<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>privacy laws Archives - Zasio</title>
	<atom:link href="https://zasio.com/tag/privacy-laws/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/tag/privacy-laws/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Mon, 16 Mar 2026 22:12:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>privacy laws Archives - Zasio</title>
	<link>https://zasio.com/tag/privacy-laws/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Navigating Retention of Data Privacy Compliance Records</title>
		<link>https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/</link>
					<comments>https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#respond</comments>
		
		<dc:creator><![CDATA[Will Fletcher]]></dc:creator>
		<pubDate>Fri, 22 Sep 2023 16:04:42 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Will Fletcher]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1832</guid>

					<description><![CDATA[<p>By Will Fletcher — Zasio Legal Counsel Data privacy law compliance is in large measure about showing your work. Five years into the swell of new comprehensive data privacy laws, privacy teams are getting used to ensuring their organization’s personal data activities are well documented. This means creating records—often lots of them. And for records managers, this means sorting out retention practices for all these new records. This article identifies some key privacy law compliance records that records managers will likely encounter, and discusses how to apply classic retention principles to determine appropriate retention periods. Types of Privacy Law Compliance Records Article 30 of the GDPR requires organizations to maintain detailed records of their processing activities. This necessitates creating written documentation of processing activities and making them available to data protection authorities. Under CCPA, as well as a growing number of U.S. state privacy laws, organizations must analyze the risks associated with their processing activities through privacy impact assessments. Other records frequently generated through privacy law compliance include data transfer impact assessments before transferring personal data across borders, responses to data subject rights requests, breach assessments and notifications, personal data audits, and privacy-by-design assessments, to name a few. Privacy law [&#8230;]</p>
<p>The post <a href="https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/" data-wpel-link="internal">Navigating Retention of Data Privacy Compliance Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>By Will Fletcher — Zasio Legal Counsel</em></p>
<p>Data privacy law compliance is in large measure about showing your work. Five years into the swell of new comprehensive data privacy laws, privacy teams are getting used to ensuring their organization’s personal data activities are well documented. This means creating records—often lots of them. And for records managers, this means sorting out retention practices for all these new records.</p>
<p>This article identifies some key privacy law compliance records that records managers will likely encounter, and discusses how to apply classic retention principles to determine appropriate retention periods.</p>
<p><strong>Types of Privacy Law Compliance Records</strong></p>
<p>Article 30 of the GDPR requires organizations to maintain detailed records of their processing activities. This necessitates creating written documentation of processing activities and making them available to data protection authorities. Under CCPA, as well as a growing number of U.S. state privacy laws, organizations must analyze the risks associated with their processing activities through privacy impact assessments. Other records frequently generated through privacy law compliance include data transfer impact assessments before transferring personal data across borders, responses to data subject rights requests, breach assessments and notifications, personal data audits, and privacy-by-design assessments, to name a few.</p>
<p>Privacy law compliance records tell your organization’s story with respect to its personal data processing activities, such as its commitment to the letter of the law, thinking through privacy risks, respecting data subject rights, and curing defects.</p>
<p><strong>Applying Basic Records Retention Principles to Privacy Compliance Records</strong></p>
<p>By now we’re well acquainted with the storage limitation principle in data privacy—keep no longer than necessary. This has sent records managers scrambling to reduce retention periods for personal data. However, applying such aggressive deletion practices to data privacy compliance records can land your organization in regulatory trouble. For these, the tried-and-true general rules of identifying applicable legal requirements, and balancing risk with business need, are still largely your best practice.</p>
<p><strong>Express Legal Retention Requirements</strong></p>
<p>While less common than for other record types, there are still a number of express legal retention requirements that apply to data privacy compliance records. Breach investigation and notice records is a good example of where some of these can be found. Under Canada’s Breach of Security Safeguards Regulation, organizations must keep breach records for at least two years after the breach.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> In Iowa, state law mandates a five-year retention period for records documenting an organization’s determination that consumer notice of a breach is not legally mandated.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a></p>
<p>Another area for express legal retention requirements is under laws governing requests by data subjects to exercise data privacy rights. Under CCPA regulations, for example, an organization must maintain records of consumer requests for at least 24 months.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> Colorado’s Privacy Act regulations obligate controllers to retain records documenting responses to their consumer data rights requests for the same period.<a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a></p>
<p>While the GDPR does not specify retention periods for records of processing activities under Article 30, the subject is not without legal guidance. In 2017, the Belgian Data Processing Authority recommended keeping Article 30 records of processing activities for five years after termination of the processing activity.</p>
<p>But don’t let your search for legal retention requirements stop at data privacy-specific laws and recommendations. Retention periods in broader regulatory requirements can encompass records in your privacy compliance program, and where those are longer, they should be followed.</p>
<p><strong>Where No Legal Retention Requirement Applies</strong></p>
<p>When a record isn’t subject to an express retention requirement, records managers must balance business needs and legal risks to determine an appropriate retention period. To do this, records managers must ask how long their organization may need to justify its practices. This can mean turning to applicable statutes of limitation for guidance.</p>
<p>While statutes of limitations are not legal retention requirements, they’re a good measure of the time you may be called on by data privacy regulators or consumers to show compliance. Under the CPPA, administrative actions must generally be commenced within five years. The Illinois Supreme Court also in February clarified the general statute of limitations for civil claims under the state’s Biometric Information and Privacy Act (BIPA) is five years. But oftentimes, business need necessitates retention for longer than any regulatory or legal need, so whether to use an applicable statute of limitations as your retention benchmark must be evaluated on a case-by-case basis.</p>
<p><strong>Conclusion</strong></p>
<p>When setting retention periods, it’s crucial to understand the types of records your organization generates and which laws apply to these records. But knowing an organization’s specific regulatory and jurisdictional retention requirements, as well as balancing business needs and risk to determine retention periods, is something records and information management professionals have plenty of experience doing. For data privacy records compliance, it’s a matter of applying some trusted and familiar tools to a new set of records.</p>
<p>As privacy regulation expands, expect a lack of comprehensive privacy compliance recordkeeping to be a big part of regulatory actions. As a RIM professional, you can play a crucial role in ensuring your organization isn’t among those involved in these actions.</p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Breach of Security Safeguards Regulations (SOR/2018-64) (amended Nov. 1, 2018): <a href="https://laws-lois.justice.gc.ca/eng/regulations/SOR-2018-64/page-1.html#h-858504" data-wpel-link="external" rel="external noopener noreferrer">https://laws-lois.justice.gc.ca/eng/regulations/SOR-2018-64/page-1.html#h-858504</a></p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> Iowa Code 2023, Section 715C.2(6): (<a href="https://www.legis.iowa.gov/docs/code/715C.2.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://www.legis.iowa.gov/docs/code/715C.2.pdf</a>)</p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> Cal. Code Regs. tit. 11 § 7101(a).</p>
<p><a href="https://www.zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> 4 CCR 904-3-6.11.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&amp;linkname=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&amp;linkname=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&amp;linkname=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fnavigating-retention-of-data-privacy-compliance-records-zasio%2F&#038;title=Navigating%20Retention%20of%20Data%20Privacy%20Compliance%20Records" data-a2a-url="https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/" data-a2a-title="Navigating Retention of Data Privacy Compliance Records" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/" data-wpel-link="internal">Navigating Retention of Data Privacy Compliance Records</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/navigating-retention-of-data-privacy-compliance-records-zasio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023</title>
		<link>https://zasio.com/cyber-security-nydfas-privacy-security-zasio/</link>
					<comments>https://zasio.com/cyber-security-nydfas-privacy-security-zasio/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 01 May 2023 18:15:52 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Frank Fazzio]]></category>
		<category><![CDATA[Frank Fazzio]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=333</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/cyber-security-nydfas-privacy-security-zasio/" data-wpel-link="internal">Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><p>Since 2017, the New York Department of Financial Services (NYDFS) cybersecurity regulation has established minimum cybersecurity requirements for financial services companies that are licensed or registered by NYDFS. The regulation is set to be updated<a href="https://www.zasio.com/cyber-security-nydfas-privacy-security-zasio/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> in 2023 to address the ever-increasing sophistication and scope of cyber threats. NYDFS issued a draft regulation last November, and the public comment period ended on Jan. 9. NYDFS is currently reviewing those comments, and a final rule is expected later this year.</p>
<p>Just like California’s emissions regulations’ far-reaching impact on the national auto industry, the cybersecurity regulation has altered the information security practices of financial services companies both domestically and, due to the global reach of the U.S. financial system, internationally. There’s little doubt the updated regulation will have the same effect.</p>
<p>Effective information governance plays a crucial role in complying with the NYDFS cybersecurity rules by managing the storage, maintenance, and retention of sensitive information. This article explores the most relevant updates to the NYDFS cybersecurity rules for records management professionals.</p>
