannot be discounted.</p>
<p><strong>Best Practices</strong></p>
<p>It’s one thing to point out a problem and another to do something about it. Here are three best practices to consider:</p>
<p><strong>Communication</strong></p>
<p>The first step is communication and putting records management top of mind with every employee. It is important to set the expectation that everyone will follow through with the retention schedule and preserve documents according to the records management and other related corporate policies and guidelines. It is important to review corporate policies and guidelines from different departments (e.g., information security, IT, privacy, etc.) and assure alignment to address potentially conflicting information.</p>
<p><strong>Training</strong></p>
<p>Next step is training; not just at the time of new employee onboarding, but continuous refreshers along the course of the employees’ time at the company. As records management is reiterated and encouraged the tendency to hoard tends to fade from the mindset of the employees as it becomes second nature in the execution of their everyday tasks.</p>
<p><strong>Make it Easy</strong></p>
<p>Let’s face it, if the systems and procedures to properly save and archive records are hard to use, and people are not comfortable using and trusting the system, they will simply revert back to their old hoarding habits. Make it easy by using an automated process and reducing the number of steps for employees to follow where possible.</p>
<p><strong>Moving Forward</strong></p>
<p>When it comes to information governance and successful adoption, the focus needs to extend beyond just the technology and account for work culture and employees’ mindset. You can change that hoarding mentality through awareness, common-sense training, and implementing systems that make it easier for employees to comply with the organization’s information governance policies and guidelines.</p>
<p>For more information or to see how our Versatile technology solutions and consulting services can help manage and protect your records and ensure you comply with legal retention requirements, please fill out our <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Form</a>.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Ftips-to-prevent-hoarding-of-documents%2F&amp;linkname=Tips%20to%20Prevent%20Hoarding%20of%20Documents" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Ftips-to-prevent-hoarding-of-documents%2F&amp;linkname=Tips%20to%20Prevent%20Hoarding%20of%20Documents" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Ftips-to-prevent-hoarding-of-documents%2F&amp;linkname=Tips%20to%20Prevent%20Hoarding%20of%20Documents" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Ftips-to-prevent-hoarding-of-documents%2F&#038;title=Tips%20to%20Prevent%20Hoarding%20of%20Documents" data-a2a-url="https://zasio.com/tips-to-prevent-hoarding-of-documents/" data-a2a-title="Tips to Prevent Hoarding of Documents" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/tips-to-prevent-hoarding-of-documents/" data-wpel-link="internal">Tips to Prevent Hoarding of Documents</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/tips-to-prevent-hoarding-of-documents/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>“Just Scan It” – The Pros and Cons of Digitizing Paper Records</title>
		<link>https://zasio.com/just-scan-it/</link>
					<comments>https://zasio.com/just-scan-it/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 28 Feb 2019 21:44:15 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[digital records]]></category>
		<category><![CDATA[digital transformation]]></category>
		<category><![CDATA[digitization]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[Warren Bean]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=811</guid>

					<description><![CDATA[<p>Despite digitization and decades of paperless initiatives, companies still work with a lot of paper. For many organizations, core functions like accounts payable, human resources or account on-boarding remain mired in paper copies and manual workflow. Since the foundation of digital transformation is all about getting rid of paper, a common reaction is “Why don’t we just scan it all?” This might seem to be a reasonable approach, but it may not always make good business sense. Digitizing paper records is not as simple as rolling in some scanners and hiring a team of data entry clerks. The complexities of preparing the documents, the intricacies of quality control, and the expense and expertise required for working with capture systems and equipment is often overlooked, especially when viewed from a strictly technology and storage point of view. Shaping Up the Savings The cost-savings of a ‘just scan it’ approach often fails to pencil out, even for large-scale scanning. One study conducted by Pinnacle Data Management in the UK estimated that one thousand document storage boxes could contain 1,000,000 sheets of paper, which if scanned at 10 cents per page would cost approximately $100,000 to scan. By comparison, storing those thousand boxes off-site in [&#8230;]</p>
<p>The post <a href="https://zasio.com/just-scan-it/" data-wpel-link="internal">“Just Scan It” – The Pros and Cons of Digitizing Paper Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Despite digitization and decades of paperless initiatives, companies still work with a lot of paper. For many organizations, core functions like accounts payable, human resources or account on-boarding remain mired in paper copies and manual workflow. Since the foundation of digital transformation is all about getting rid of paper, a common reaction is “Why don’t we just scan it all?” This might seem to be a reasonable approach, but it may not always make good business sense.</p>
<p>Digitizing paper records is not as simple as rolling in some scanners and hiring a team of data entry clerks. The complexities of preparing the documents, the intricacies of quality control, and the expense and expertise required for working with capture systems and equipment is often overlooked, especially when viewed from a strictly technology and storage point of view.</p>
<p><strong>Shaping Up the Savings</strong></p>
