<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>By Rick Surber Archives - Zasio</title>
	<atom:link href="https://zasio.com/tag/rick-surber/feed/" rel="self" type="application/rss+xml" />
	<link>https://zasio.com/tag/rick-surber/</link>
	<description>Digital Records Management Software</description>
	<lastBuildDate>Tue, 17 Oct 2023 22:00:04 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://zasio.com/wp-content/uploads/2023/05/cropped-zasiopurplefavicon-32x32.png</url>
	<title>By Rick Surber Archives - Zasio</title>
	<link>https://zasio.com/tag/rick-surber/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>American Data Privacy and Protection Act (ADPPA) Basics &#038; Why It’s Significant</title>
		<link>https://zasio.com/american-data-privacy-and-protection-act/</link>
					<comments>https://zasio.com/american-data-privacy-and-protection-act/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 15 Aug 2022 21:54:26 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[ADPPA]]></category>
		<category><![CDATA[American Data Privacy and Protection Act]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[comprehensive federal data privacy law]]></category>
		<category><![CDATA[data privacy law]]></category>
		<category><![CDATA[information governance consulting]]></category>
		<category><![CDATA[Information Governance software]]></category>
		<category><![CDATA[records and information management software]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=407</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/american-data-privacy-and-protection-act/" data-wpel-link="internal">American Data Privacy and Protection Act (ADPPA) Basics &#038; Why It’s Significant</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_0 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_0">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_0  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_0  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">A comprehensive federal data privacy law in the United States has never been closer to reality. Even with bipartisan and bicameral support, it still has many obstacles to overcome to get through Congress. The most recent hurdle was making it out of the House Committee on Energy and Commerce, which sent the bill to the full House for consideration after numerous compromises led to a 53-2 vote to advance. The following is a big picture overview of the ADPPA in its current form.</p>
<p><u>Who Supports/Opposes it, and What are the Major Points of Contention?</u></p>
<p>Proponents of the bill cite the need for comprehensive data privacy legislation at the U.S. federal level to “create a robust set of consumers’ data privacy rights, and appropriate enforcement mechanisms.”<a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> In addition, many companies in the business community also support the law as a way to create a national standard as opposed to a patchwork of different state laws.</p>
<p><strong><u>Preemption of state law</u></strong> is a major point of contention. Section 404 (b)(1) specifies that:</p>
<p><em>No State or political subdivision of a State may adopt, maintain, enforce, or continue in effect any law, regulation, rule, standard, requirement, or other provision having the force and effect of law of any State, or political subdivision of a State, covered by the provisions of this Act, or a rule, regulation, or requirement promulgated under this Act.<a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftn2" name="_ftnref2" data-wpel-link="internal"><strong>[2]</strong></a></em></p>
<p>Some exceptions to this preemption principle are found in Section 404 (b)(2), which generally include consumer protection laws of general applicability, civil rights, employee or student privacy, data breach notification, and contract or tort laws, to highlight a few. Some specific laws are also called out in Section 404 (b)(2), including the Illinois Biometric Information Privacy Act and Genetic Information Privacy Act, as well as section 1798.150 of the CCPA on consumer actions based on personal information security breaches.</p>
<p>The California Privacy Protection Agency (CPPA) Board is one of the most vocal opposers of the ADPPA, arguing that it preempts important provisions of the CCPA and CPRA. The House Committee on Energy and Commerce sought to lessen the impact on California by noting in amended Section 404 (b)(3) that the CPPA may enforce the ADPPA “in the same manner it would otherwise enforce the CCPA,” but this concession didn’t resolve the CPPA’s preemption concern. In a <a href="https://aboutbgov.com/3XA" data-wpel-link="external" rel="external noopener noreferrer">letter</a> sent to U.S. House Speaker Nancy Pelosi, D-California, the CPPA discusses how the CPRA sets a “floor” on privacy protections, allowing for stronger privacy rights but not weaker ones. They continue that the ADPPA is below the CPRA floor, weakens the privacy rights of C.A. citizens, and that it’s a ceiling limiting the extension of privacy rights instead of a floor. A more in-depth analysis of the argument against preemption can be found <a href="https://teachprivacy.com/further-thoughts-on-adppa-the-federal-comprehensive-privacy-bill/" data-wpel-link="external" rel="external noopener noreferrer">here</a>.</p>
<p>The<u> <strong>private right of action</strong></u> is also a point of contention. The US Chamber of Commerce argued that a private right of action will “encourage an influx of abusive class action lawsuits, create further confusion regarding enforcement of blanket privacy rights, harm small businesses, and hinder data-driven innovation.”<a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> Others argue that the private right of action is too limited as currently drafted because there is a right-to-cure process for most violations and because arbitration is mandatory. An analysis of the private right of action can be found <a href="https://www.jdsupra.com/legalnews/analyzing-the-american-data-privacy-and-7937939/" data-wpel-link="external" rel="external noopener noreferrer">here</a>, which includes an opinion about its perceived weakness as currently drafted.</p>
<p><u>Who is Regulated?</u></p>
<p>“Covered entities” include “any entity or any person…that alone or jointly with others determines the purposes and means of collecting, processing, or transferring covered data and</p>
<ul>
<li>is subject to the Federal Trade Commission Act [<strong><u>or</u></strong>]</li>
<li>is a common carrier subject to the Communications Act of 1934… <strong><u>or</u></strong></li>
<li>is an organization not organized to carry on business for their own profit or that of their members; <strong><u>and</u></strong></li>
</ul>
<p>includes any entity or person that controls, is controlled by, or is under common control with another covered entity.”<a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a></p>
<p>Exclusions are listed in (SEC. 2)(9)(B), which include federal, state, and local governmental entities and entities collecting, processing, or transferring covered data on their behalf.</p>
<p><u>What types of data are regulated?</u></p>
<p>“Covered data” is defined as “information that identifies or is linked or reasonably linkable, alone or in combination with other information, to an individual or a device that identifies or is linked or reasonably linkable to an individual, and may include derived data and unique identifiers.”<a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftn5" name="_ftnref5" data-wpel-link="internal">[5]</a> Exclusions in (SEC. 2)(8)(B) include de-identified data, <strong><u>employee data</u></strong>, publicly available information; or “inferences made exclusively from multiple independent sources of publicly available information that do not reveal sensitive covered data with respect to an individual.”</p>
<p><u>What are some noteworthy provisions?</u></p>
<p>A <strong><u>Data Minimization</u></strong> provision under (Title I)(Sec 101) prohibits covered entities from collecting, processing, or transferring covered data unless that activity is “limited to what is reasonably necessary and proportionate to-</p>
<ul>
<li>provide or maintain a specific product or service requested by the individual [<strong><u>or</u></strong>]</li>
<li>deliver a communication that is reasonably anticipated by the individual recipient within the context of the individual’s interactions with the covered entity; <strong><u>or</u></strong></li>
<li>effect a purpose expressly permitted under subsection (b).”</li>
</ul>
<p>Permissible purposes under subsection (b) include several related to carrying out the transactions and services requested by the individual, such as authenticating users of a product or service or fulfilling a warranty service. Permissible purposes also include purposes unrelated to the transaction, like preventing security incidents, fraud, and illegal activity or complying with legal obligations.</p>
<p>Section 102 establishes some <strong><u>loyalty duties</u></strong> for covered entities, laying out several restricted data practices. Most significantly it restricts collection or processing of <strong><u>sensitive personal data</u></strong> except where its “strictly necessary to provide or maintain a specific product or service requested by the individual to whom the covered data pertains, or to effect a purpose enumerated in section 101(b)(1) through (10).” Notably missing are the purposes related to marketing or advertising in 101(b)(10) and (11). Section 102 also addresses collection, processing, or transferring of social security number and aggregated internet search or browsing history subject to exceptions.</p>
<p>Section 103 discusses <strong><u>Privacy by Design</u></strong>, requiring covered entities to “establish, implement, and maintain reasonable policies, practices, and procedures regarding the collection, processing, and transfer of covered data.” The highlights of this requirement involve mitigating privacy risks and implementing reasonable training and safeguards to promote compliance.</p>
<p>Title II deals with <strong><u>Consumer Data Rights</u></strong>, which include many of the foundational rights found in other privacy laws such as the GDPR and CCPA. For example, section 202 discusses <strong>transparency</strong>, requiring covered entities to publicly share their privacy policy that spells out data collection, processing, and transfer activities. Section 203 grants individuals certain rights concerning <strong>access, correction, deletion, and portability</strong> of their covered data. Section 204 deals with individuals’ rights to <strong>consent</strong> and to withdraw consent.</p>
<p><u>How are Covered Entities Held Accountable?</u></p>
<p>Title III has several requirements geared towards accountability. Section 301 requires executives to certify within one year of enactment of the Act that there are reasonable controls to ensure covered entities’ compliance and reporting structures in place. It also requires covered entities to designate a privacy officer. Title III additionally contains technical compliance requirements along with requirements for the Federal Trade Commission to review controls. More robust controls are also required based on the size and nature of the information collected by covered entities.</p>
<p><u>Who will Enforce it?</u></p>
<p>Title IV, section 401 specifies compliance will be carried out by a new Bureau of Privacy organized under the Federal Trade Commission. Section 402 also allows civil enforcement by state attorneys general or state privacy authorities within federal district courts where the interest of the residents of that state could be adversely affected by the activities of a covered entity. Finally, section 403 provides a limited private right of action to individuals beginning four years after the Act takes effect (which was already discussed above).</p>
<p><u>Conclusion</u></p>
<p>The likelihood of passing this law still may be a long shot based on how far it still needs to go to get through Congress and who is responsible for initiating the next steps. If it doesn’t pass in this Congress, many believe it will be years before a federal privacy law is seriously discussed again, especially if party control changes in the midterms. Regardless, though, it’s significant that the priority of federal privacy law is gaining momentum. Bipartisan and bicameral support of an idea is a giant leap forward and sets a new stage for privacy law in the United States. The ADPPA will also remain important because, in its current form, it is a much stronger piece of legislation than any prior federal privacy law that has received serious discussion in Congress and likely sets a new, more stringent baseline for future legislative debate. If privacy law hasn’t yet impacted your organization, it’s likely to soon. If you need help strategizing how to minimize privacy risks in your records retention schedule or RIM program,<a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal"> Zasio can help.</a></p>