<h2>Company Risk Tiers</h2>
<p>The proposed updated NYDFS cybersecurity regulation establishes three tiers of companies (previously, there were two) with targeted requirements tailored to the unique security needs of financial institutions of varying sizes. A new “Class A” designation applies to companies with at least $20 million in gross annual revenue in New York, $1 billion in gross annual revenue globally, and more than 2,000 employees. The proposal raises the threshold for the lowest tier to exempt companies with fewer than 20 personnel (previously, 10) and less than $15 million in assets (previously, $10 million).</p>
<h2>Strengthened Controls</h2>
<p>Although the current regulation requires robust cybersecurity policies and procedures, the proposed revision will require an even more comprehensive approach. The proposed revision would specifically cover data retention and device end-of-life management, remote access, security monitoring, security awareness and training, incident notification, and vulnerability management. Regulated entities would also need a comprehensive and continuously updated inventory of information assets, with detailed information about ownership, controls, sensitivity levels, support, and recovery time requirements.</p>
<p>The existing regulation already required user access to be appropriately limited. Under the proposed revision, however, these limitations would need to be significantly more detailed. For example, access privileges could not exceed those required to fulfill job responsibilities and privileged accounts could be used only when necessary. Also, regulated companies would need to review privileges at least annually, configure remote access protocols securely, and withdraw an employee’s access swiftly following their departure. Further, multi-factor authentication would be broadly required, rather than merely recommended, for remote access to company information systems, third-party applications, and all privileged accounts that do not already have equivalent or more stringent controls.</p>
<p>Additionally, Class A companies must use automated methods to prohibit commonly used passwords and employ a dedicated privileged access management solution. Moreover, Class A companies would need to conduct an annual independent audit of their cybersecurity program and engage external experts for a full risk assessment every three years.</p>
<h2>Increased Governance &amp; Accountability</h2>
<p>The updates also extend to company governance. A company’s board of directors or similar governing body, if it has one, would need to oversee and direct the company’s cybersecurity risk management, require executives to develop an appropriate cybersecurity program, and obtain sufficient knowledge to conduct oversight effectively, including, if necessary, by hiring experts. Executives must review and approve cybersecurity policies annually.</p>
<p>Financial institutions were already required to have a chief information security officer (“CISO”); that individual must now have the authority to direct resources to ensure cybersecurity risks are appropriately managed. Companies also must require the CISO to report any material issues to the governing body.</p>
<h2>Enhanced Risk Assessments &amp; Incident Planning</h2>
<p>Risk assessments and preparedness are another area of the regulation that is set to expand. The regulation currently directs companies to establish a cybersecurity incident response plan that outlines steps to take in the event of a breach. That plan must now be proactive, with measures to investigate and mitigate incidents and ensure operational resilience via incident response, business continuity, and disaster recovery planning and identify and memorialize measures to mitigate the risk of breach and ensure operational resilience.</p>
<p>For example, companies must now conduct a penetration test that specifically covers internal and external attack vectors from both inside and outside the information systems’ boundaries, and develop automated scans or manual reviews to discover, analyze, and report on potential vulnerabilities. Under the proposed revision, companies should also establish a monitoring process that promptly notifies them of security vulnerabilities, remediates them, and documents material issues.</p>
<p>Records management professionals must work with their IT and security teams to develop plans that address each of these components for the information repositories they oversee and their role in the event of a security incident. This includes identifying the type of information that has been compromised, determining the extent of the breach and whether sensitive information is impacted, and reporting the breach to the appropriate authorities.</p>
<h2>Recordkeeping and Records Management Professionals</h2>
<p>As with any regulation, compliance cannot stop at implementation; it must also be well-documented. The current regulation requires companies to maintain records of their cybersecurity program and activities for at least five years. Under the proposed update, the scope of those records will increase. Records management professionals must ensure that these records are maintained in a secure and accessible manner. Companies must ensure that they have in place adequate policies and procedures for the storage, maintenance, and retention of cybersecurity records. Records also must be readily accessible to authorized parties and protected against unauthorized access, alteration, or destruction.</p>
<h2>Conclusion</h2>
<p>The updates to the NYDFS cybersecurity regulation further develop the minimum cybersecurity requirements for financial services companies that are licensed or registered by NYDFS. Records management professionals play a critical role in complying with the regulation by ensuring that sensitive information is properly protected, incident response plans are in place, and records are properly maintained and protected. By collaborating with other teams, especially IT and security, to develop and implement cybersecurity and related policies and procedures, records management professionals can help their companies satisfy NYDFS cybersecurity requirements and better protect sensitive information from cyber threats.</p>
<p><a href="https://www.zasio.com/cyber-security-nydfas-privacy-security-zasio/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> https://dfs.ny.gov/system/files/documents/2022/10/rp23a2_text_20221109_0.pdf</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" src="https://cdn.zasio.com/wp-content/uploads/2023/05/Frank-01-96x96-1.png" alt="Author: Frank Fazzio, IGP, CRM" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Frank Fazzio, IGP, CRM</h4>
					<p class="et_pb_member_position">Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&amp;linkname=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&amp;linkname=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&amp;linkname=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fcyber-security-nydfas-privacy-security-zasio%2F&#038;title=Staying%20One%20Step%20Ahead%20of%20Cyber%20Criminals%3A%20NYDFS%20Updating%20Cybersecurity%20Regulation%20for%202023" data-a2a-url="https://zasio.com/cyber-security-nydfas-privacy-security-zasio/" data-a2a-title="Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/cyber-security-nydfas-privacy-security-zasio/" data-wpel-link="internal">Staying One Step Ahead of Cyber Criminals: NYDFS Updating Cybersecurity Regulation for 2023</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/cyber-security-nydfas-privacy-security-zasio/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Managing Means Securing: Information Security for RIM Professionals</title>
		<link>https://zasio.com/managing-information-security-rim-professionals/</link>
					<comments>https://zasio.com/managing-information-security-rim-professionals/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 11 Apr 2023 16:28:31 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Will Fletcher]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Will Fletcher]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=117</guid>

					<description><![CDATA[<p>It’s Monday morning and you’ve logged in to start working on your inbox. One email jumps out first: over the weekend a sales team member had their company laptop and a thumb drive stolen at a coffee shop. Or, they accidentally left it there—they’re not quite sure how it got away. Regardless, a Good Samaritan has just dropped off both at reception. But they left without leaving a name or saying much of anything. In another email, you learn an engineer realized they accidentally sent two large customer files early last week…to the wrong customer. Follow-ups to the recipient and their team have gone unanswered. A third email mentions someone from recruiting managed to check out several hard copy HR files the day before being terminated for cause. The files were not returned. Emails to the former employee’s personal address are bouncing, and they are believed to have started some travel abroad. It’s looking to be a fun week, and some questions start to race into your mind: Are any of these incidents a data breach? Was customer confidential information exposed? What about sensitive personal information or company trade secrets? Does your organization have any notification obligations, and to whom? [&#8230;]</p>
<p>The post <a href="https://zasio.com/managing-information-security-rim-professionals/" data-wpel-link="internal">Managing Means Securing: Information Security for RIM Professionals</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>It’s Monday morning and you’ve logged in to start working on your inbox. One email jumps out first: over the weekend a sales team member had their company laptop and a thumb drive stolen at a coffee shop. Or, they accidentally left it there—they’re not quite sure how it got away. Regardless, a Good Samaritan has just dropped off both at reception. But they left without leaving a name or saying much of anything.</p>
<p>In another email, you learn an engineer realized they accidentally sent two large customer files early last week…to the wrong customer. Follow-ups to the recipient and their team have gone unanswered. A third email mentions someone from recruiting managed to check out several hard copy HR files the day before being terminated for cause. The files were not returned. Emails to the former employee’s personal address are bouncing, and they are believed to have started some travel abroad.</p>
<p>It’s looking to be a fun week, and some questions start to race into your mind:</p>
<ul>
<li>Are any of these incidents a data breach?</li>
<li>Was customer confidential information exposed? What about sensitive personal information or company trade secrets?</li>
<li>Does your organization have any notification obligations, and to whom?</li>
<li>What policies were in place relevant to these incidents and how were they violated?</li>
<li>What mitigation measures must the organization immediately take?</li>
<li>What should the organization do now to help prevent these types of things from happening again?</li>
<li>Managing records and information means keeping them secure. And these are a few of the questions that you—a records and information management professional and member of your organization’s information governance team—would need to help confront should any of these hypotheticals occur.</li>
</ul>
<p>For RIM professionals, information security is an undeniable part of the job. But for the non-security professional, learning information security can be intimidating. Fortunately, knowing a handful of basic principles will help you get a good start.</p>
<p><strong>What is Information Security?</strong></p>