<p>The cost-savings of a ‘just scan it’ approach often fails to pencil out, even for large-scale scanning. One <a href="http://www.pdm-archive.co.uk/how-much-does-document-storage-cost/" data-wpel-link="external" rel="external noopener noreferrer">study conducted by Pinnacle Data Management</a> in the UK estimated that one thousand document storage boxes could contain 1,000,000 sheets of paper, which if scanned at 10 cents per page would cost approximately $100,000 to scan. By comparison, storing those thousand boxes off-site in a warehouse would cost about $400.00 per month. The result is that it would take 20 years to recover the scanning investment.</p>
<p><strong>Statutes and Compliance</strong></p>
<p>A number of strategic concerns regarding information governance and compliance must be considered. Federal, State and International statutes all have stipulations regarding what you can or cannot digitize, for how long, and in what format. Depending on your industry, any number of additional standards come into play. These protocols may not always lend themselves to a digital-only approach. For example, Hong Kong’s Electronic Transactions Ordinance specifies a staggering array of documents that are exempt from electronic allowance. These include wills, trusts, powers of attorney, instruments requiring stamps or endorsements, negotiable instruments, and many more, that must be retained in paper form. Laws from other countries contain similar carve-outs.</p>
<p><strong>Data Security</strong></p>
<p>Factors surrounding data security makes digitizing paper records a much more complex issue than simply scanning pages and filing them away in image files. Information captured in an image archive or document management repository can represent a treasure trove of opportunity for computer hackers who are looking to steal sensitive and private data. Things like social security numbers, financial and medical account details, addresses and phone numbers, are all found in these archives that may, or may not, have an appropriate level of information governance applied. And the longer those files are held the more likely that they become redundant and obsolete to the organization while translating into great prospects and profit for cyber-thieves. A physical document may seem antiquated, but is easier to secure since it requires physical access to the record. Figurative “back doors” become real ones that you can lock and guard.</p>
<p><strong>Best Practices</strong></p>
<p>How can you determine when it’s a good idea to digitize your paper records? Here are a few important questions to ask as you plan your approach.</p>
<ul>
<li>Which documents should you scan?</li>
<li>Do we need to digitize everything, or just the most important documents?</li>
<li>What if we scanned everything from today forward, and left the rest on paper?</li>
<li>Will “scan on demand” (as they are requested) meet most of my needs?</li>
<li>How much effort will be required to prepare these documents for scanning?</li>
<li>What about non-standard-size documents?</li>
<li>How frequently are you going to need access to this document once digitized?</li>
<li>Where will the information be stored?</li>
<li>How sensitive is the information? What is the risk?</li>
<li>Are there legal or regulatory stipulations associated with this document?</li>
</ul>
<p><strong>Moving Forward</strong></p>
<p>“Just scan it” misses the mark for intelligent information governance. Maintaining effective information governance requires not only technology, but also thoughtful policies that allow you to meet legal and regulatory compliance while taking into account the hidden and often overlooked implications of digital transformation.</p>
<p>We can help. We’re experts in Records Management and Information Governance. Our premier software solutions do the heavy lifting, no matter the capacity of your records management and retention scheduling needs. And our personalized consulting and research services make us a global leader in information governance, records management and intelligent information management.</p>
<p>Find out more at <a href="https://www.zasio.com/" data-wpel-link="internal">Zasio.com</a> or contact me directly at <a href="mailto:warren.bean@zasio.com?subject=Inquiry%20from%20Blog%20Article:%20Just%20Scan%20It%20">warren.bean@zasio.com</a>, I’d be pleased to talk with you about how we can help.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fjust-scan-it%2F&amp;linkname=%E2%80%9CJust%20Scan%20It%E2%80%9D%20%E2%80%93%20The%20Pros%20and%20Cons%20of%20Digitizing%20Paper%20Records" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fjust-scan-it%2F&amp;linkname=%E2%80%9CJust%20Scan%20It%E2%80%9D%20%E2%80%93%20The%20Pros%20and%20Cons%20of%20Digitizing%20Paper%20Records" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fjust-scan-it%2F&amp;linkname=%E2%80%9CJust%20Scan%20It%E2%80%9D%20%E2%80%93%20The%20Pros%20and%20Cons%20of%20Digitizing%20Paper%20Records" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fjust-scan-it%2F&#038;title=%E2%80%9CJust%20Scan%20It%E2%80%9D%20%E2%80%93%20The%20Pros%20and%20Cons%20of%20Digitizing%20Paper%20Records" data-a2a-url="https://zasio.com/just-scan-it/" data-a2a-title="“Just Scan It” – The Pros and Cons of Digitizing Paper Records" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/just-scan-it/" data-wpel-link="internal">“Just Scan It” – The Pros and Cons of Digitizing Paper Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/just-scan-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?</title>
		<link>https://zasio.com/cnil-fines-google-company-vows-appeal/</link>
					<comments>https://zasio.com/cnil-fines-google-company-vows-appeal/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 01 Feb 2019 20:12:21 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[data privacy]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[General Data Protection Regulation]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[privacy]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=836</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/cnil-fines-google-company-vows-appeal/" data-wpel-link="internal">CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Reading Time: 4 minutes, 37 seconds</p>