<p><a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> “HOUSE AND SENATE LEADERS RELEASE BIPARTISAN DISCUSSION DRAFT OF COMPREHENSIVE DATA PRIVACY BILL” Jun 3, 2022 Press Release <a href="https://energycommerce.house.gov/newsroom/press-releases/house-and-senate-leaders-release-bipartisan-discussion-draft-of" data-wpel-link="external" rel="external noopener noreferrer">https://energycommerce.house.gov/newsroom/press-releases/house-and-senate-leaders-release-bipartisan-discussion-draft-of</a></p>
<p><a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> H.R.8152 – American Data Privacy and Protection Act Section 404 (b)(1) as of 8/3/2022. 117th Congress (2021-2022). https://www.congress.gov/bill/117th-congress/house-bill/8152/text</p>
<p><a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> “U.S. Chamber Warns It Will Oppose Any Privacy Legislation That Creates a Blanket Private Right of Action.” May 31, 2022. <a href="https://www.uschamber.com/technology/data-privacy/u-s-chamber-warns-it-will-oppose-any-privacy-legislation-that-creates-a-blanket-private-right-of-action" data-wpel-link="external" rel="external noopener noreferrer">https://www.uschamber.com/technology/data-privacy/u-s-chamber-warns-it-will-oppose-any-privacy-legislation-that-creates-a-blanket-private-right-of-action</a></p>
<p><a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> H.R.8152 – American Data Privacy and Protection Act (SEC. 2)(9)(A) as of 8/3/2022. 117th Congress (2021-2022). <a href="https://www.congress.gov/bill/117th-congress/house-bill/8152/text" data-wpel-link="external" rel="external noopener noreferrer">https://www.congress.gov/bill/117th-congress/house-bill/8152/text</a></p>
<p><a href="https://www.zasio.com/american-data-privacy-and-protection-act/#_ftnref5" name="_ftn5" data-wpel-link="internal">[5]</a> ID at (SEC. 2)(8)(A).</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_1">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_1  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_0 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Famerican-data-privacy-and-protection-act%2F&amp;linkname=American%20Data%20Privacy%20and%20Protection%20Act%20%28ADPPA%29%20Basics%20%26%20Why%20It%E2%80%99s%20Significant" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Famerican-data-privacy-and-protection-act%2F&amp;linkname=American%20Data%20Privacy%20and%20Protection%20Act%20%28ADPPA%29%20Basics%20%26%20Why%20It%E2%80%99s%20Significant" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Famerican-data-privacy-and-protection-act%2F&amp;linkname=American%20Data%20Privacy%20and%20Protection%20Act%20%28ADPPA%29%20Basics%20%26%20Why%20It%E2%80%99s%20Significant" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Famerican-data-privacy-and-protection-act%2F&#038;title=American%20Data%20Privacy%20and%20Protection%20Act%20%28ADPPA%29%20Basics%20%26%20Why%20It%E2%80%99s%20Significant" data-a2a-url="https://zasio.com/american-data-privacy-and-protection-act/" data-a2a-title="American Data Privacy and Protection Act (ADPPA) Basics &amp; Why It’s Significant" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/american-data-privacy-and-protection-act/" data-wpel-link="internal">American Data Privacy and Protection Act (ADPPA) Basics &#038; Why It’s Significant</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/american-data-privacy-and-protection-act/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Meet Our Team! Rick Surber, Licensed Attorney / Senior Consultant</title>
		<link>https://zasio.com/meet-our-team-rick-surber-2/</link>
					<comments>https://zasio.com/meet-our-team-rick-surber-2/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 11 May 2022 19:19:55 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=441</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/meet-our-team-rick-surber-2/" data-wpel-link="internal">Meet Our Team! Rick Surber, Licensed Attorney / Senior Consultant</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_1 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_2">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_2  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_1  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-9">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>Tell us about your role at Zasio. </strong></p>
<p>As a Senior Consultant at Zasio, I have the privilege of working with clients to improve their IG/RIM programs. My most requested role involves simplifying or creating records retention schedules and other RIM policies/procedures. I’m also lucky to co-lead two amazingly hard-working and talented teams at Zasio: the Research team and Consulting team.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>What excites you about Zasio’s products and services?</strong></p>
<p>I like that Zasio’s solutions can help almost anyone navigate critical aspects of IG and RIM. From small businesses to government agencies, to international corporations, and everything in between. Our solutions result in tangible positive changes.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>How did you get into Information Governance research and why do you like it as a career field?</strong></p>
<p>In law school, I learned that I prefer areas of law that allow for collaboration instead of litigation. I found that complex areas of statutory interpretation provide an opportunity to help people avoid fines, penalties, and litigation through regulatory compliance. Joining Zasio allowed me to research and analyze laws in nearly every industry worldwide for clients. As a bonus, it introduced me to the IG/RIM industry, which I have grown to love.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-12">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>What are the most important things you recommend people keep in mind about RIM?</strong></p>
<p>A fundamental concept with RIM is realizing that over-retention of many types of records can create as much or more risk than under retention. Over the next five years, the continued expansion of privacy regulations will amplify the risks associated with over retention of records and impact more and more organizations.</p>
</div>
</div>
</div>
</div>
</div>
</div>
<div class="vc_row wpb_row vc_row-fluid">
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_single_image wpb_content_element vc_align_left">
<figure class="wpb_wrapper vc_figure">
<div class="vc_single_image-wrapper vc_box_border_grey"><img fetchpriority="high" decoding="async" class="vc_single_image-img attachment-large alignleft" title="Lifestyle Photo_Rick-Fam Mesa Arch" src="https://cdn.zasio.com/wp-content/uploads/2022/05/Lifestyle-Photo_Rick-Fam-Mesa-Arch-1024x788.jpg" sizes="(max-width: 1024px) 100vw, 1024px" srcset="https://cdn.zasio.com/wp-content/uploads/2022/05/Lifestyle-Photo_Rick-Fam-Mesa-Arch-1024x788.jpg 1024w, https://cdn.zasio.com/wp-content/uploads/2022/05/Lifestyle-Photo_Rick-Fam-Mesa-Arch-300x231.jpg 300w, https://cdn.zasio.com/wp-content/uploads/2022/05/Lifestyle-Photo_Rick-Fam-Mesa-Arch-768x591.jpg 768w, https://cdn.zasio.com/wp-content/uploads/2022/05/Lifestyle-Photo_Rick-Fam-Mesa-Arch-1536x1182.jpg 1536w, https://cdn.zasio.com/wp-content/uploads/2022/05/Lifestyle-Photo_Rick-Fam-Mesa-Arch-2048x1576.jpg 2048w" alt="" width="294" height="227" data-dt-location="https://www.zasio.com/meet-our-team-rick-surber-2/lifestyle-photo_rick-fam-mesa-arch/" /></div>
</figure>
</div>
</div>
</div>
</div>
<div class="wpb_column vc_column_container vc_col-sm-6">
<div class="vc_column-inner">
<div class="wpb_wrapper">
<div class="wpb_text_column wpb_content_element ">
<div class="wpb_wrapper">
<p><strong>What is something you like to do in your free time?</strong></p>
<p>I like to get outdoors with my family and friends to explore and go on adventures together in my free time. My favorite outdoor activities are hiking, backpacking, multi-day whitewater rafting trips, and skiing.</p>
</div>
</div>
</div>
</div>
</div>
</div></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_3">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_3  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_1 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fmeet-our-team-rick-surber-2%2F&amp;linkname=Meet%20Our%20Team%21%20Rick%20Surber%2C%20Licensed%20Attorney%20%2F%20Senior%20Consultant" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fmeet-our-team-rick-surber-2%2F&amp;linkname=Meet%20Our%20Team%21%20Rick%20Surber%2C%20Licensed%20Attorney%20%2F%20Senior%20Consultant" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fmeet-our-team-rick-surber-2%2F&amp;linkname=Meet%20Our%20Team%21%20Rick%20Surber%2C%20Licensed%20Attorney%20%2F%20Senior%20Consultant" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fmeet-our-team-rick-surber-2%2F&#038;title=Meet%20Our%20Team%21%20Rick%20Surber%2C%20Licensed%20Attorney%20%2F%20Senior%20Consultant" data-a2a-url="https://zasio.com/meet-our-team-rick-surber-2/" data-a2a-title="Meet Our Team! Rick Surber, Licensed Attorney / Senior Consultant" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/meet-our-team-rick-surber-2/" data-wpel-link="internal">Meet Our Team! Rick Surber, Licensed Attorney / Senior Consultant</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/meet-our-team-rick-surber-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>US Privacy Laws &#038; RIM — Recent Developments</title>
		<link>https://zasio.com/us-privacy-laws-rim-recent-developments/</link>
					<comments>https://zasio.com/us-privacy-laws-rim-recent-developments/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Thu, 07 Jan 2021 21:43:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[california consumer privacy act]]></category>
		<category><![CDATA[California Privacy Rights Act]]></category>
		<category><![CDATA[CCPA]]></category>
		<category><![CDATA[CPRA]]></category>
		<category><![CDATA[IG]]></category>
		<category><![CDATA[information governance]]></category>
		<category><![CDATA[personal information]]></category>
		<category><![CDATA[PI]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[retention]]></category>
		<category><![CDATA[RIM]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=586</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/us-privacy-laws-rim-recent-developments/" data-wpel-link="internal">US Privacy Laws &#038; RIM — Recent Developments</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_2 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_4">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_4  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_2  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Privacy may very well be the fastest-growing area of law so far in the 21<sup>st</sup> century. While the US, at the federal level, has resisted a broad privacy law similar to the GDPR, momentum is steadily gaining for privacy legislation at the state level. This blog explores US privacy law’s recent developments from a records and information management (RIM) perspective.</p>
<p><strong>I. Recently Enacted Privacy Legislation</strong></p>
<p>The number of new bills introduced in 2020 broadly regulating privacy illustrates the subject’s popularity. In 2020 there were more than 20 privacy bills introduced at the state level in the US.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> Federally, there were dozens of bills and discussion drafts introduced during the last two sessions of congress.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a> While most of the recent broad privacy bills met their demise in legislative committees, here are some of the ones that survived and became law.</p>
<p><strong><u>California’s Privacy Rights Act (CPRA)</u></strong></p>
<p>The biggest development in US privacy law in 2020 was the passage of the CRPA by ballot initiative during the November election. The CPRA amends the California Consumer Privacy Act (CCPA) in major ways. Here is a summary of these changes:</p>
<ul>
<li>New Privacy Authority Created: The CPRA creates the California Privacy Protection Agency (CPPA) and grants it the authority to enforce the act by making rules and investigating non-compliance.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a></li>
<li>Creates New Sensitive Personal Information Category: The CRPA provides stricter requirements for sensitive PI, with stricter use and disclosure provisions than regular PI, including Consumers’ ability to restrict use and disclosure for some purposes. Examples of sensitive PI include social security numbers, identification numbers from identification cards such as passports and licenses, financial account information, race, ethnic origin, religion, and genetic information, and precise location information, among others.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a></li>