<p>It helps to understand exactly what information security means. At its core, information security is about protecting your organization’s records and information from loss. Technologically complex, external threats like malware attacks tend to occupy headlines; however, RIM professionals should not discount the risks posed by internal actors, including by mere carelessness. By many estimates, insider threats—including carelessness—are the primary cause of data breaches. Even temporary and seemingly inconsequential unauthorized access or use of information can easily constitute a data breach under most definitions, which may trigger legal and contractual notice obligations. The errant hypothetical email in this article is one way information security can be compromised by accident.</p>
<p><strong>Where does information security start?</strong></p>
<p>It is helpful to think of information security as bundles of threes. The first bundle consists of the three types of security safeguards—physical, technical, and administrative, which are also commonly called controls.</p>
<ol>
<li><em><strong>Physical, technical, and administrative safeguards (PTA).</strong></em></li>
</ol>
<p>Physical safeguards are things such as closed-circuit surveillance, alarms, locks, as well as physical walls and fences. While the digital age puts IT security at the front of most peoples’ minds, it’s important to not overlook your physical security controls—particularly when it comes to physical records, as strong physical safeguards are among the best protections against loss.</p>
<p>Then there are technical safeguards, such as encryption, firewalls, security information and event management tools (SIEM), anti-virus software, and firewalls. Technical safeguards tend to be the domain of your IT security experts; however, it’s necessary for RIM professionals to have a healthy understanding of technical safeguards, how they work, and how they interact with the records and information you manage. Information governance is the mother of all collaborative efforts, so knowing your technical safeguards will only improve your ability to partner with the IT security members on your information governance team.</p>
<p>Lastly, administrative safeguards are things such as your company’s security policies and procedures, as well as employee training and education. Policies are often considered the bedrock of an information security program, and an area where you, as a RIM professional, can have significant influence when it comes to how these policies will intersect with the records and information you manage.</p>
<ol start="2">
<li><strong><em>Confidentiality, integrity, and availability (CIA).</em></strong></li>
</ol>
<p>The purpose of information security is to preserve information confidentiality, integrity, and availability. Preserving confidentiality means protecting information from unauthorized access or disclosure. Information integrity means safeguarding its authenticity, accuracy, and completeness. And information availability means knowing it will remain accessible when needed to those who have been authorized to use it. Information CIA should be your goal when developing any records and information security measure, so think thoroughly through how each measure will maintain information CIA.</p>
<ol start="3">
<li><strong><em>The three phases of information security.</em></strong></li>
</ol>
<p>Prevention, detection and response, and remediation is the last information security bundle of threes. Preventative security means taking steps to limit the risk of a breach. While it’s impossible to eliminate all risks, ensuring you have taken every reasonable step in light of the risks and the type of information you oversee is expected. Making sure your organization has proper CIA safeguards is key to ensuring your organization has adequate preventative measures. As a RIM professional, you’re most likely to be involved in the preventative side of security, but in this capacity, you may have many roles. Designing policies and procedures to protect records and information is one area where RIM professionals can contribute a lot. So is developing training and education to make sure record custodians know their security responsibilities.</p>
<p>Breaches will happen—that is a fact of life—so it is imperative you’re able to quickly detect security failures and mount an appropriate response. Essential to any detection and response strategy is having a well-vetted incident response plan. A good way to vet your incident response plan is to conduct tabletop exercises to work through scenarios like the ones in this article. Doing this will help expose flaws in your response plan, which allows you to improve it before it gets tested in real life. Your security team should be performing tabletop exercises at least annually. If you or a member of your RIM team does not participate in your company’s tabletop exercises, ask to be involved.</p>
<p>Finally, remediation means analyzing the cause of a breach and improving (again using CIA safeguards) security to make sure such a breach cannot happen again. Like prevention, remediation is an area where RIM professionals can play an important role, particularly when your organization is developing new policies and procedures, as well as educating employees on new security risks and prevention.</p>
<p><strong>Understanding Your Information is Key to Knowing What Security is Appropriate</strong></p>
<p>You’ve heard this before, but it’s worth repeating: to have any hope of securing records and information, you must know what information you have, where it’s located, and what it’s used for. A data inventory details what records and information an organization collects, stores, uses, and discloses—both internally and without outside parties. A proper data inventory will also cover both customer, proprietary, and employee data. And depending on the kind of information your organization handles, a data inventory may be legally required. Identifying data types and classifying information helps it get assigned the level of protection it needs, and in many cases, is legally required to have. Once assembled, make sure your data inventory gets regularly updated.</p>
<p><strong>Conclusion</strong></p>
<p>All of the hypotheticals at the beginning of this article could easily constitute a data breach. But with good information security, the likelihood they will result in harm, or even be able to happen in the first place, goes way down. As a RIM professional, your knowledge and skills can be a vital asset for developing and maintaining proper security for the records and information you manage.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fmanaging-information-security-rim-professionals%2F&amp;linkname=Managing%20Means%20Securing%3A%20Information%20Security%20for%20RIM%20Professionals" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fmanaging-information-security-rim-professionals%2F&amp;linkname=Managing%20Means%20Securing%3A%20Information%20Security%20for%20RIM%20Professionals" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fmanaging-information-security-rim-professionals%2F&amp;linkname=Managing%20Means%20Securing%3A%20Information%20Security%20for%20RIM%20Professionals" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fmanaging-information-security-rim-professionals%2F&#038;title=Managing%20Means%20Securing%3A%20Information%20Security%20for%20RIM%20Professionals" data-a2a-url="https://zasio.com/managing-information-security-rim-professionals/" data-a2a-title="Managing Means Securing: Information Security for RIM Professionals" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/managing-information-security-rim-professionals/" data-wpel-link="internal">Managing Means Securing: Information Security for RIM Professionals</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/managing-information-security-rim-professionals/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What is Privacy Anyway? A Brief Introduction for RIM Professionals</title>
		<link>https://zasio.com/privacy-rim-professionals/</link>
					<comments>https://zasio.com/privacy-rim-professionals/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 04 Oct 2022 21:28:58 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Will Fletcher]]></category>
		<category><![CDATA[digital records management]]></category>
		<category><![CDATA[indirect identifier]]></category>
		<category><![CDATA[information]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[public]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[Will Fletcher]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=393</guid>

					<description><![CDATA[<p>Privacy is a crucial part of records and information management. Privacy, however, can be a puzzling topic to approach. Formal RIM texts frequently contain little privacy. And a RIM professional’s first experience many times involves jumping headlong into some involved issues, and without much exposure to the foundations. This can be like being handed a pair of scrubs and pulled into the operating room without completing a surgical residency, let alone medical school. In the U.S., federal privacy laws are a potpourri of requirements that apply based on the market sector, type of entity, or type of data you’re involved with. Bringing in knowledgeable legal counsel is often essential to help navigate RIM-privacy issues. But it’s also helpful to step back and gain a greater understanding of privacy’s rich backdrop to bring your issues into sharper focus. More privacy fluency will lead to better conversations with your legal team and the departments whose records you oversee. Further, it will boost your ability to spot privacy issues in the first place. With the right knowledge (and with a knowledgeable team), RIM-privacy issues can be one of the more rewarding parts of managing a records program. With this in mind, below we’ll [&#8230;]</p>
<p>The post <a href="https://zasio.com/privacy-rim-professionals/" data-wpel-link="internal">What is Privacy Anyway? A Brief Introduction for RIM Professionals</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Privacy is a crucial part of <a href="https://zasio.com/" data-wpel-link="internal">records and information management</a>.</p>
<p>Privacy, however, can be a puzzling topic to approach. Formal RIM texts frequently contain little privacy. And a RIM professional’s first experience many times involves jumping headlong into some involved issues, and without much exposure to the foundations. This can be like being handed a pair of scrubs and pulled into the operating room without completing a surgical residency, let alone medical school.</p>
<p>In the U.S., federal privacy laws are a potpourri of requirements that apply based on the market sector, type of entity, or type of data you’re involved with. Bringing in knowledgeable legal counsel is often essential to help navigate RIM-privacy issues. But it’s also helpful to step back and gain a greater understanding of privacy’s rich backdrop to bring your issues into sharper focus. More privacy fluency will lead to better conversations with your legal team and the departments whose records you oversee. Further, it will boost your ability to spot privacy issues in the first place.</p>
<p>With the right knowledge (and with a knowledgeable team), RIM-privacy issues can be one of the more rewarding parts of managing a records program. With this in mind, below we’ll explore some privacy fundamentals for RIM professionals.</p>
<p><strong><img loading="lazy" decoding="async" class="alignnone wp-image-10810" src="https://cdn.zasio.com/wp-content/uploads/2021/06/Privacy-and-Confidentiality-01-300x150.png" sizes="(max-width: 316px) 100vw, 316px" srcset="https://cdn.zasio.com/wp-content/uploads/2021/06/Privacy-and-Confidentiality-01-300x150.png 300w, https://cdn.zasio.com/wp-content/uploads/2021/06/Privacy-and-Confidentiality-01-1024x512.png 1024w, https://cdn.zasio.com/wp-content/uploads/2021/06/Privacy-and-Confidentiality-01-768x384.png 768w, https://cdn.zasio.com/wp-content/uploads/2021/06/Privacy-and-Confidentiality-01-1536x768.png 1536w, https://cdn.zasio.com/wp-content/uploads/2021/06/Privacy-and-Confidentiality-01-2048x1024.png 2048w" alt="" width="316" height="158" /></strong></p>
<p><strong>So What is Privacy, Anyway?</strong></p>
<p>Information privacy is the rules around the collection, use, and disposal of personal information. It’s the degree of control a person has over information about them, and thus, another’s obligations with that information.</p>