<p>The €50 million fine levied last week by the French National Commission on Informatics and Liberty (CNIL) against Google for violations of the GDPR has struck the tech industry with a resounding thunderclap, sending shockwaves that are being felt in boardrooms across the globe.  As the first significant penalty imposed against a major multinational technology company under the EU’s new GDPR regime, the hefty fine is widely viewed as a shot across the bow in the coming struggle between privacy regulators and big data aggregators about the scope of conduct that will be permitted under the new rules.  While surely intended as an instructive example to set the tone of regulators’ expectations, the contours of the CNIL decision and Google’s swift pledge to appeal the ruling likely means this event will generate as many new questions as it answers.</p>
<p>Long before the GDPR came into force last May, tech companies have been pouring tremendous resources into bringing their operations into compliance with the new requirements, and those efforts continue today. But the degree to which those requirements would be enforced and the severity of the actual penalties that would be imposed have remained hypothetical—until now.</p>
<p>In announcing the penalty, the CNIL identified two areas where Google allegedly violated GDPR requirements. In the first, the CNIL cited a “violation of the obligations of transparency and information” because the information provided by Google is not easily accessible.  Google’s data processing purposes, storage periods, and the categories of personal data can only be reached after clicking several buttons, totaling as many as five or six actions before reaching the relevant information. Furthermore, the operations are “particularly massive and intrusive” in light of the constellation of different services offered and the volume of data processed and combined.</p>
<p>In the second, the CNIL identified a “violation of the obligation to have a legal basis for ads personalization processing.” While Google does obtain users’ consent to process personal data for targeted advertisement, the CNIL alleges that the consent is “not validly obtained” because the user is not sufficiently informed and the consent is neither specific nor unambiguous. By spreading the necessary information across several documents, users struggle to understand the scope of the information processing.  While options for targeted ads can be customized through a series of check-boxes, the default state is for those boxes to be ticked “yes,” while the GDPR conversely requires an affirmative act—for instance, ticking a box that has by default been set to “no.”</p>
<p>Although this action is rightly interpreted as a warning intended to provide clarity and induce companies to take heed and make changes, it also raises a number of new questions.  And some of the largest tech industry players may find that there is no easy way to revise their products and services framework and literature to bring their operations in line with regulators’ expectations.</p>
<p>Google is by no means a small company and, while €50 million will not have a material impact on the financial condition of a company the size of Google, fines of this magnitude could threaten the survival of many smaller companies who handle personal data.</p>
<p>In addition to the threat of much higher fines, the ruling also threatens the company’s bottom line by potentially disrupting the tremendous targeted ad revenues that make up a large portion of that $110 billion in revenue.  For instance, even by just making one single alteration referenced in the CNIL’s decision—changing the default personal data sharing option to “no”—the number of users who opt to make their personal data available for processing could suffer a precipitous fall. This trend might be exacerbated once newly revised privacy disclosures lead to customers having a more complete understanding of all that is being done with their data. Armed with this knowledge, customers are more likely to opt “no” in far greater numbers.</p>
<p>Furthermore, the ruling raises important questions about what general conclusions the tech industry can draw about adequate privacy disclosures based on the deficiencies identified by the CNIL.  Are boxes ticked by default to “yes” to be prohibited in all cases, or just in this particular case? If five or six actions to access relevant privacy information is opaque, will two or three be considered transparent, or must it be one… or zero?</p>
<p>One might also wonder: how it is possible for a company to offer dozens of interconnected services that share and co-mingle customers’ personal data across platforms, while at the same time making it <em>easy</em> to understand all of the purposes, uses, and retention periods for that data? Is it even possible, or is that a contradiction in terms? This conundrum could present a Gordian knot that Google and others in the tech industry may find impossible to untangle without cutting some of their current product and service offerings. The answers to these questions and many others will come into greater focus as the appeal plays out and future enforcement actions come down the pipeline. But for now, one thing is crystal clear: this ruling presents an ill omen for business models that rely on customers to swiftly click “accept” and share their personal data.</p>
<p>While the drumbeat of GDPR compliance may have become all too familiar to privacy practitioners during the past few years, the CNIL’s decision on Google underlines the reality that we are likely only just witnessing the opening act of an epic drama whose scenes will take center stage for a global audience of politicians, regulators, and tech titans for many years to come.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" class="wp-image-1966" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&amp;linkname=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&amp;linkname=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&amp;linkname=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcnil-fines-google-company-vows-appeal%2F&#038;title=CNIL%20Fines%20Google%2C%20Company%20Vows%20Appeal%3A%20Clarity%2C%20or%20Confusion%3F" data-a2a-url="https://zasio.com/cnil-fines-google-company-vows-appeal/" data-a2a-title="CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/cnil-fines-google-company-vows-appeal/" data-wpel-link="internal">CNIL Fines Google, Company Vows Appeal: Clarity, or Confusion?</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/cnil-fines-google-company-vows-appeal/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