<li>Expanded Rights for Consumers: In addition to their ability to restrict the use of sensitive PI, consumers have several new and expanded rights under the CRPA. These include new rights to correct inaccurate PI, expanded rights to delete PI from third parties, and expanded/modified rights to know, opt-out, notice of collection, and request deletion of PI.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn5" name="_ftnref5" data-wpel-link="internal">[5]</a></li>
<li>Revised Regulated Party: The CRPA expands regulated business activities to include parties receiving PI. The CCPA only included parties who buy, sell, or share PI. The CPRA also expands regulated business activities by revising the deriving at least 50 percent of income from selling PI threshold to include profits from sharing PI. However, the CPRA excludes many small businesses previously covered under the CCPA by increasing the threshold number of consumers or households from 50,000+ to 100,000+.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn6" name="_ftnref6" data-wpel-link="internal">[6]</a></li>
<li>PI Retention Changes: CPRA has some retention changes similar to requirements in the GDPR. Under the CPRA, businesses now are prohibited from keeping PI unless it’s reasonably necessary to meet a disclosed purpose. Further, businesses must specify the criteria used to determine the retention period for PI categories or the retention period itself at the time of collection.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn7" name="_ftnref7" data-wpel-link="internal">[7]</a></li>
</ul>
<p>Like the CCPA, there is a window before the CPRA becomes effective, allowing businesses time to implement compliance measures. The CPRA will become effective on January 1, 2023.</p>
<p><strong><u>Maine Act to Protect the Privacy of Online Customer Information (35 M.R.S. 9301)</u></strong></p>
<p>Maine passed a privacy act in 2019, restricting the collection, retention, use, disclosure, sale, or access to customer PI by broadband internet access services. This act provides exceptions, including consent, providing services related to the purpose for collection, direct advertising, and several others.  It also includes requirements for security and protection of consumer PI lawfully collected.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn8" name="_ftnref8" data-wpel-link="internal">[8]</a></p>
<p><strong><u>Nevada Amended Security of Information Maintained by Data Collectors and Other Businesses (Nev. Rev. Stat. Ann. 603A)</u></strong></p>
<p>Nevada revised its PI security law by enhancing requirements for state government controls in the “collection, dissemination and maintenance” of PI.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn9" name="_ftnref9" data-wpel-link="internal">[9]</a></p>
<p><strong>II. U.S. Privacy Law Trends Leading Into 2020</strong></p>
<p>The year 2020 highlighted an ongoing trend in U.S. privacy laws. For reference, the following includes a summary of additional privacy laws generally applicable to businesses and employers that impact PI retention:</p>
<p><strong><u>Illinois Biometric Information Privacy Act (740 ILCS 14/)</u></strong></p>
<p>Section 15 of this law on “Retention; collection; disclosure; destruction” requires private entities possessing biometric identifiers to have a retention schedule specifying disposition “when the initial purpose for collecting or obtaining such identifiers or information has been satisfied or within three years of the individual’s last interaction with the private entity, whichever occurs first.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn10" name="_ftnref10" data-wpel-link="internal">[10]</a></p>
<p><strong><u>Maryland: COMAR 09.12.22.01</u></strong></p>
<p>This law from Maryland requires employers to retain PI medical information “only for the time needed to accomplish the purpose for access.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn11" name="_ftnref11" data-wpel-link="internal">[11]</a></p>
<p><strong><u>New York Stop Hacks and Improve Electronic Data Security Act (SHIELD Act): NY CLS Gen Bus 899-aa and 899-bb</u></strong></p>
<p>The SHEILD Act requires businesses owning or licensing computerized data containing PI to dispose of the PI “within a reasonable amount of time after it is no longer needed for business purposes by erasing electronic media so that the information cannot be read or reconstructed.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn12" name="_ftnref12" data-wpel-link="internal">[12]</a></p>
<p><strong><u>Texas: Tex. Bus. &amp; Com. Code 503.001</u></strong></p>
<p>This Texas legislation requires persons possessing biometric identifiers of individuals collected for a commercial purpose to “destroy it within a reasonable time, but not later than the first anniversary of the date the purpose for collecting the identifier expires.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn13" name="_ftnref13" data-wpel-link="internal">[13]</a></p>
<p><strong><u>Utah: Utah Code Ann. 34-46-203</u></strong></p>
<p>Utah’s latest enacted privacy legislation requires employers to destroy information collected during a hiring process within “two years after the day on which the applicant provides the information to the employer if the employer does not hire the applicant.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn14" name="_ftnref14" data-wpel-link="internal">[14]</a></p>
<p><strong><u>Washington: Rev. Code Wash. 19.375.020</u></strong></p>
<p>This recent Washington law requires that possessors of biometric identifiers collected for commercial purposes retain them for “no longer than is reasonably necessary to… provide the services for which the biometric identifier was enrolled.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn15" name="_ftnref15" data-wpel-link="internal">[15]</a></p>
<p><strong><u>Federal Children’s Online Privacy Protection Rule: 16 CFR 312.10)</u></strong></p>
<p>This rule by the US Federal Trade Commissions requires operators of websites or online services to retain PI collected from children for “only as long as is reasonably necessary to fulfill the purpose for which the information was collected.”<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn16" name="_ftnref16" data-wpel-link="internal">[16]</a></p>
<p><strong><u>Conclusion</u></strong></p>
<p>The above is just a sampling of privacy laws and many other US privacy laws generally regulate businesses and specific industries. If you need help strategizing how privacy requirements impact your RIM program, Zasio Consulting is here to help, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a>.<a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftn17" name="_ftnref17" data-wpel-link="internal">[17]</a></p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Arizona (SB1614, HB2729), California (CPRA passed), Hawaii (HB 963), Illinois (SB2263, SB2330, HB5603), Maryland (HB0249, HB0784, HB1656), Minnesota (HF 3936), Nebraska (LB746), New Hampshire HB1236), New Jersey (A2188, A3255), New York (S224, S5642), South Carolina (H4812), Virginia (HB473), Washington (SB6281), Wisconsin (AB870, AB871, AB872).</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> DATA Privacy Act (H.R.8749), Privacy Office Enhancement Act (H.R.5678), Consumer Online Privacy Rights Act (S.2968), Privacy Score Act of 2020 (H.R.6227), Social Media Privacy Protection and Consumer Rights Act of 2019 (S.189), Privacy Bill of Rights Act (S.1214), Protecting Education Privacy Act (H.R.2724), Moving Americans Privacy Protection Act (S.1302), Passenger Privacy Protection Act of 2019 (S.1206), Genetic Information Privacy Act of 2019 (H.R.2155), Secure Data and Privacy for Contact Tracing Act of 2020 (H.R.7472), Consumer Data Privacy and Security Act of 2020 (S.3456), Online Privacy Act of 2019 (H.R.4978) to name a select few.</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> The California Privacy Rights Act (CPRA) Section 24. <a href="https://oag.ca.gov/system/files/initiatives/pdfs/19-0021A1%20%28Consumer%20Privacy%20-%20Version%203%29_1.pdf" data-wpel-link="external" rel="external noopener noreferrer">https://oag.ca.gov/system/files/initiatives/pdfs/19-0021A1%20%28Consumer%20Privacy%20-%20Version%203%29_1.pdf</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> ID at sections 10 and 13.</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref5" name="_ftn5" data-wpel-link="internal">[5]</a> ID at sections 3A, 5-12.</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref6" name="_ftn6" data-wpel-link="internal">[6]</a> ID at section 14</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref7" name="_ftn7" data-wpel-link="internal">[7]</a> ID at sections 4, 12(7)</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref8" name="_ftn8" data-wpel-link="internal">[8]</a> Act to Protect the Privacy of Online Customer Information (35 M.R.S. 9301). <a href="https://www.mainelegislature.org/legis/bills/getPDF.asp?paper=SP0275&amp;item=9&amp;snum=129" data-wpel-link="external" rel="external noopener noreferrer">https://www.mainelegislature.org/legis/bills/getPDF.asp?paper=SP0275&amp;item=9&amp;snum=129</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref9" name="_ftn9" data-wpel-link="internal">[9]</a> Amended Security of Information Maintained by Data Collectors and Other Businesses (Nev. Rev. Stat. Ann. 603A) Section 210.  <a href="https://www.leg.state.nv.us/NRS/NRS-603A.html#NRS603ASec210" data-wpel-link="external" rel="external noopener noreferrer">https://www.leg.state.nv.us/NRS/NRS-603A.html#NRS603ASec210</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref10" name="_ftn10" data-wpel-link="internal">[10]</a> Illinois Biometric Information Privacy Act (740 ILCS 14/) Sec. 15 (a).  <a href="https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57" data-wpel-link="external" rel="external noopener noreferrer">https://www.ilga.gov/legislation/ilcs/ilcs3.asp?ActID=3004&amp;ChapterID=57</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref11" name="_ftn11" data-wpel-link="internal">[11]</a> COMAR 09.12.22.01 (C).  <a href="http://www.dsd.state.md.us/comar/comarhtml/09/09.12.22.01.htm" data-wpel-link="external" rel="external noopener noreferrer">http://www.dsd.state.md.us/comar/comarhtml/09/09.12.22.01.htm</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref12" name="_ftn12" data-wpel-link="internal">[12]</a> NY CLS Gen Bus 899-bb (2)(b)(ii)(C)(4). <a href="https://www.nysenate.gov/legislation/laws/GBS/899-BB" data-wpel-link="external" rel="external noopener noreferrer">https://www.nysenate.gov/legislation/laws/GBS/899-BB</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref13" name="_ftn13" data-wpel-link="internal">[13]</a> Tex. Bus. &amp; Com. Code 503.001 (c)(3),(c-1). <a href="https://statutes.capitol.texas.gov/Docs/BC/htm/BC.503.htm" data-wpel-link="external" rel="external noopener noreferrer">https://statutes.capitol.texas.gov/Docs/BC/htm/BC.503.htm</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref14" name="_ftn14" data-wpel-link="internal">[14]</a> Utah Code Ann. 34-46-203 (2). <a href="https://le.utah.gov/xcode/Title34/Chapter46/34-46-S203.html?v=C34-46-S203_1800010118000101" data-wpel-link="external" rel="external noopener noreferrer">https://le.utah.gov/xcode/Title34/Chapter46/34-46-S203.html?v=C34-46-S203_1800010118000101</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref15" name="_ftn15" data-wpel-link="internal">[15]</a> Rev. Code Wash. 19.375.020 (4)(b). <a href="https://app.leg.wa.gov/RCW/default.aspx?cite=19.375.020#:~:text=RCW%2019.375.020-,Enrollment%2C%20disclosure%2C%20and%20retention%20of%20biometric%20identifiers.,identifier%20for%20a%20commercial%20purpose" data-wpel-link="external" rel="external noopener noreferrer">https://app.leg.wa.gov/RCW/default.aspx?cite=19.375.020#:~:text=RCW%2019.375.020-,Enrollment%2C%20disclosure%2C%20and%20retention%20of%20biometric%20identifiers.,identifier%20for%20a%20commercial%20purpose</a>.</p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref16" name="_ftn16" data-wpel-link="internal">[16]</a> 16 CFR 312.10.<a href="https://www.ecfr.gov/cgi-bin/text-idx?SID=d2d4616077fe505e154978fae9519ff3&amp;mc=true&amp;node=pt16.1.312&amp;rgn=div5#se16.1.312_110" data-wpel-link="external" rel="external noopener noreferrer"> https://www.ecfr.gov/cgi-bin/text-idx?SID=d2d4616077fe505e154978fae9519ff3&amp;mc=true&amp;node=pt16.1.312&amp;rgn=div5#se16.1.312_110</a></p>
<p><a href="https://www.zasio.com/us-privacy-laws-rim-recent-developments/#_ftnref17" name="_ftn17" data-wpel-link="internal">[17]</a> <a href="https://www.zasio.com/consulting-services/" data-wpel-link="internal">https://www.zasio.com/consulting-services/</a></p>
<p>&nbsp;</p>