<p>There are a handful of types of privacy. These include special—often called territorial—privacy (think keeping the inside of your home free from prying eyes) or communications privacy (no eavesdropping on telephone conversations). But overwhelmingly, it is information privacy—also called data privacy—that concerns the RIM profession. Still, defining privacy only gets you part of the way there. The bigger challenge is recognizing what information must be treated as personal information.</p>
<p><strong>So what is Personal Information?</strong></p>
<p>What’s considered personal information is very broad. Generally, it’s any information that can be used to identify a specific person. There are the most apparent pieces of personal information, such as an individual’s name, telephone number, or physical or email address. Audio, photos, and video of a person also often constitute their personal information. These are examples of a single data piece that directly identifies a person (a <strong>direct identifier</strong>). Personal information, however, also includes multiple data pieces that individually don’t identify a person, but taken together, can reveal much about a person. This is referred to as an <strong>indirect identifier</strong>.</p>
<p>Many indirect identifiers will fall into another category of personal information known as <strong>sensitive personal information</strong>. Examples include religious or racial information, political beliefs, health information, genetic information, or sexual orientation. Privacy laws guard sensitive personal information much more closely. Public expectations on how sensitive personal information is collected, handled, and shared are equally strict.</p>
<p>Information’s status as personal information doesn’t have to be static. Personal information ceases to be such if it has been sanitized to no longer be able to identify an individual. There are a variety of techniques to achieve this. Information is <strong>anonymized</strong> if the process is irreversible—i.e., an individual can never again be identified using it. In contrast, <strong>deidentified data</strong> has only had the known direct and indirect identifiers removed. And <strong>pseudonymized data</strong> has had only the direct identifiers removed. For deidentified and pseudonymized data, the process isn’t permanent, so it should be treated accordingly. True anonymization is difficult to achieve, and information should never be presumed to be anonymized.</p>
<p><strong>Information Privacy Has Been Around For a Long Time</strong></p>
<p>Information privacy is a hot topic right now, which can make it seem like a relatively new concept. A privacy expert of 20 years might seem like an elder statesman in many circles.</p>
<p>In reality, information privacy has been around for a long time. Notions of information privacy show up in Aristotle’s writings in the 4th century BC.<a href="https://www.zasio.com/privacy-rim-professionals/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> The Bill of Rights completed all the way back in 1791, enshrines certain information privacy rights guaranteed by the government.</p>
<p>And it was in 1890 that a young lawyer named Louis Brandeis—still decades away from becoming one of the nation’s most influential Supreme Court justices—prophetically helped write that “Numerous mechanical devices threaten to make good the prediction that ‘what is whispered in the closet shall be proclaimed from the house-tops.’”<a href="https://www.zasio.com/privacy-rim-professionals/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a></p>
<p>To put information privacy’s age in further perspective, the Privacy Act of 1974, which broadly regulates the federal government’s use of personal information, is nearing its 50th birthday. It’s the technological advances of the last few decades, though, that have made privacy a top concern. Recent technological change has drastically increased the sophistication with which personal information is collected in our digital world and the degree to which information is used to influence human behavior.</p>
<p><strong>Where Did Modern Privacy Laws Come From?—FIPs</strong></p>
<p>Fair Information Practices (FIPs)—Also called Fair Information Principles, or Fair Information Privacy Principles (FIPPs)—are sets of principles on the collection and use of personal information. FIPs are not laws, but often form the backbone of information privacy laws. Many government agencies and intergovernmental organizations developed their own FIPs during the last half-century. FIPs attempt to capture consensus on the rights and obligations surrounding personal information.<a href="https://www.zasio.com/privacy-rim-professionals/#_ftnref1" name="_ftn1" data-wpel-link="internal"></a></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-12134" src="https://cdn.zasio.com/wp-content/uploads/2022/10/Will_Graphic-1-300x168.jpg" sizes="(max-width: 882px) 100vw, 882px" srcset="https://cdn.zasio.com/wp-content/uploads/2022/10/Will_Graphic-1-300x168.jpg 300w, https://cdn.zasio.com/wp-content/uploads/2022/10/Will_Graphic-1-1024x574.jpg 1024w, https://cdn.zasio.com/wp-content/uploads/2022/10/Will_Graphic-1-768x430.jpg 768w, https://cdn.zasio.com/wp-content/uploads/2022/10/Will_Graphic-1.jpg 1098w" alt="" width="882" height="494" /></p>
<p>One consistency in all FIPs is that a person retains a level of ownership of the information about them, even though they may have chosen to expose their information to another. When managing your records program, the best way to think about personal information is that you are merely a custodian—and have a limited right to use it, along with certain obligations that go along with that use.</p>
<p>FIPs’ incorporation into information privacy laws has given these laws many common elements; nonetheless, not all data privacy laws operate the same way. There are two basic but competing approaches to information privacy laws—the comprehensive approach and the sectoral approach; both of these are described in more detail below.</p>
<p><strong>The Comprehensive Approach</strong></p>
<p>The European Union’s Global Data Protection Regulation (GDPR) (2018) is the most well-known example of comprehensive privacy law; it declares information privacy a fundamental human right. Under the GDPR’s comprehensive approach, the same privacy rules apply across commerce. It doesn’t matter what industry or market you’re in, or what type of personal data you’re handling (whether it’s personal health data or financial information) a comprehensive privacy law imposes a baseline set of rules.</p>
<p>The GDPR applies to organizations in the EU; but it also operates as an ‘extra-territorial’ law—in other words, you don’t have to be in the EU for the law to govern your collection and use of EU personal information. If a commercial organization targets individuals in the EU—such as marketing to them through a website in the U.S. or monitoring their behavior through cookies—the organization is subject to the GDPR with respect to that personal information. The GDPR also regulates the transfer of personal information outside of the EU, meaning certain conditions must be met if your U.S. organization receives the personal information of people in the EU.</p>
<p><strong>The Sectoral Approach and U.S. Privacy Laws</strong></p>
<p>Unlike comprehensive laws, federal privacy laws in the U.S. are specific to different market sectors, entities, or data types. The following are five frequently encountered sectoral U.S. privacy laws:</p>
<p><strong>HIPAA</strong>: Rules under the Health Insurance Portability and Accountability Act require that ‘covered entities (health insurance companies, most healthcare providers, and healthcare clearinghouses), must comply with a baseline set of privacy and security rules concerning personal health information. These rules also mandate that ‘business associates’ (e.g., a contractor handling personal health information for a ‘covered entity’) agree to certain privacy and security requirements.</p>
<p>Contrary to some popular perceptions, HIPAA regulates health information based on who possesses it (like your doctor’s office), and not across the board. As a result, while HIPAA requires your doctor’s office to safeguard your personal health information, it does not prevent a restaurant from requiring proof of your COVID vaccine and does not regulate your health data stored in a favorite health tracking app, like Fitbit.</p>
<p><strong>FCRA</strong>: The Fair Credit Reporting Act regulates consumer reports like the credit report created when you applied for a loan, or the background check your employer ordered when you were hired. Under FCRA, your data in a consumer report must be accurate and relevant, and you have certain rights to access and correct this information.</p>
<p><strong>GLBA</strong>: The Gramm-Leach-Bliley Act requires financial institutions to safeguard your financial information. It also requires financial institutions to notify you of their privacy policies, including what information is collected about you, with whom it is shared, and how an institution uses and disposes of it.</p>
<p><strong>CAN-SPAM</strong>: This law with a stemwinder of a title (the Control the Assault of Non-Solicited Pornography and Marketing Act of 2003) regulates commercial email. The law requires senders of commercial emails to clearly and conspicuously inform you of how to opt-out of future messages and prohibits the sender from charging a fee for exercising this right. The law also regulates to a lesser degree commercial text messaging.</p>
<p>A blunt critique of the U.S.’s sectoral approach is it’s a “cluttered mess of different rules.”<a href="https://www.zasio.com/privacy-rim-professionals/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> Efforts have been underway for some time to enact a comprehensive U.S. information privacy law. The political challenges have been steep. While Congress this year has come closer than ever to passing a comprehensive privacy law, passage is still viewed by most as a long way off. Until a comprehensive privacy law happens, the nearest thing in the U.S. is the Federal Trade Commission Act (FTCA).</p>
<p><strong>FTCA</strong>:  This law broadly prohibits unfair and deceptive commercial practices, including practices related to information privacy and security. The FTCA applies to a range of entities, from retailers to technology companies to pharmaceuticals, and even social media companies. The Act can be applied to any kind of personal information if the business entity collecting or using it is doing so in an unfair or deceptive way. The Federal Trade Commission (FTC) is the main enforcer under the FTCA, as well as a handful of other sectoral privacy laws, such as COPPA. The FTC <a href="https://www.ftc.gov/legal-library/browse/cases-proceedings" data-wpel-link="external" rel="external noopener noreferrer">maintains a website of its legal filings</a> about conduct it considers unfair and deceptive. Regularly reviewing the FTC’s complaints and orders concerning other companies’ information privacy and security practices can be a good way to stay informed about what not to do with personal information in your organization.</p>
<p><strong>State Comprehensive Privacy Laws</strong></p>
<p>Absent a comprehensive U.S. information privacy law, an increasing number of states—which currently include California, Colorado, Connecticut, Virginia, and Utah—have since 2018 enacted their own comprehensive laws. The most notable is the California Consumer Privacy Rights Act  (CCPA). In 2020, California voters passed a referendum amending the CCPA known as the California Privacy Rights Act (CPRA), which will become enforceable in 2023.</p>
<p>Like the GDPR, the CCPA/CCPRA has an ‘extraterritorial’ effect, meaning non-California businesses with sufficient ties to California consumers are subject to it. The CPRA also requires businesses subject to the law to require their contractors and service providers handling personal information—even those not otherwise subject to the law—to follow a number of information privacy and security practices.</p>