<div><em>Disclaimer: The purpose of this post is to provide general education on information governance topics. The statements in this article are informational only and do not constitute legal or other professional advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_5">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_5  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_2 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fus-privacy-laws-rim-recent-developments%2F&amp;linkname=US%20Privacy%20Laws%20%26%20RIM%20%E2%80%94%20Recent%20Developments" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fus-privacy-laws-rim-recent-developments%2F&amp;linkname=US%20Privacy%20Laws%20%26%20RIM%20%E2%80%94%20Recent%20Developments" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fus-privacy-laws-rim-recent-developments%2F&amp;linkname=US%20Privacy%20Laws%20%26%20RIM%20%E2%80%94%20Recent%20Developments" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fus-privacy-laws-rim-recent-developments%2F&#038;title=US%20Privacy%20Laws%20%26%20RIM%20%E2%80%94%20Recent%20Developments" data-a2a-url="https://zasio.com/us-privacy-laws-rim-recent-developments/" data-a2a-title="US Privacy Laws &amp; RIM — Recent Developments" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/us-privacy-laws-rim-recent-developments/" data-wpel-link="internal">US Privacy Laws &#038; RIM — Recent Developments</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/us-privacy-laws-rim-recent-developments/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>EU’s New Whistleblower Directive &#038; Impacts on RIM</title>
		<link>https://zasio.com/eu-new-whistleblower-directive-and-impacts-rim/</link>
					<comments>https://zasio.com/eu-new-whistleblower-directive-and-impacts-rim/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 22 May 2019 21:22:31 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[European Union]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[whistleblower]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=792</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/eu-new-whistleblower-directive-and-impacts-rim/" data-wpel-link="internal">EU’s New Whistleblower Directive &#038; Impacts on RIM</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_3 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_6">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_6  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_3  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><strong>Whistleblower Directive Quick Overview</strong></p>
<p>The EU recently approved a <a href="http://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2018/0218/COM_COM(2018)0218_EN.pdf" data-wpel-link="external" rel="external noopener noreferrer">new Whistleblower Directive</a> promoting common minimum standards designed to enhance protections for Whistleblowers and prevent retaliation for participation in whistleblowing activities. The directive allows for reporting of breaches of law both internally within companies, and externally, directly to national and EU authorities, and requires the creation of channels and procedures for reporting and following up on reports. The directive applies to legal entities in the public sector, and also private entities with 50 or more employees, annual business turnover or annual balance sheet total of EUR 10 million or more, or entities of any size operating in financial services, or vulnerable to money laundering or terrorist financing activities.</p>
<p><strong>Impacts on RIM</strong></p>
<p>Article 18 of the new Directive requires that processing of personal data for whistleblowing activities be in accordance with the <a href="https://publications.europa.eu/en/publication-detail/-/publication/3e485e15-11bd-11e6-ba9a-01aa75ed71a1/language-en" data-wpel-link="external" rel="external noopener noreferrer">EU GDPR</a>. This makes the activities subject to GDPR (5)(1)(e) requiring that they be identifiable for no longer than the purpose for which they are processed/collected. In addition, GDPR (39) requires ensuring a level of appropriate security and confidentiality, including preventing unauthorized access, which includes within networks and information systems. In addition to the GDPR requirements, the new Directive specifies that personal data not relevant for the handling of a specific case shall be immediately deleted.</p>
<p>Member States will have until May 15, 2021 to enact/amend laws and regulations necessary to comply with the new Directive. Several European countries already have whistleblower laws, and some have provisions that compel the destruction of records that identify a whistleblower within a short period. For example, Article (16)(5) of <a href="http://corruptionprevention.gov.hu/download/7/a2/90000/KIM%20555_2013-4.pdf" data-wpel-link="external" rel="external noopener noreferrer">Hungary’s whistleblower law</a> requires that for “investigations revealing that the whistleblower report is unfounded or that no further action is necessary, the data relating to the whistleblower report shall be deleted within 60 days after the end of the investigation.” Countries with requirements like Hungary’s will need to re-evaluate whether allowing retention after the close of the investigation is permissible under the new directive. As the EU countries are evaluating their laws and making revisions in response to the New Directive, employers and companies will need to monitor the changes and adjust their records retention schedules accordingly. For example, where Companies currently retain whistleblower records containing personal information for a short period past the close of a case for audit purposes, if the “immediately deleted” language from the New Directive flows through to new/revised country laws, they may be required to discontinue this practice.</p>
<p>In addition to impacting records retention schedules, these regulations also require setting up processes to adequately protect whistleblowers, including records that identify them, and procedures for breaches of related personal information. Re-evaluating policies, procedures, and recordkeeping systems will be necessary to ensure that the protections required are implemented. If you need help strategizing how to prepare for requirements like the new EU Whistleblower Directive, or even more established requirements like the GDPR, <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">contact Zasio</a> today.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_7">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_7  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_3 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Feu-new-whistleblower-directive-and-impacts-rim%2F&amp;linkname=EU%E2%80%99s%20New%20Whistleblower%20Directive%20%26%20Impacts%20on%20RIM" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Feu-new-whistleblower-directive-and-impacts-rim%2F&amp;linkname=EU%E2%80%99s%20New%20Whistleblower%20Directive%20%26%20Impacts%20on%20RIM" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Feu-new-whistleblower-directive-and-impacts-rim%2F&amp;linkname=EU%E2%80%99s%20New%20Whistleblower%20Directive%20%26%20Impacts%20on%20RIM" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Feu-new-whistleblower-directive-and-impacts-rim%2F&#038;title=EU%E2%80%99s%20New%20Whistleblower%20Directive%20%26%20Impacts%20on%20RIM" data-a2a-url="https://zasio.com/eu-new-whistleblower-directive-and-impacts-rim/" data-a2a-title="EU’s New Whistleblower Directive &amp; Impacts on RIM" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/eu-new-whistleblower-directive-and-impacts-rim/" data-wpel-link="internal">EU’s New Whistleblower Directive &#038; Impacts on RIM</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/eu-new-whistleblower-directive-and-impacts-rim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Saved $$$, Increased Efficiency, Reduced Risk? Welcome to Effective RIM!</title>
		<link>https://zasio.com/saved-increased-efficiency-reduced-risk-welcome-to-effective-rim/</link>
					<comments>https://zasio.com/saved-increased-efficiency-reduced-risk-welcome-to-effective-rim/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Mon, 09 Jul 2018 21:07:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[business continuity]]></category>
		<category><![CDATA[compliance]]></category>
		<category><![CDATA[disposition]]></category>
		<category><![CDATA[email management]]></category>
		<category><![CDATA[legal hold]]></category>
		<category><![CDATA[Personally Identifiable Information]]></category>
		<category><![CDATA[PII]]></category>
		<category><![CDATA[records and information management]]></category>
		<category><![CDATA[records retention schedules]]></category>
		<category><![CDATA[RIM]]></category>
		<category><![CDATA[RRS]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=890</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/saved-increased-efficiency-reduced-risk-welcome-to-effective-rim/" data-wpel-link="internal">Saved $$$, Increased Efficiency, Reduced Risk? Welcome to Effective RIM!</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_4 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_8">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_8  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_4  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Many Records and Information Management (RIM) professionals hear the question, “Why is RIM necessary?” My short answer is that effective RIM saves your company money, makes it more efficient, and reduces its risk. I want to expand on that answer by listing some of the ways a good RIM program can work for you.</p>
<p><strong>Disposition of Records</strong></p>
<p>So why not just keep everything?  One reason is for certain types of records, disposition is required by law. For example, in some locations, it’s mandatory to dispose of Personally Identifiable Information after a short period. Also, disposition of records reduces the quantity of information to search when looking for records. Less information translates into increased retrieval efficiency for employees. It also reduces the risk that excessive billable hours will be needed to identify relevant information for discovery requests. Both are examples of how managing the growth of information reduces risk and increases efficiency.</p>
<p><strong>Records Retention Schedules</strong></p>
<p>A foundation for a good RIM Program is a Records Retention Schedule (RRS). When properly constructed and implemented, they allow for the reasonable disposition of records. Otherwise, regulators and courts might criticize the intent behind records disposition activities. To be reasonable, disposition should be based on business needs, legal requirements, and common practice.</p>
<p><strong>Legal Requirements</strong></p>
<p>RIM programs promote compliance with legal requirements. How? They research and analyze legal requirements to ensure proper retention, handling, and disposition of records. Proper retention of records prevents sanctions and other penalties for non-compliance. Sanctions for improper RIM can be significant, reaching up to seven-figures for certain offenses.</p>
<p><strong>Legal Holds and RIM Policies</strong></p>
<p>Along with the RRS, it’s necessary to create a legal hold policy. The hold delays normal disposition for records involved in pending or anticipated litigation. Also, rolling-out the RRS requires creating and revising supporting policies and procedures. Once drafted, training is necessary to educate current and future employees about the policies. It’s also necessary to conduct audits to ensure compliance with the policies.</p>
<p><strong>Disposition Days</strong></p>
<p>One way many companies promote compliance is to implement “disposition days.” These are days dedicated to organizing and disposing of records and other information. The RRS guides disposition and policies exclude records that are subject to legal holds.</p>
<p><strong>Email Management</strong></p>
<p>One common source of growth in records and information is email. However, email itself is not a record; it’s a tool used to transmit records. Avoid using it as a storage system, so it doesn’t become a dumping ground. Policies, procedures, and guidelines will help employees properly file records from email. Retain routine email short term unless needed for business reasons.</p>
<p><strong>Business Continuity</strong></p>
<p>RIM programs help reduce risks caused by disasters. They do this by planning to ensure continued operation if disaster strikes. Vital records needed for continued operation should be identified. Then, steps are taken to protect that information against the risks for potential disaster types.</p>
<p>Remember, Zasio is here to help with your RIM needs. Contact our <a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Consulting department</a> today for help kicking off or refreshing you RIM program.</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_9">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_9  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_4 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fsaved-increased-efficiency-reduced-risk-welcome-to-effective-rim%2F&amp;linkname=Saved%20%24%24%24%2C%20Increased%20Efficiency%2C%20Reduced%20Risk%3F%20Welcome%20to%20Effective%20RIM%21" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fsaved-increased-efficiency-reduced-risk-welcome-to-effective-rim%2F&amp;linkname=Saved%20%24%24%24%2C%20Increased%20Efficiency%2C%20Reduced%20Risk%3F%20Welcome%20to%20Effective%20RIM%21" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fsaved-increased-efficiency-reduced-risk-welcome-to-effective-rim%2F&amp;linkname=Saved%20%24%24%24%2C%20Increased%20Efficiency%2C%20Reduced%20Risk%3F%20Welcome%20to%20Effective%20RIM%21" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fsaved-increased-efficiency-reduced-risk-welcome-to-effective-rim%2F&#038;title=Saved%20%24%24%24%2C%20Increased%20Efficiency%2C%20Reduced%20Risk%3F%20Welcome%20to%20Effective%20RIM%21" data-a2a-url="https://zasio.com/saved-increased-efficiency-reduced-risk-welcome-to-effective-rim/" data-a2a-title="Saved $$$, Increased Efficiency, Reduced Risk? Welcome to Effective RIM!" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/saved-increased-efficiency-reduced-risk-welcome-to-effective-rim/" data-wpel-link="internal">Saved $$$, Increased Efficiency, Reduced Risk? Welcome to Effective RIM!</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/saved-increased-efficiency-reduced-risk-welcome-to-effective-rim/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Records Management Disaster Plan Development</title>
		<link>https://zasio.com/records-management-disaster-plan/</link>
					<comments>https://zasio.com/records-management-disaster-plan/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 25 Oct 2017 19:17:29 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[disaster plan]]></category>
		<category><![CDATA[natural disasters]]></category>
		<category><![CDATA[records management]]></category>
		<category><![CDATA[records manager]]></category>
		<category><![CDATA[seven classes of disasters]]></category>
		<category><![CDATA[vital records]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=974</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/records-management-disaster-plan/" data-wpel-link="internal">Records Management Disaster Plan Development</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_5 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_10">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_10  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_5  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><h2>Developing a Disaster Plan</h2>
<p>Do you have a records management disaster plan? Headlines about natural disasters provide a stark reminder that we can’t control our environment. However, if we plan for disasters and assess risks, we can help ensure business continuity if disaster strikes.</p>
<p>To plan for disaster, analyze the different types of potential disasters and then prepare to mitigate loss. For a records manager, this means finding a way to limit interruption to vital records. It also means taking steps to mitigate the disaster’s impact to the records program.</p>
<h2>Vital Records</h2>
<p>You need vital records for your business to operate. Without them, you can’t continue to conduct business and you can’t determine assets and liabilities. For business to continue, you need to identify vital records and safeguard them from the impacts of disasters. This should be a major component of any disaster plan. You might, for example, keep vital records in a <a href="https://www.zasio.com/technology-solutions/records-management-software/" data-wpel-link="internal">records management software</a> and have the data backed up so you don’t lose any records.</p>
<h2>Mitigating Disaster Types</h2>
<p>A risk assessment should identify possible disasters, estimate their likelihood, and consider their consequences. This analysis allows you to develop plans as well as strategies to take if those disasters occur. Disaster likelihood varies based on several factors, many linked to location and climate. For example, the likelihood of a hurricane is greater in the Southeast United States than in the Northwest. Likewise, the likelihood of flooding is greater for locations in a flood plain. For companies with a centralized location, it’s best to have a disaster analysis based on that location. For companies with a larger geographic footprint, a high-level plan framework at the national or international level can help local branches develop local plans.</p>
<p>Whether a business is centralized, national, or international, Records Managers can use The Seven Classes of Disasters as a tool to brainstorm relevant disasters/events.<a href="https://www.zasio.com/records-management-disaster-plan/#_edn1" name="_ednref1" data-wpel-link="internal">[i]</a> The classes encompass seven scenarios, which range from the most severe to minimal. You can see a simplified version of the classes in the chart below. <a href="https://www.zasio.com/records-management-disaster-plan/#_edn2" name="_ednref2" data-wpel-link="internal">[ii]</a><br />
<img loading="lazy" decoding="async" class="alignnone wp-image-4596" src="https://cdn.zasio.com/wp-content/uploads/2017/10/Seven-Classes-of-Disaster-01-01-1024x824.png" sizes="(max-width: 693px) 100vw, 693px" srcset="https://cdn.zasio.com/wp-content/uploads/2017/10/Seven-Classes-of-Disaster-01-01-1024x824.png 1024w, https://cdn.zasio.com/wp-content/uploads/2017/10/Seven-Classes-of-Disaster-01-01-300x241.png 300w, https://cdn.zasio.com/wp-content/uploads/2017/10/Seven-Classes-of-Disaster-01-01-768x618.png 768w" alt="Records Management Disaster Plan Development" width="693" height="558" /><br />
The chart allows you to brainstorm potential local disasters based on general disaster types. Then, you can develop and test procedures for each event. For example, if your brainstorming type 2 disasters and you’re located near a fault line, you’ll need to list severe earthquakes. Then plan to mitigate that event based on a risk analysis. It’s important that you develop procedures that include contingency plans to account for multiple situations.</p>
<p>Each step up in the scale indicates a more severe event, but the likelihood the event will occur decreases. This makes successful planning more difficult, more expensive, and less likely to be needed the higher you go up the scale. From a cost to risk perspective the best strategy to work around this is to plan from the bottom up. Your risk profile will guide how high up the scale you can cover. Typically, this doesn’t require spending a lot of time planning for a class 1 disaster. This is due to the high cost to plan, low likelihood the event will occur, and low success rate should that disaster happen.</p>
<h2>Plan Enactment and Support</h2>
<p>Even if your plan is perfect, if you don’t enact it properly, it’s not likely you’ll stabilize your processes after a disaster. You must coordinate logistics, implement the plan, and train so everything is ready before the disaster occurs.</p>
<h2>Plan Review and Maintenance</h2>
<p>While the risk of many of the larger scale disasters remains constant, many factors such as responses, technology, and personnel will continue to change. This means it’s vital to conduct at least an annual review and routine testing.</p>
<h2>Conclusion</h2>
<p>A good disaster recovery plan can be the difference between a company surviving a disaster or going bankrupt. Even with a solid plan, a disaster will likely result in recovery efforts, but the hard work and resources devoted to the plan act as an insurance policy. The key is to keep the business running and ensure you’ve defined the process for recovery efforts in the aftermath of the disaster.</p>
<p><a href="https://www.zasio.com/records-management-disaster-plan/#_ednref1" name="_edn1" data-wpel-link="internal">[i]</a> Mary F. Robek, Gerald F. Brown, &amp; David O. Stephens, Information and Records Management, Document-Based Information Systems (1<sup>st</sup> Ed. 1996). Page 71, Table 4.1.</p>
<p><a href="https://www.zasio.com/records-management-disaster-plan/#_ednref2" name="_edn2" data-wpel-link="internal">[ii]</a> Modified from <em>Id.</em></p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_11">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_11  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_5 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-disaster-plan%2F&amp;linkname=Records%20Management%20Disaster%20Plan%20Development" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-disaster-plan%2F&amp;linkname=Records%20Management%20Disaster%20Plan%20Development" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Frecords-management-disaster-plan%2F&amp;linkname=Records%20Management%20Disaster%20Plan%20Development" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Frecords-management-disaster-plan%2F&#038;title=Records%20Management%20Disaster%20Plan%20Development" data-a2a-url="https://zasio.com/records-management-disaster-plan/" data-a2a-title="Records Management Disaster Plan Development" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/records-management-disaster-plan/" data-wpel-link="internal">Records Management Disaster Plan Development</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/records-management-disaster-plan/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Records Handling Laws: Format Requirements</title>
		<link>https://zasio.com/records-handling-laws-part-1-format-requirements/</link>
					<comments>https://zasio.com/records-handling-laws-part-1-format-requirements/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 21 Jun 2017 21:03:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<category><![CDATA[data authenticity]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[electronic records]]></category>
		<category><![CDATA[information integrity]]></category>
		<category><![CDATA[information security]]></category>
		<category><![CDATA[legacy records]]></category>
		<category><![CDATA[mandatory format regulations]]></category>
		<category><![CDATA[paper records]]></category>
		<category><![CDATA[permissive format regulations]]></category>
		<category><![CDATA[record accessibility]]></category>
		<category><![CDATA[record formats]]></category>
		<category><![CDATA[records managers]]></category>
		<category><![CDATA[Uniform Electronic Transactions Act]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1010</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/records-handling-laws-part-1-format-requirements/" data-wpel-link="internal">Records Handling Laws: Format Requirements</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_6 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_12">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_12  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_6  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">Records managers often overlook laws that regulate record formats. Most companies store the bulk of their records electronically—or they’re moving in that direction. This makes it important to consider legal requirements about records formats.</p>
<p><b>Permissive Format Regulations</b></p>
<p>The good news is that most format regulations allow for electronic recordkeeping if you meet certain conditions. In the US, the Uniform Electronic Transactions Act, which is in effect in 47 states, is a good example of standard language found in many domestic and international permissive format requirements. The main components usually include 1) accurate and trustworthy information and 2) accessibility.</p>
<p><b>Accurate and Trustworthy Information</b></p>
<p>The electronic version must accurately reflect the finalized version of the record. This condition recognizes that it’s easy to alter and override many formats of electronic records. It also recognizes that original versions of electronic records don’t exist in the same context as paper records.</p>
<p>A crucial element for accuracy is information integrity, which includes ensuring that the record has not been altered. While evidentiary rules can also apply, we’ll only include a couple of general factors that impact accuracy:</p>
<ul>
<li><strong>Authenticity</strong>: Someone with knowledge of the records that can authenticate the integrity of the information.</li>
<li><strong>Security</strong>: Security measures in place to protect the information from tempering.</li>
</ul>
<p>&nbsp;</p>
<p><b>Accessibility</b></p>
<p>The records must remain accessible. This condition recognizes that technology becomes obsolete and data can become corrupt over time. However, information must remain accessible throughout its required retention. A few steps to help meet this requirement include:</p>