<p>The CPRA brings California’s privacy framework closer to the GDPR’s; however, there are still numerous differences between them—as well as among all data privacy laws. Accordingly, compliance with one should never be presumed to be compliance with another, and each deserves detailed scrutiny before deciding on a compliance strategy.</p>
<p><strong><img loading="lazy" decoding="async" class="alignnone wp-image-5006" src="https://cdn.zasio.com/wp-content/uploads/2018/02/Data-Privacy-and-Protection-300x200.jpg" sizes="(max-width: 294px) 100vw, 294px" srcset="https://cdn.zasio.com/wp-content/uploads/2018/02/Data-Privacy-and-Protection-300x200.jpg 300w, https://cdn.zasio.com/wp-content/uploads/2018/02/Data-Privacy-and-Protection-768x512.jpg 768w, https://cdn.zasio.com/wp-content/uploads/2018/02/Data-Privacy-and-Protection-1024x683.jpg 1024w" alt="Privacy protection with Zasio Records Management Software at the 2018 Global Privacy Summit" width="294" height="196" /></strong></p>
<p><strong>The Bottom Line for RIM Professionals</strong></p>
<p>If you’ve read this far you know there’s a lot to just scratch the surface on information privacy. Yet, despite an ever-changing privacy landscape, a few faithful takeaways exist to help you better incorporate privacy into your RIM practices:</p>
<ul>
<li><strong>Neither the GDPR, the CCPA/CPRA, nor any other major privacy law set a retention period for personal information</strong>. Instead, these laws require your organization keep personal information only as long as necessary to accomplish the purpose for which it was collected it. This principle creates conflict with records retention laws that can set lengthy minimum retention periods. It also conflicts with many organizations’ habits of wanting to hold on to a lot of information, sometimes indefinitely. Ultimately, you must balance the need to preserve records with the need to delete personal information within the record.</li>
<li><strong>Define personal information in your organization broadly</strong>. When defining what personal information your organization possesses, remember that there are often numerous ways to combine data that would cause it to be able to identify someone. The safer approach—and often the legally required approach—is to generally define personal information broadly.</li>
<li><strong>Privacy requires a mindset change about what constitutes a record</strong>. With privacy as part of a records program, you must avoid thinking about records narrowly. It can be helpful to think of any information with more than a transient value as a record. Focus on managing all information rather than just documents.</li>
<li><strong>Privacy involves taking some educated risks</strong>. Many privacy laws have been on the books for decades; others, like the GDPR and the CCPA/CPRA, have sprung like a geyser in the past five years—and what they require remains uncertain in a number of contexts. For records programs, setting retention periods and handling requirements to records series can sometimes be done with a cut-and-dried approach. Accounting for privacy requirements, though, involves being comfortable with more legal ambiguities—a prime example of this often includes determining how long is no longer than necessary to retain personal information. This means setting a risk tolerance and being more comfortable with operating in gray areas.</li>
<li><strong>Inventory (‘Map’) your personal information</strong>. To have any hope of having a privacy-compliant RIM program, it’s essential to know what kinds of personal information you have and where it resides in your different electronic databases, paper files, records series, and elsewhere. It also means being able to access that personal information should a data owner exercise a right—such as the right to correction or deletion—under an applicable data privacy law.</li>
<li><strong>Isolate personal information as best you can</strong>. Keeping personal information in known, centralized databases wherever practicable is a good practice. Avoid creating unnecessary duplicates of this information. Restrict access to personal information to those whose job requires it. And where possible, keep personal information from being included in your records in the first place.</li>
<li><strong>Security</strong>. Security is fundamental to privacy, and you must keep security in the front of your mind when making any RIM-privacy decision. Data privacy laws generally require security appropriate to the records and the risks. However, there is no base security program spelled out in privacy laws, nor is there one appropriate to all situations. You must determine what appropriate security means in each situation.</li>
<li><strong>Keep Learning About Privacy</strong>. Data privacy laws will continue to grow and impact records and information management. How your organization gathers and uses personal information will also change. Accordingly, RIM managers will need to grow their privacy fluency in step to make sure legal requirements, not to mention public expectations, are properly reflected. But privacy can be enjoyable, and again, with the right knowledge and an informed team, will be one of the most rewarding aspects of RIM.</li>
</ul>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/privacy-rim-professionals/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> <em>See</em> Swanson, Judith A. The Public and Private in Aristotle’s Political Philosophy (1992 Cornell University Press).</p>
<p><a href="https://www.zasio.com/privacy-rim-professionals/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> The Right to Privacy, Samuel D. Warren; Louis D. Brandeis, Harvard Law Review, Vol. 4, No. 5 (Dec. 15, 1890).</p>
<p><a href="https://www.zasio.com/privacy-rim-professionals/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> The State of Consumer Data Privacy Laws in the US (And Why It Matters), Thorin Klosowski, <a href="https://www.nytimes.com/wirecutter/blog/state-of-privacy-laws-in-us/" data-wpel-link="external" rel="external noopener noreferrer">NY Times</a> (published Sept. 6, 2021).</p>
<p><em>Zasio is an <a href="https://zasio.com/technology-solutions/" data-wpel-link="internal">information governance software</a>, SaaS, and <a href="https://zasio.com/consulting-services/" data-wpel-link="internal">consulting company</a> based in Boise, Idaho. Zasio is not a law firm and does not provide legal advice or services. This material is for informational purposes only and not for the purpose of providing legal or other professional advice.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fprivacy-rim-professionals%2F&amp;linkname=What%20is%20Privacy%20Anyway%3F%20A%20Brief%20Introduction%20for%20RIM%20Professionals" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fprivacy-rim-professionals%2F&amp;linkname=What%20is%20Privacy%20Anyway%3F%20A%20Brief%20Introduction%20for%20RIM%20Professionals" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fprivacy-rim-professionals%2F&amp;linkname=What%20is%20Privacy%20Anyway%3F%20A%20Brief%20Introduction%20for%20RIM%20Professionals" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fprivacy-rim-professionals%2F&#038;title=What%20is%20Privacy%20Anyway%3F%20A%20Brief%20Introduction%20for%20RIM%20Professionals" data-a2a-url="https://zasio.com/privacy-rim-professionals/" data-a2a-title="What is Privacy Anyway? A Brief Introduction for RIM Professionals" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/privacy-rim-professionals/" data-wpel-link="internal">What is Privacy Anyway? A Brief Introduction for RIM Professionals</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/privacy-rim-professionals/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What the Heck is Privacy, Anyway? Some Foundations on Privacy Law in the U.S.</title>
		<link>https://zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/</link>
					<comments>https://zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 29 Sep 2022 21:34:27 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[RIM]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=396</guid>

					<description><![CDATA[<p>Privacy is everywhere these days. And as RIM professionals, we must be aware of how privacy laws impact records and information management. But terms like ‘sectoral versus comprehensive regulatory approach,’ ‘cross contextual behavioral advertising,’ and many, different—and often convoluted—definitions of ‘personal data’ can make privacy a difficult topic to stay engaged in. Thankfully, for RIM professionals, privacy doesn’t have to be overwhelming, and an introduction to—or review of—the basics can go a long way. Join Zasio’s Will Fletcher, legal counsel, for this informative webinar.</p>
<p>The post <a href="https://zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/" data-wpel-link="internal">What the Heck is Privacy, Anyway? Some Foundations on Privacy Law in the U.S.</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p>Privacy is everywhere these days. And as RIM professionals, we must be aware of how privacy laws impact records and information management. But terms like ‘sectoral versus comprehensive regulatory approach,’ ‘cross contextual behavioral advertising,’ and many, different—and often convoluted—definitions of ‘personal data’ can make privacy a difficult topic to stay engaged in.</p>
<p>Thankfully, for RIM professionals, privacy doesn’t have to be overwhelming, and an introduction to—or review of—the basics can go a long way.</p>
<p>Join Zasio’s <a href="https://www.zasio.com/dt_team/will-fletcher/" data-wpel-link="internal">Will Fletcher</a>, legal counsel, for this informative webinar.</p>
<p><img loading="lazy" decoding="async" class="vc_single_image-img attachment-thumbnail" title="Will Fletcher2" src="https://cdn.zasio.com/wp-content/uploads/2022/09/Will-Fletcher2-150x150.png" sizes="(max-width: 150px) 100vw, 150px" srcset="https://cdn.zasio.com/wp-content/uploads/2022/09/Will-Fletcher2-150x150.png 150w, https://cdn.zasio.com/wp-content/uploads/2022/09/Will-Fletcher2-24x24.png 24w, https://cdn.zasio.com/wp-content/uploads/2022/09/Will-Fletcher2-48x48.png 48w, https://cdn.zasio.com/wp-content/uploads/2022/09/Will-Fletcher2-96x96.png 96w, https://cdn.zasio.com/wp-content/uploads/2022/09/Will-Fletcher2-300x300.png 300w" alt="" width="150" height="150" data-dt-location="https://www.zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/will-fletcher2/" /></p>
<a href="" class="small-button smallorange" data-wpel-link="internal">Watch the Webinar!</a>
</div>
</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fwhat-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s%2F&amp;linkname=What%20the%20Heck%20is%20Privacy%2C%20Anyway%3F%20Some%20Foundations%20on%20Privacy%20Law%20in%20the%20U.S." title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fwhat-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s%2F&amp;linkname=What%20the%20Heck%20is%20Privacy%2C%20Anyway%3F%20Some%20Foundations%20on%20Privacy%20Law%20in%20the%20U.S." title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fwhat-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s%2F&amp;linkname=What%20the%20Heck%20is%20Privacy%2C%20Anyway%3F%20Some%20Foundations%20on%20Privacy%20Law%20in%20the%20U.S." title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fwhat-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s%2F&#038;title=What%20the%20Heck%20is%20Privacy%2C%20Anyway%3F%20Some%20Foundations%20on%20Privacy%20Law%20in%20the%20U.S." data-a2a-url="https://zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/" data-a2a-title="What the Heck is Privacy, Anyway? Some Foundations on Privacy Law in the U.S." data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/" data-wpel-link="internal">What the Heck is Privacy, Anyway? Some Foundations on Privacy Law in the U.S.</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/what-the-heck-is-privacy-anyway-some-foundations-on-privacy-law-in-the-u-s/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Utah Becomes Newest State to Adopt Consumer Privacy Law</title>
		<link>https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/</link>