<ul>
<li>Migrating records from legacy systems into new systems so they are readable.</li>
<li>Using a format that can be reproduced into hard copy within a reasonable time.</li>
<li>Backing up electronic records to prevent loss through degradation.</li>
</ul>
<p>&nbsp;</p>
<p>While many of the permissive format regulations use slightly different terminology and include other information, such as exceptions for contractual arrangements, specific evidentiary situations, and more, this provides a summary of the overall requirements for many of these regulations.</p>
<p><b>Mandatory Format Regulations</b></p>
<p>Mandatory format regulations require that a record be kept in a particular format. While rare, in many jurisdictions and industries, these regulations impact common records. Identifying and properly interpreting and applying these types of requirements is crucial to ensure compliance with the law. A few examples of mandatory format requirements include:</p>
<ul>
<li>China’s Implementation of the Methods for Management of Invoices Notice requires that invoices be kept in stub form.</li>
<li>In the United States, 17 CFR 240.17a-4 requires that Members of National Securities Exchanges, Brokers, or Dealers must retain certain records related to their securities activities in micrographic or electronic storage media exclusively in a non-rewriteable, non-erasable format.</li>
<li>Switzerland’s Code of Obligations requires that annual reports and audit reports be retained in a written form and signed.</li>
</ul>
<p>&nbsp;</p>
<p>Unfortunately, finding these requirements can be a bit like finding a needle in a haystack. Unlike the permissive requirements, which often have their own dedicated law, mandatory format regulations are usually found buried in the text of laws alongside requirements to retain records. Identifying them requires extensive research.</p>
<p>Zasio’s Versatile Retention software can help to make this process easier. Our Research Team of lawyers and paralegals conduct research and categorize relevant format requirements so they can easily be searched, reviewed, and applied. In addition, our Consulting Team offers customized reports detailing format requirements and how they impact our clients.</p>
<div class="post_content_holder">
<div class="post_text">
<div class="post_text_inner">
<p><a href="https://www.zasio.com/about-us/contact-us/" data-wpel-link="internal">Contact Zasio</a> today to see how our consulting services can help you stay compliant and minimize risk.</p>
</div>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
</div>
</div></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_13">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_13  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_6 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Frecords-handling-laws-part-1-format-requirements%2F&amp;linkname=Records%20Handling%20Laws%3A%20Format%20Requirements" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Frecords-handling-laws-part-1-format-requirements%2F&amp;linkname=Records%20Handling%20Laws%3A%20Format%20Requirements" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Frecords-handling-laws-part-1-format-requirements%2F&amp;linkname=Records%20Handling%20Laws%3A%20Format%20Requirements" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Frecords-handling-laws-part-1-format-requirements%2F&#038;title=Records%20Handling%20Laws%3A%20Format%20Requirements" data-a2a-url="https://zasio.com/records-handling-laws-part-1-format-requirements/" data-a2a-title="Records Handling Laws: Format Requirements" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/records-handling-laws-part-1-format-requirements/" data-wpel-link="internal">Records Handling Laws: Format Requirements</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/records-handling-laws-part-1-format-requirements/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Implications of Statutes of Limitations, Privacy &#038; Handling Requirements on Information Management</title>
		<link>https://zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/</link>
					<comments>https://zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 05 Oct 2016 21:40:48 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1087</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/" data-wpel-link="internal">Implications of Statutes of Limitations, Privacy &#038; Handling Requirements on Information Management</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_7 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_14">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_14  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_7  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">All enterprises, whether they be commercial, governmental, charitable, or any other structure, are required to follow information management regulations in some way; there are even laws regulating the president of the United States.<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> This article discusses several regulatory requirements that impact enterprises during information creation, custodianship, archival and disposition cycles. Good practice requires the identification of information types that constitute official records and the creation of a Records Retention Schedule (RRS) to manage the official records. RRS’s specify (among other things) how to properly retain records and what steps are necessary in retaining and disposing of records to comply with regulations.<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a> The following will briefly discuss requirements impacting the duration of records retention, including privacy laws and, even though they do not mandate a definitive retention period duration, statutes of Limitations (SOLs). Finally, this article will then introduce and describe several handling and ancillary requirements related to records retention.</p>
<p><strong><u>Duration of Retention Background Explanation: </u><u>Retention Laws and Regulations</u></strong></p>
<p>Records retention requirements mandate the retention of records based on regulated parties.  Tens of thousands of international and domestic records retention laws exist that either generally require the retention of records or set defined periods of time to retain records.  These have been passed by legislatures, agencies, self-regulatory organizations and other regulatory bodies and cover both records common to all companies, like employment and accounting records, and records unique to specific industries like records of nonconforming products for manufacturers. Often times retention requirements are accompanied  by a number of handling and ancillary requirements that need to be considered and followed to comply with the law.</p>
<p><strong><u>Duration of Retention Background Explanation</u></strong><u>: <strong>Privacy / Personally Identifiable Information</strong></u></p>
<p>A unique category of records retention requirements are those regulating the retention of Personally Identifiable Information (PII). These requirements deal with the retention of records, but instead of setting the minimum amount of time to keep records they set a maximum retention period, compelling the destruction after that period of time.</p>
<ul>
<li><strong>Broad vs. Specific PII Requirements</strong>: Some have a broad and generic retention period, a common example being to retain PII for no longer than is necessary based on the purpose for which the information was initially collected, while others are more rigid, defining types of PII and setting an exact retention time-frame. Similarly, some privacy requirements have broad and generic language about the regulated records, a common example impacts any record containing PII, while others specifically identify the exact types of records governed. Where the regulations are broad and generic and not tied to a particular record type/code it is helpful to create a methodology to assure consistency in application. One method is to review an impacted RRS ahead of applying the regulations to identify the records that are believed to be impacted by or contain information within the scope of the broad mandates. The broad requirements will then be applied to the items identified in the methodology.</li>
<li><strong>Conflicts with Compelled Destruction Requirements</strong>: The majority of PII requirements have exceptions if the compelled destruction requirement conflicts with another law in that jurisdiction that requires a longer retention. For example France’s National Commission on Informatics and Liberty (CNIL) regulations generally require employers that file under the CNIL simplified standards to remove payroll data and time slips containing personal information after 5 years. However, France’s commercial code broadly requires retention of accounting related records including supporting records for a period of 10 years which arguably may include PII associated with payroll data. Because this particular CNIL requirement includes a provision that excludes information required to be retained by another law, the retention of PII for payroll accounting purposes, in accordance with the Commercial Code’s 10 year requirement may not be in contravention of the cited privacy requirement. Even without the ambiguity presented in the previous example, compelled destruction requirements present a major pain point for companies, limiting or complicating the retention of records based on business needs, common practice, or strategic needs like global harmonization efforts.</li>
</ul>
<p><strong><u>Duration of Retention Background Explanation</u></strong><u>: <strong>Statutes of Limitation</strong></u></p>
<p>Statutes of limitation in and of themselves do not mandate the retention of records, but, rather, provide context for consideration in identifying appropriate retention periods. For example, a common US statute of limitations for contracts is 5-6 years which generally requires that an action based in contract be brought before the expiration of 5-6 years from the date the contract was signed. The problem with statutes of limitation is that it is easy to get caught in the “every possible contingency” mindset because there are hundreds of claims that could be relevant if extremely rare circumstance arise, but that will rarely be relevant to the business world.</p>
<ul>
<li><strong>SOL Strategy</strong>:  For this reason, domestically and where a particular jurisdiction has an abundance of laws that govern the retention of records, a common strategy is to only rely upon SOLs where there are only a few retention laws on point, and where reasonable from a cost / risk perspective. It is also a good idea to analyze and then limit application of statutes of limitation to those deemed most relevant to a particular Company’s records, which usually consists of those related to written contracts, personal injury, products liability, discrimination, real estate, wage claims and tax. Otherwise, getting sidetracked by an every conceivable contingency analysis is likely.</li>
<li><strong>Spain SOL Example</strong>: There are recognized instances in which a statute of limitation creates a duty to retain records, similar to a definitive retention period. For example, Spain’s Supreme Court found that even through there was a record-keeping provision directly on point that required banks to keep accounting records which was interpreted to extend to deposit accounts for six years, that requirement provided only the minimum period. The court went on to discuss how the retention requirement did not relieve the bank from the burden of preserving records based on its own interest in defending against or bringing a suit. For this case the ruling meant that the Bank could not infer that the omission of records shows that the bank followed its own procedures not only when it came to its deposit accounts but in disposing its records which was narrow to the issue of Banks and Deposit accounts. However, with how broadly the court speaks about obligations created by Statutes of Limitations, in general, the trend has been to more cautiously apply statutes of limitations in Spain and in surrounding countries. The Spain case helps to explain the utility of retaining records based on Statutes of Limitations, which is where those records provide a defense to, or otherwise help defend and action where the statute of limitation has not expired.  If the bank had kept records showing that it had properly dealt with its deposit accounts it could have used that as a defense in that case.</li>
<li><strong>Lilly Ledbetter Example</strong>: The Lilly Ledbetter Act provides another example of a statute of limitation that directly impacts record-keeping by expanding the 3 year statute of limitations from the Equal Pay Act to start over every time a violating paycheck is issued.  Again, this is a statute of limitation, is not a records retention requirement, so it does not legally require that records be retained. However, the prudent approach is to retain records of compliance with the Equal Pay Act including pay slips to defend against claims should they arise which is why common practice is to keep these records for duration of employment plus 3 years.</li>
</ul>
<p><strong><u>Handling Requirements</u></strong></p>
<p>Handling requirements deal with aspects of record-keeping beyond the period of time they need to be retained. The sub-categories that are helpful for information management include, for example, media and format restrictions or allowances, location and records movement restrictions or allowances, protection and access restrictions, and requirements to destroy records in a certain way. Requirements that are ancillary to handling and retention requirements also include sanctions for non-compliance with retention and handling requirements. A well informed information management strategy will take all of these into account when drafting records retention schedules (RRS) and policies.</p>
<ul>
<li><strong>Destruction Requirements: </strong>These generally mandate the destruction of records after the legally specified retention period has expired or mandate a specific destruction method. Shredding is the most common, and some requirements get particular, for example some specify the shred size or require cross shredding. Other destruction requirements include burning, using chemicals to destroy records and different methods to wipe or destroy electronic data.  An example of a destruction requirement is the Business &amp; Commercial Code of Texas which requires “businesses collecting sensitive personal information shall destroy or arrange for the destruction of customer records containing sensitive personal information … by: shredding; erasing; or otherwise modifying the sensitive personal information in the records to make the information unreadable or indecipherable through any means.”<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn1" name="_ftnref1" data-wpel-link="internal">[1]</a> To follow the letter of the law in these instances records that have destruction requirements must be flagged so that when their destruction is due they can be disposed of properly.</li>
<li><strong>Records Location and Movement: </strong>These requirements impose restrictions or prohibitions on location and movement of certain records (e.g., must be retained in a certain location). These provisions tend to be associated with specific types of records and impose limitations such as to maintain records at the “head office,” “principal place of business,” or broadly within the jurisdiction in question and so forth.
<ul>
<li><strong>Cross Border/Localization Distinction: </strong>A sub-type of the records Location and Movement category is Cross Border restrictions, which are typically associated with PII and prohibit moving data containing PII out of a particular country. More often than not there are conditions that can be met to move the data, however, sometimes the laws are rigid and do not allow PII to be transferred out under any condition.</li>
<li><strong>EU Cross Boarder Example</strong>: A timely example of a conditional cross boarder / localization requirement are the European Union data protection requirements which only allow transfer of PII out of EU countries if certain conditions are met.  It is timely because one method relied upon historically for satisfying the standards for PII transfer, Safe Harbor, was recently overruled but EU’s Data Protection Agency and has been replaced by the Privacy Shield framework. To summarize, Privacy Shield is an agreement between the EU, the non-EU government and participating companies allowing for transfer of PII between boarders if certain requirements are met. These include transparency about PII being transmitted, compliance oversight by the EU and non-EU governments, sanctions for non-compliance, onward transfer restrictions and redress options for individual complaints.<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn2" name="_ftnref2" data-wpel-link="internal">[2]</a>  Another option for transferring data out of the EU is the Binding Corporate Rules which are internal rules adopted by participating enterprises that ensure “adequate safeguards for the protection of the privacy and fundamental rights and freedoms of individuals within the meaning of article 26 (2) of the Directive 95/46/CE for all transfers of personal data protected under a European law.”<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn3" name="_ftnref3" data-wpel-link="internal">[3]</a> The final option is to utilize model contract clauses which are standard contractual clauses issued by the EU commission that can be used by enterprises to “offer sufficient safeguards as required by Article 26 (2).”<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn4" name="_ftnref4" data-wpel-link="internal">[4]</a> While the information presented above about the EU cross border options is brief and likely to change in the future, it provides a good example and introduction to the robust requirements surrounding cross boarder transfer in the EU.</li>
<li><strong>Russia Localization Example</strong>: An example of a more ridged localization requirement is a new law in Russia which requires that personal data on Russian citizens must be kept on servers located within the territory of the Russian Federation. While it allows for a few exceptions, they all relate to circumstances necessary to achieve government goals, necessary for justice, or necessary for political, scientific, literary or creative activities. Russia’s Ministry of Telecom and Mass Communications has provided some additional exceptions for activities like making decisions based on the data and depersonalizing data as well as personal data obtained without solicitation or based on a transaction between legal entities. These clarifications are still being interpreted, but the consensus thus far is that so long as the data exists on a server in Russia, copies or the equivalents of the data can be transferred outside the country. Though there is a workaround to transferring the data across borders, the requirement to keep the server with the original data within Russia still presents a pain point for many enterprises doing business in Russia.</li>
</ul>
</li>
<li><strong>Records Media / Format: </strong>These requirements impose legal obligations or allowances to retain records in a particular format. The most common are permissive provisions permitting an electronic format so long as certain conditions are met, though there are some requirements to keep records in a specific format, usually hard copy or paper. An example of a hard copy requirement is Illinois Administrative Code which requires that originals of pollution filings including original pen and ink signatures be retained<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn5" name="_ftnref5" data-wpel-link="internal">[5]</a>. Like the PII requirements, there are common laws that generally regulate these topics, such as Electronic Transactions Acts, Model Requirements for the Management of Electronic Records, Write Once Read Many (“WORM”) requirements, etc., which need to be followed.
<ul>
<li><strong>Electronic Transactions Acts Example</strong>: An example of a permissive media / format requirement is the Uniform Electronic Transactions Act which has been passed by 47 states and allows for electronic retention of records so long as it “(1) accurately reflects the information set forth in the record after it was first generated in its final form as an electronic record or otherwise; and (2) remains accessible for later reference.”<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn6" name="_ftnref6" data-wpel-link="internal">[6]</a> Regulations related to “electronic transactions” are broadly stated to govern any record that could fall within the scope of that term. Because the regulation is not tied to a particular record type/series this is another scenario where a methodology is helpful to assure consistency in application.  For this purpose, a good plan is to review the schedule ahead of time to identify those records that are believed to be impacted by/contain information within the scope of the broad mandates so they can be applied consistently.</li>
<li><strong>Protection: </strong>Another handling category requires that certain records have various protections. These include higher security and access restrictions, that they be duplicated and backed up for disaster recovery purposes, or even that they be stored in a controlled environment, meaning that temperature, humidity and isolation from pollution or water are taken into account. An example is found in a Canadian circular dealing with electronic income tax record-keeping which requires that data stored electronically on media that is re-writable be kept clear from hazards that could deteriorate or affect the media like temperatures outside of a moderate range, moisture, sunlight and even magnetic fields.</li>
<li><strong>Sanctions: </strong>Sanctions are an ancillary aspect of retention requirements that impose penalties for non-compliance with record-keeping requirements including handling requirements. Punishments can vary from the most common, monetary fines, to the most extreme, criminal sanctions, including jail time if they are not followed. For example Cal Gov Code 12976 (a)  specifies that an employer that “willfully violates Section 12946 concerning record-keeping is guilty of a misdemeanor, punishable by imprisonment in a county jail, not exceeding six months, or by a fine not exceeding one thousand dollars ($1,000), or both.”<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn7" name="_ftnref7" data-wpel-link="internal">[7]</a>  Some fines can be significant, for example EU data protection laws have situations where fines are in the millions of dollars or that are calculated based on a percentage of the infracting companies’ revenue.<a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftn8" name="_ftnref8" data-wpel-link="internal">[8]</a> Knowing the sanctions is not strictly necessary so long as all requirements are complied with, although they can be considered in weighing the risks involved in making information management decisions and used as leverage in enforcing compliance. This is not to say that it is advisable to ever disobey a legal requirement, but sanctions can help not only to prioritize items with higher penalties but to provide backing and support for information management initiatives and projects.</li>
</ul>
</li>
</ul>
<p><strong><u>Conclusion</u></strong></p>
<p>In a typical client records retention schedule (RRS) approximately one-third to one-half of the schedule titles will be regulated in some way by a records retention requirement or impacted by best practice and potentially SOLs. While these numbers amount to a fraction of the RRS, , these are the records that are requested by regulators, requested during audits, or that may be needed to defend against/bring suit. Proper maintenance should consider not only retention periods but also handling requirements. If these records are not accounted for, the consequences may involve a wide range of sanctions ranging minor monetary fines to substantial monetary and criminal penalties. Fully considering and implementing the wide range of regulations pertinent to a enterprise’s RRS is crucial to minimizing risk.</p>
<p>Zasio is here to help, with several options based on client needs.  Our <a href="https://www.zasio.com/technology-solutions/records-retention-software/versatile-retention/" data-wpel-link="internal">Versatile Retention</a> software provides the relevant citations in an easy to use and apply format so that companies can create schedules and link laws themselves.  For clients who want more help Zasio Consulting offers RRS creation and consolidation services, and custom research, application, and recommendations services.   <strong> </strong></p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></p>