					<comments>https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Fri, 20 May 2022 19:16:53 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Heather Rice]]></category>
		<category><![CDATA[consumer privacy legislation]]></category>
		<category><![CDATA[Heather Rice]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[personal data]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[record keeping software]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[UCPA]]></category>
		<category><![CDATA[Utah Consumer Privacy Act]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=438</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/" data-wpel-link="internal">Utah Becomes Newest State to Adopt Consumer Privacy Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">On March 24, 2022, the <a href="https://le.utah.gov/~2022/bills/static/SB0227.html" data-wpel-link="external" rel="external noopener noreferrer">Utah Consumer Privacy Act (UCPA)</a> was signed into law by Governor Spencer J. Cox, making Utah the fourth state, behind California, Virginia, and Colorado, to pass comprehensive consumer privacy legislation.</p>
<p><strong>The UCPA’s Applicability</strong></p>
<p><strong> </strong>The UCPA applies to entities that:</p>
<ul>
<li>conduct business in Utah or produce products and services that target Utah residents;</li>
<li>have an annual revenue of $25 million or more; and</li>
<li>either controls or processes the personal data of at least 100,000 Utah residents or derives 50% of its revenue from the sale of personal data and controls or processes the data of over 25,000 Utah residents.</li>
</ul>
<p>There are also a number of exemptions under the UCPA, including, government agencies, institutions of higher education, non-profit corporations, and entities regulated under the Health Insurance Portability and Accountability Act (HIPAA).</p>
<p><strong>What Rights Do Consumer Have Under the UCPA?</strong></p>
<p>Utah residents have the following rights under the UCPA:</p>
<ul>
<li>Access: Right to confirm whether a controller is processing the consumer’s personal data and access to that data.</li>
<li>Deletion: Right to delete the personal data provided to the controller.</li>
<li>Portability: Right to obtain copies of the personal data provided to the controller in a format that is portable, usable, and transmittable.</li>
<li>Opt-Out: Right to opt-out of the processing of personal data for targeted advertising or sale of personal data.</li>
</ul>
<p><strong>Responsibilities for Processors and Controllers</strong></p>
<p>The UCPA specifies the following responsibilities for processors and controllers:</p>
<ul>
<li>Contracts between processors and controllers shall be established before processors begin processing information on behalf of a controller. The contract should provide the instructions for processing personal data, the purpose, type of data being processed, the duration, and the rights and obligations of the parties. The contract should also ensure confidentiality by the processor in relation to the personal data being processed. Any subcontractors must also enter into a contract and abide by the same obligations as the processor.</li>
<li>Controllers shall provide consumers with a privacy notice that includes:</li>
<li>categories of personal data processed by the controller;</li>
<li>purpose of processing the personal data;</li>
<li>how consumers may exercise their rights;</li>
<li>categories of personal data that are shared with third parties;</li>
<li>categories of third parties with whom the controller shares personal data; and</li>
<li>the manner in which consumers may exercise the right to opt-out of the sale of personal data or processing for targeted advertising.</li>
<li>Establish data security practices to protect the confidentiality of personal data and reduce the risk of harm to consumers in relation to the processing of their personal data.</li>
<li>Controllers may not process data collected from a consumer without providing notice and the opportunity to opt-out of the processing.</li>
<li>Controllers may not discriminate against consumers for exercising their rights by denying goods or services, charging different prices to consumers for goods or services, or providing the consumer with a different quality of goods or services.</li>
</ul>
<p><strong>UCPA Enforcement</strong></p>
<p>The Utah attorney general has the exclusive right to enforce actions under the UCPA (i.e., consumers do not have a private right of action against business for UCPA violations). Violators of the law have a 30-day cure period upon receipt of written notification before the attorney general initiates any actions against the controller or processor. Uncured or continued violations are subject to penalties up to $7,500 per violation and may be responsible for payment of damages to the attorney general to be deposited into the Consumer Privacy Account.</p>
<p><strong>The UCPA’s Effective Date</strong></p>
<p>The UCPA becomes effective on December 31, 2023, giving businesses a grace period to adjust their operations. While this may seem far off, don’t underestimate the amount of time it can take for a business to adjust its practices to be legally compliant. Instead, contact Zasio to find out how you can help bring your business into compliance with this new law, as well as other comprehensive state privacy laws.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_1 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/05/Heather-Rice-01-96x96-1.jpg" alt="Author: Heather Rice" class="wp-image-2088" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Heather Rice</h4>
					<p class="et_pb_member_position">Senior Research Analyst / Certified Paralegal</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&amp;linkname=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&amp;linkname=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&amp;linkname=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Futah-becomes-newest-state-to-adopt-consumer-privacy-law%2F&#038;title=Utah%20Becomes%20Newest%20State%20to%20Adopt%20Consumer%20Privacy%20Law" data-a2a-url="https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/" data-a2a-title="Utah Becomes Newest State to Adopt Consumer Privacy Law" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/" data-wpel-link="internal">Utah Becomes Newest State to Adopt Consumer Privacy Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/utah-becomes-newest-state-to-adopt-consumer-privacy-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Power to the PIPL? A Rundown of China’s New Personal Information Protection Law</title>
		<link>https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/</link>
					<comments>https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 30 Sep 2021 20:20:08 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Jared Walker]]></category>
		<category><![CDATA[China’s privacy laws]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[Jared Walker]]></category>
		<category><![CDATA[Personal Information Protection Law of the People’s Republic of China]]></category>
		<category><![CDATA[personal information rights]]></category>
		<category><![CDATA[PIPL]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[record retention consulting]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=495</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/" data-wpel-link="internal">Power to the PIPL? A Rundown of China’s New Personal Information Protection Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">On August 20, 2021, China adopted the <a href="http://www.npc.gov.cn/npc/c30834/202108/a8c4e3672c74491a80b53a172bb753fe.shtml" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Personal Information Protection Law of the People’s Republic of China</a> (“PIPL”), its first comprehensive national data privacy law and one of the most sweeping and restrictive national privacy laws to date. Modeled largely off the GDPR and set to go into effect on November 1, the PIPL regulates personal information collected or transferred both inside and outside of China. It also comes with harsh penalties for non-compliance and gives broad powers to China’s state authorities to enforce the law.</p>
<p>The PIPL is expected to significantly impact how companies (especially tech companies) do business in China. Aimed at protecting the online user data of Chinese citizens, the law will directly affect companies located in China that handle personal data. But even companies operating outside of China may be subject to the law if they provide products or services to people in China, analyze or evaluate activities of people in China, or fall under circumstances described in certain other laws or administrative regulations.</p>
<p>Without further ado, let’s quickly dive into some of the law’s major provisions:</p>
<p><strong>In General</strong></p>
<p>The PIPL defines personal information to include, similar to the GDPR, “all kinds of information related to an identified or identifiable natural person, recorded electronically or by other means, excluding anonymized information.”</p>
<p>The handling of personal information includes “collection, storage, use, processing, transmission, provision, disclosure, or deletion of personal information.”</p>
<p>Under the PIPL, personal information should only be processed for a clear and reasonable purpose, to the smallest scope possible related to that purpose, and in a method with the least impact on personal rights. Personal information processing must also follow principles of openness and transparency, as well as rules of disclosure. These general principles largely mirror <a href="https://gdpr-info.eu/art-5-gdpr/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">GDPR principles</a> of fairness, transparency, and limitations on processing of personal data.</p>
<p><strong>Personal Consent</strong></p>
<p>Personal information handlers (the PIPL equivalent of data processors under the GDPR) must obtain personal consent from the data subject to process personal information, unless the data is processed under a specific listed exception. Those exceptions include contract performance, statutory duties or obligations, public health emergencies, news reports or public interest, legally disclosed information, or other circumstances stipulated by laws and regulations.</p>
<p>Personal consent must also be obtained for any cross-border transfer of personal information (for more on this, see the section below that discusses notification requirements).</p>
<p>These express consent requirements break from the GDPR, which technically doesn’t require personal consent to use personal data unless (i) it is relied upon as one of the six legal bases to process personal data under <a href="https://gdpr.eu/article-6-how-to-process-personal-data-legally/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Article 6</a> of the GDPR, or (ii) is used as an exemption to transfer personal data abroad (in absence of one of the required transfer mechanisms laid out in <a href="https://gdpr-info.eu/chapter-5/" target="_blank" rel="noopener external noreferrer" data-wpel-link="external">Chapter 5</a> of the GDPR).</p>
<p><strong>Data Retention</strong></p>
<p>Similar to the GDPR, the retention of personal information under the PIPL must be the shortest time necessary to achieve the purpose of processing. This time may vary depending on the data processed and any laws or regulations that specify specific periods.</p>
<p><strong>Notification Requirements</strong></p>
<p>Before processing personal information, personal information handlers must inform the data subject of the information being processed and the data subject’s rights concerning this information. For sensitive information, personal information handlers must also notify the data subject of the processing’s necessity.</p>
<p>For any information processed outside of China, a personal information handler must inform the data subject of the overseas recipient, their contact information, and certain processing information such as processing purpose, processing method, and the types of personal information being processed. The personal information handler must also obtain the individual’s specific consent to process after giving notice.</p>
<p><strong>Cross-border Transfer of Information</strong></p>
<p>Before a handler can transfer personal information outside of China, they must first meet one of the following requirements:</p>
<ul>
<li>pass a security assessment organized by the Cyberspace Administration of China (“CAC”), the country’s central internet control agency;</li>
<li>conduct a personal information protection certification;</li>
<li>form a contract with the overseas recipient that stipulates the rights and obligations of both parties, or</li>
<li>meet other conditions required by law, administrative regulations, or the CAC.</li>
</ul>
<p>Further, personal information handlers must ensure that any personal information processing by overseas recipients meets PIPL standards.</p>
<p>Also, operators of “critical information infrastructure” and personal information handlers processing personal information up to an as-of-yet unspecified threshold (which will be prescribed by the national cybersecurity and informatization department) must store the personal information collected and generated within the territory of the People’s Republic of China. This information may not leave China unless it first passes a security assessment organized by the national cybersecurity and informatization department.</p>
<p>Moreover, personal information handlers may not provide personal data stored in China to foreign judicial or law enforcement agencies without first receiving approval from a competent authority within the Chinese government. This requirement will certainly result in conflicts between Chinese authorities and non-Chinese courts as well as plenty of judicial wrangling among litigants in lawsuits involving Chinese companies.</p>
<p><strong>Individual rights</strong></p>
<p>Just like under the GDPR, data subjects in China have various rights concerning their personal information. These include the right to: know and make decisions about their information’s processing; consult and copy their personal information; request that personal information be corrected or supplemented; request deletion (in certain cases); and request the personal information processing rules of personal information handlers.</p>
<p><strong>Obligations of personal information handlers</strong></p>
<p>Personal information handlers must implement internal management systems and security measures to protect personal data. Processors of personal information up to the threshold must appoint a person in charge of personal information protection. Processors outside of China must establish designated agencies or representatives within Chinese territories to handle intra-territorial personal data processing matters.</p>
<p>Personal information handlers must also regularly conduct compliance audits as well as impact assessments for things like processing sensitive personal data, using personal data in automated decision-making, or providing information to other personal information handlers. These impact assessments must be kept for at least 3 years.</p>
<p><strong>Breach notification</strong></p>
<p>If any personal information has been leaked, tampered with, or lost, the personal information handler must immediately notify the relevant departments (the CAC or relevant departments of the State Council) and individuals performing personal information protection duties. In some cases, personal information subjects might also be notified.</p>
<p><strong>Legal Liability and Penalties</strong></p>
<p>The department performing personal information protection duties has the power to order corrections, give warnings, confiscate illegal gains, and issue fines for information processed in violation of the law. Fines can range to up to 1 million yuan for offenders who refuse to make corrections, and between 10,000 and 100,000 yuan for directly responsible persons.</p>
<p>For serious violations, fines can be issued for up to 50 million yuan or up to 5 percent of the processor’s previous year turnover. Furthermore, the department can order the suspension of a business or notify a relevant competent authority to revoke a business permit or license, in addition to issuing additional fines.</p>
<p>Moreover, foreign organizations that violate the personal information rights of Chinese citizens or harm China’s national security or public interests can be blacklisted by the CAC. This also will result in the offending organization being restricted or prohibited from possessing personal information. In addition to everything else, illegal acts will be recorded in the social credit system and publicized.</p>
<p>In some cases, where the rights and interests of many individuals have been infringed, certain entities may file a lawsuit in the people’s court. These entities include the people’s procuratorate, consumer organizations specified in the PIPL, and organizations identified by the CAC.</p>
<p><strong>Exceptions</strong></p>
<p>The law does not apply to natural persons handling personal information for personal or family affairs.</p>
<p><strong>Final Thoughts</strong></p>
<p>We have yet to see exactly how the PIPL will impact the way we conduct business generally, but it is on course to significantly affect companies large and small, both inside and outside of China. If you are doing business in China or with people in China, it may well be worth your while to proactively study up on the law, determine what type of impact it might have on your business, seek legal guidance as necessary, and prepare and implement PIPL-compliant policies and strategies to manage Chinese personal data processed within your organization. A bit of up-front planning can go a long way in giving peace of mind – not to mention helping to avoid costly legal or compliance concerns down the road.</p>
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> to explore the various software and consulting solutions we offer, to address your personal data and privacy needs.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_2 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/05/Jared-Walker-01-96x96-1.png" alt="Author: Jared Walker, JD" class="wp-image-2021" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jared Walker, JD</h4>
					<p class="et_pb_member_position">Senior Research Analyst, Team Lead / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&amp;linkname=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&amp;linkname=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&amp;linkname=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fpower-to-pipl-rundown-chinas-new-personal-information-protection-law%2F&#038;title=Power%20to%20the%20PIPL%3F%20A%20Rundown%20of%20China%E2%80%99s%20New%20Personal%20Information%20Protection%20Law" data-a2a-url="https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/" data-a2a-title="Power to the PIPL? A Rundown of China’s New Personal Information Protection Law" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/" data-wpel-link="internal">Power to the PIPL? A Rundown of China’s New Personal Information Protection Law</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/power-to-pipl-rundown-chinas-new-personal-information-protection-law/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Do You Ever Feel Like, Somebody’s Watching You? That’s Because They Are</title>
		<link>https://zasio.com/do-you-ever-feel-like-somebodys-watching-you/</link>
					<comments>https://zasio.com/do-you-ever-feel-like-somebodys-watching-you/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 13 Sep 2021 20:25:14 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[data protection laws]]></category>
		<category><![CDATA[digital records management]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[privacy laws]]></category>
		<category><![CDATA[record keeping software]]></category>
		<category><![CDATA[record retention consulting]]></category>
		<category><![CDATA[record retention periods]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=501</guid>

					<description><![CDATA[<p>With video surveillance becoming less expensive and more widely available, our images are increasingly recorded. But things are not as Orwellian as they seem. Even before drones, dashcams or video doorbells became everyday items, regulators established requirements for video surveillance. How long an entity can retain images depends on several things, including the areas the cameras cover, the type of business capturing the image, and the events captured. Most international video surveillance requirements are not found in regulations, directives, or statutes. Rather, these requirements are frequently governed by data protection authorities through guidelines, decisions, or standards. But don’t let these titles fool you about their enforceability. Data protection authorities view these guidelines at the very least as best practices, and EU member states reference them when sanctioning and fining an entity for non-compliance. Video Surveillance Coverage: Areas and Businesses Generally, businesses using video surveillance are required to inform the public they are under video surveillance, in line with many data protection laws which mandate data subjects be informed their data is being processed. The EU Data Protection Supervisor states these notices “are mandatory because individuals affected by video surveillance must be informed upon its installation about the monitoring, its purpose, [&#8230;]</p>
<p>The post <a href="https://zasio.com/do-you-ever-feel-like-somebodys-watching-you/" data-wpel-link="internal">Do You Ever Feel Like, Somebody’s Watching You? That’s Because They Are</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>With video surveillance becoming less expensive and more widely available, our images are increasingly recorded. But things are not as Orwellian as they seem. Even before drones, dashcams or video doorbells became everyday items, regulators established requirements for video surveillance. How long an entity can retain images depends on several things, including the areas the cameras cover, the type of business capturing the image, and the events captured.</p>
<p>Most international video surveillance requirements are not found in regulations, directives, or statutes. Rather, these requirements are frequently governed by data protection authorities through guidelines, decisions, or standards. But don’t let these titles fool you about their enforceability. Data protection authorities view these guidelines at the very least as best practices, and EU member states reference them when sanctioning and fining an entity for non-compliance.</p>
<p><strong>Video Surveillance Coverage: Areas and Businesses</strong></p>
<p>Generally, businesses using video surveillance are required to inform the public they are under video surveillance, in line with many data protection laws which mandate data subjects be informed their data is being processed. The EU Data Protection Supervisor states these notices “are mandatory because individuals affected by video surveillance must be informed upon its installation about the monitoring, its purpose, and the length of time for which the footage is to be kept and by whom.”<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a></p>
<p>Video surveillance requirements also force businesses to limit surveillance to areas like parking lots, building entrances, or streets. This does not mean surveillance cameras can cover wide swaths of these areas. Businesses are further limited to recording those areas of parking lots or building access or emergency exits that justify the protection of individuals and property.</p>
<p>Certain businesses are required to use video surveillance, such as banks, casinos, ATMs, and other financially-related businesses. Legal requirements also note that certain areas never justify video surveillance, like bathrooms, changing rooms, and pools. These areas are considered inherently private, and legal requirements recognize that data subjects deserve a heightened level of legal protection from video surveillance.</p>
<p><strong>Incident Versus Non-Incident</strong></p>
<p>In the legal realm, there are two main types of surveillance that regulators are looking at: incident and non-incident camera footage. Whether footage captures evidence of an incident will determine the retention period for that section. Most recordkeeping requirements set a minimum amount of time records must be retained. Recordkeeping requirements for video surveillance, however, typically set a maximum amount of time these images can be kept. Incident-capturing footage requirements follow this same method but may allow for slightly longer retention periods. For example, Greece doubles the amount of time businesses may keep video surveillance images following an incident. Generally, where surveillance footage does not contain images of an incident, the maximum amount of time this footage can be retained may be a few months, weeks, days, or hours.<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a></p>
<p>EU member states have some of the strictest requirements when it comes to video surveillance. For example, under Austrian law, images may be retained no longer than 72 hours.<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> In Germany, this period is 48 hours.<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a> And in Italy, video surveillance must not be retained longer than 24 hours.<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn5" name="_ftnref5" data-wpel-link="internal">[5]</a> Complying with these limitations can prove difficult when an entity does not frequently check its surveillance footage, such as over a weekend or a holiday. Accordingly, regulators acknowledge that these retention periods may require some flexibility. Some regulators also permit for a longer retention period when parties consent through written agreements.<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn6" name="_ftnref6" data-wpel-link="internal">[6]</a></p>
<p>Most legal requirements allow for longer retention when images are necessary for court proceedings or criminal investigations. However, investigating a crime or incident does not give an entity carte blanche to retain images indefinitely.<a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftn7" name="_ftnref7" data-wpel-link="internal">[7]</a> Typically, legal requirements require destruction within a few months, weeks, or days of the conclusion of an investigation or related proceedings.</p>
<p><strong>Legal Requirements Versus System Capabilities</strong></p>
<p>Video surveillance is one area where the law and technology play leapfrog. Sometimes the legal requirements are ahead of their time; sometimes technology is cutting edge. As noted, some European jurisdictions allow video surveillance retention for only hours or days. Not all video surveillance systems are created equal, and some systems do not have the capability to automatically erase footage every 24 hours. When this is the case, entities must be careful to note their surveillance footage retention periods in their notices and policies.</p>
<p><strong>Conclusion</strong></p>
<p>Whether you are a privacy-minded individual concerned about your image being captured through video surveillance or a business concerned about legal repercussions from your video surveillance practices, data protection authorities and regulators have provided guidelines on what your rights are. To learn more about how video surveillance may affect your business, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a> today.</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> <a href="https://edps.europa.eu/data-protection/data-protection/reference-library/video-surveillance_en" data-wpel-link="external" rel="external noopener noreferrer">European Data Protection Supervisor</a>, Video Surveillance, “What are the main data protection issues?”</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> <a href="https://edpb.europa.eu/sites/default/files/consultation/edpb_guidelines_201903_videosurveillance.pdf" data-wpel-link="external" rel="external noopener noreferrer">EDPB Guidelines 3/2019 on processing of personal data through video devices</a> (8)(119).</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> Ordinance of the data protection authority on the exemptions from the data protection impact assessment.</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> Short Paper on Video surveillance according to the General Data Protection Regulation.</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref5" name="_ftn5" data-wpel-link="internal">[5]</a> Video Surveillance Decision 2010.</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref6" name="_ftn6" data-wpel-link="internal">[6]</a> Ordinance of the data protection authority on the exemptions from the data protection impact assessment.</p>
<p><a href="https://www.zasio.com/do-you-ever-feel-like-somebodys-watching-you/#_ftnref7" name="_ftn7" data-wpel-link="internal">[7]</a> <a href="https://edps.europa.eu/sites/default/files/publication/10-03-17_video-surveillance_guidelines_en.pdf" data-wpel-link="external" rel="external noopener noreferrer">EDPS Guidelines on video-surveillance</a> (7.1.1).</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fdo-you-ever-feel-like-somebodys-watching-you%2F&amp;linkname=Do%20You%20Ever%20Feel%20Like%2C%20Somebody%E2%80%99s%20Watching%20You%3F%20That%E2%80%99s%20Because%20They%20Are" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fdo-you-ever-feel-like-somebodys-watching-you%2F&amp;linkname=Do%20You%20Ever%20Feel%20Like%2C%20Somebody%E2%80%99s%20Watching%20You%3F%20That%E2%80%99s%20Because%20They%20Are" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fdo-you-ever-feel-like-somebodys-watching-you%2F&amp;linkname=Do%20You%20Ever%20Feel%20Like%2C%20Somebody%E2%80%99s%20Watching%20You%3F%20That%E2%80%99s%20Because%20They%20Are" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fdo-you-ever-feel-like-somebodys-watching-you%2F&#038;title=Do%20You%20Ever%20Feel%20Like%2C%20Somebody%E2%80%99s%20Watching%20You%3F%20That%E2%80%99s%20Because%20They%20Are" data-a2a-url="https://zasio.com/do-you-ever-feel-like-somebodys-watching-you/" data-a2a-title="Do You Ever Feel Like, Somebody’s Watching You? That’s Because They Are" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/do-you-ever-feel-like-somebodys-watching-you/" data-wpel-link="internal">Do You Ever Feel Like, Somebody’s Watching You? That’s Because They Are</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/do-you-ever-feel-like-somebodys-watching-you/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Bringing the Cloud Down to Earth</title>
		<link>https://zasio.com/bringing-the-cloud-down-to-earth/</link>
					<comments>https://zasio.com/bringing-the-cloud-down-to-earth/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 01 Mar 2017 19:07:25 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[cloud]]></category>
		<category><![CDATA[cloud privacy]]></category>
		<category><![CDATA[cloud storage]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[CPC]]></category>
		<category><![CDATA[DPC]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[Jennifer Chadband]]></category>
		<category><![CDATA[Personally Identifiable Information]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[privacy laws]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1057</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/bringing-the-cloud-down-to-earth/" data-wpel-link="internal">Bringing the Cloud Down to Earth</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">As companies of all sizes begin to store data in the cloud, privacy issues have become big news. Apple co-founder Steve Wozniak commented on the cloud, saying that “the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.”<a href="https://www.zasio.com/bringing-the-cloud-down-to-earth/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> A major problem for companies is a lack of control over data. Companies often depend on service providers to secure, protect, and maintain access to critical company information. The issues companies face as they try to keep data compliant in the cloud don’t end there. Privacy laws are more common and carry stricter requirements and penalties. This means it’s vital to comply with personally identifiable information (PII) mandates, including jurisdiction-specific requirements, no matter where your information is stored.</p>
<p>In response to jurisdictional issues and confusion over inconsistent Data Privacy Security and Transfer Requirements, a group of 44 lawyers from 32 countries took action. They created an initiative titled “The Data Privacy Compliance Cloud Privacy Check” (CPC/DPC) to provide straightforward guidance.<a href="https://www.zasio.com/bringing-the-cloud-down-to-earth/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a>  By providing a “Cloud Privacy Check process,” the CPC/DPC helps cloud users navigate data protection obligations. The questions include:</p>
<ol>
<li>Does the transaction include any personally identifiable information?</li>
<li>Does a third party involved in the setup of the cloud process have access to personal data?</li>
<li>Does the data leave the jurisdiction of the customer?</li>
<li>Is the cloud provider using subcontractors in the setup?</li>
</ol>
<p>Questions 1 and 2 guide whether PII obligations exist. Questions 3 and 4 define the obligations to manage PII in the cloud. In addition to this handy checklist, the CPC/DPC provides comparisons of privacy requirements across 32 countries. Country-specific reports help companies understand and plan for the complexities of maintaining information across borders.</p>
<p>The nature of and increasing reliance on cloud storage presents unique challenges for information and records management. Information governance holds data—local- and cloud-based—to the same standards. It is important to maintain cloud-based information in line with company policies and all governing laws and regulations. As the CPC/DPC Checklist shows, an assessment can go a long way to ensure your business manages all information appropriately.</p>
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> today for a privacy impact assessment to help you navigate challenges proactively. Whether your data is stored locally or in the cloud, we can help you stay compliant.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/bringing-the-cloud-down-to-earth/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> <a href="https://www.forbes.com/sites/joemckendrick/2012/08/06/apple-co-founder-steve-wozniak-distrusts-the-cloud-is-he-right/#5d2540a86042" data-wpel-link="external" rel="external noopener noreferrer">http://www.forbes.com/sites/joemckendrick/2012/08/06/apple-co-founder-steve-wozniak-distrusts-the-cloud-is-he-right/#50c5c7b47ef8</a></p>
<p><a href="https://www.zasio.com/bringing-the-cloud-down-to-earth/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> <a href="https://cloudprivacycheck.eu/" data-wpel-link="external" rel="external noopener noreferrer">https://cloudprivacycheck.eu/</a></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_3 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2023/10/Jenn-01-96x96-1.jpg" alt="Author: Jennifer Chadband, IGP, CRM, ECMp" class="wp-image-1877" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Jennifer Chadband, IGP, CRM, ECMp</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fbringing-the-cloud-down-to-earth%2F&amp;linkname=Bringing%20the%20Cloud%20Down%20to%20Earth" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fbringing-the-cloud-down-to-earth%2F&amp;linkname=Bringing%20the%20Cloud%20Down%20to%20Earth" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fbringing-the-cloud-down-to-earth%2F&amp;linkname=Bringing%20the%20Cloud%20Down%20to%20Earth" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fbringing-the-cloud-down-to-earth%2F&#038;title=Bringing%20the%20Cloud%20Down%20to%20Earth" data-a2a-url="https://zasio.com/bringing-the-cloud-down-to-earth/" data-a2a-title="Bringing the Cloud Down to Earth" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/bringing-the-cloud-down-to-earth/" data-wpel-link="internal">Bringing the Cloud Down to Earth</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/bringing-the-cloud-down-to-earth/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