<p>&nbsp;</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref1" name="_ftn1" data-wpel-link="internal">[1]</a> Texas Business &amp; Commercial Code 521.052 (b) (Supp. L. 2009).</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref2" name="_ftn2" data-wpel-link="internal">[2]</a> EU-US Privacy Shield Fact Sheet (July 2016) from the European Commission website (accessed October 4, 2016, 12:56 PM) <a href="http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_eu-us_privacy_shield_en.pdf" data-wpel-link="external" rel="external noopener noreferrer">http://ec.europa.eu/justice/data-protection/files/factsheets/factsheet_eu-us_privacy_shield_en.pdf</a>.</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref3" name="_ftn3" data-wpel-link="internal">[3]</a> Overview on Binding Corporate rules from the European Commission website (accessed October 4, 2016, 12:58 PM) <a href="http://ec.europa.eu/justice/data-protection/international-transfers/binding-corporate-rules/index_en.htm" data-wpel-link="external" rel="external noopener noreferrer">http://ec.europa.eu/justice/data-protection/international-transfers/binding-corporate-rules/index_en.htm</a>.</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref4" name="_ftn4" data-wpel-link="internal">[4]</a> Model Contracts for the transfer of personal data to third countries from the European Commission website (accessed October 4, 2016, 12:59 PM) <a href="http://ec.europa.eu/justice/data-protection/international-transfers/transfer/index_en.htm" data-wpel-link="external" rel="external noopener noreferrer">http://ec.europa.eu/justice/data-protection/international-transfers/transfer/index_en.htm</a>.</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref5" name="_ftn5" data-wpel-link="internal">[5]</a> 35 Ill. Adm. Code 101.1010 (c)(4)(s1b) (effective January 27, 2015).</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref6" name="_ftn6" data-wpel-link="internal">[6]</a> As an example of the UETA, I pulled language from the version published in Idaho code which uses the same language as the versions passed by other states.  Idaho Code 28-50-112 (a) (I.C., § 28-50-112, as added by 2000, ch. 286, § 1, p. 959).</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref7" name="_ftn7" data-wpel-link="internal">[7]</a> Cal Gov Code 12976 (a) (operative January 1, 1984).</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref8" name="_ftn8" data-wpel-link="internal">[8]</a> “European Commission – Fact Sheet – Questions and Answers – Data protection reform,” from the European Commission website (accessed October 4, 2016, 3:11 PM) http://europa.eu/rapid/press-release_MEMO-15-6385_en.htm.</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref1" name="_ftn1" data-wpel-link="internal">[9]</a> For example, 3 CFR 102.110 requires the Executive Office of the President to retain self-evaluations of its programs considering enforcement of nondiscrimination on the basis of handicap for 3 years after completion.<a href="https://www.gpo.gov/fdsys/granule/CFR-2011-title3-vol1/CFR-2011-title3-vol1-sec102-110/content-detail.html" data-wpel-link="external" rel="external noopener noreferrer">https://www.gpo.gov/fdsys/granule/CFR-2011-title3-vol1/CFR-2011-title3-vol1-sec102-110/content-detail.html</a>.</p>
<p><a href="https://www.zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/#_ftnref2" name="_ftn2" data-wpel-link="internal">[10]</a> RRS’s also include business and operational needs, and common practice.  However this article is limited to legal requirements.</div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_15">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_15  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_7 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fimplications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management%2F&amp;linkname=Implications%20of%20Statutes%20of%20Limitations%2C%20Privacy%20%26%20Handling%20Requirements%20on%20Information%20Management" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fimplications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management%2F&amp;linkname=Implications%20of%20Statutes%20of%20Limitations%2C%20Privacy%20%26%20Handling%20Requirements%20on%20Information%20Management" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fimplications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management%2F&amp;linkname=Implications%20of%20Statutes%20of%20Limitations%2C%20Privacy%20%26%20Handling%20Requirements%20on%20Information%20Management" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fimplications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management%2F&#038;title=Implications%20of%20Statutes%20of%20Limitations%2C%20Privacy%20%26%20Handling%20Requirements%20on%20Information%20Management" data-a2a-url="https://zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/" data-a2a-title="Implications of Statutes of Limitations, Privacy &amp; Handling Requirements on Information Management" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/" data-wpel-link="internal">Implications of Statutes of Limitations, Privacy &#038; Handling Requirements on Information Management</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/implications-of-statutes-of-limitations-privacy-handling-requirements-on-information-management/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ROT Introduction &#038; Prevention Tips</title>
		<link>https://zasio.com/rot-introduction-prevention-tips/</link>
					<comments>https://zasio.com/rot-introduction-prevention-tips/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Tue, 23 Aug 2016 21:44:59 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1097</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/rot-introduction-prevention-tips/" data-wpel-link="internal">ROT Introduction &#038; Prevention Tips</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_8 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_16">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_16  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_8  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner">ROT stands for Redundant, Obsolete, and/or Trivial information and includes all information NOT being stored for a valid business, legal or common practice purpose. It is duplicative of official records, past its useful life, and/or information that does not meet the standard for an official record. Also, it’s important to remember that ROT consists of both physical and electronic information, including <a href="https://www.zasio.com/using-outlook-365-we-have-you-covered/" data-wpel-link="internal">email.</a></p>
<p><strong>Examples of why it is problematic:</strong></p>
<ul>
<li>Storage is expensive. Although it seems like less of a problem to store ROT electronically it can actually be more expensive in the long term than paper. For example, extensive ROT that is being accumulated in an unstructured format has the potential for expensive discovery and legal hold work should a suit commence.</li>
<li>It adds useless clutter, reducing accessibility of information by making it more difficult to find documents you need.</li>
<li>It is a liability. Keeping information that is no longer useful and that is no longer required by law may create liability risk by preserving evidence that could be deemed adverse.</li>
<li>Finally, if ROT contains <a href="https://www.zasio.com/identifying-personally-identifiable-information/" data-wpel-link="internal">personally identifiable information</a> (PII), keeping it could be illegal.</li>
</ul>
<p><strong>Tips to Prevent ROT</strong></p>
<p>Redundant data can be prevented by evaluating, then implementing, a well thought out and organized file plan that is easy to use and customized to the needs of the user. For example, grouping functionally similar records in dedicated files and using shortcuts to point to them when needed elsewhere avoids duplication. When using shortcuts, structure stability is crucial for the longevity of the plan, so it is important that the plan is well thought out in advance of implementation. Additionally, procedures can help limit redundant information. For example, designating dedicated roles or users to manage the records and information is a best practice that allows businesses to avoid saving redundant information. Companies often dedicate the first person in the “To” line in an email to save the contents while subsequent people listed and people in the “CC” list do not save.</p>
<p>Obsolete records should be purged as soon as they transition to that status, meaning they are no longer needed based on legal requirements, common practice and business needs. Creating, implementing and following a records retention schedule (RRS) is standard practice in order to properly dispose of obsolete records. When creating or revising a RRS keep in mind that the simpler and more intuitive the schedule, the more likely that employees will adhere and use it properly, which is why a big bucket functional schedule is usually recommended. For more complex organizations a data map may also be useful to pinpoint where the records referenced in the RRS reside electronically or in paper. Follow-through with the destruction of records by scheduling records destruction days dedicated to this task.</p>
<p>Because trivial information usually lies outside the definition of a record, most companies handle it through policies, procedures and training. For example, a policy defining what constitutes a record usually defines the final version as a record while excluding the working versions and drafts. The policy should go on to require that non-records, like working versions and drafts, be destroyed as soon as the final is established. Training is also necessary to place the responsibility of properly destroying trivial information on employees and to prevent information-hoarding which is a common mentality.</p>
<p><strong>Conclusion</strong></p>
<p>While destroying all ROT may be a long-shot goal, following the tips above provides a good first step to prevent compiling new ROT. If you are an established business, you likely already have a significant amount of ROT which is why it is important for you to review your records and information and put together a solid plan to manage new ROT. If reducing extensive existing ROT is an issue, there are software solutions that are designed specifically to help businesses manage their records and information. Examples to help with ROT include file and data analytics software and crawling software which analyzes unstructured data, pinpointing redundant information while auto-categorizing and indexing remaining information to distinguish between ROT and records.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_17">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_17  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_team_member et_pb_team_member_8 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Frot-introduction-prevention-tips%2F&amp;linkname=ROT%20Introduction%20%26%20Prevention%20Tips" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Frot-introduction-prevention-tips%2F&amp;linkname=ROT%20Introduction%20%26%20Prevention%20Tips" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Frot-introduction-prevention-tips%2F&amp;linkname=ROT%20Introduction%20%26%20Prevention%20Tips" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Frot-introduction-prevention-tips%2F&#038;title=ROT%20Introduction%20%26%20Prevention%20Tips" data-a2a-url="https://zasio.com/rot-introduction-prevention-tips/" data-a2a-title="ROT Introduction &amp; Prevention Tips" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/rot-introduction-prevention-tips/" data-wpel-link="internal">ROT Introduction &#038; Prevention Tips</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/rot-introduction-prevention-tips/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>EU-US Privacy Shield Introduction and Current Status</title>
		<link>https://zasio.com/us-eu-privacy-shield-introduction-and-current-status/</link>
					<comments>https://zasio.com/us-eu-privacy-shield-introduction-and-current-status/#respond</comments>
		
		<dc:creator><![CDATA[Zasio]]></dc:creator>
		<pubDate>Wed, 15 Jun 2016 19:21:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[By Rick Surber]]></category>
		<guid isPermaLink="false">https://wordpress-140425-3498808.cloudwaysapps.com/?p=1125</guid>

					<description><![CDATA[<p>The post <a href="https://zasio.com/us-eu-privacy-shield-introduction-and-current-status/" data-wpel-link="internal">EU-US Privacy Shield Introduction and Current Status</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="et_pb_section et_pb_section_9 et_section_regular" >
				
				
				
				
				
				
				<div class="et_pb_row et_pb_row_18">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_18  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_module et_pb_text et_pb_text_9  et_pb_text_align_left et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_text_inner"><strong>Introduction</strong></p>
<p>The proposed Privacy Shield agreement between the US and EU seeks to streamline EU data protection compliance for commercial exchanges requiring the transfer of personal data from the EU to the US. If approved, it would replace the Safe Harbor agreement which was deemed inadequate in assuring the protection of personal data by the European Court of Justice.</p>
<p>Privacy Shield seeks to satisfy the concerns opined by the European Court of Justice by requiring stronger obligations and enforcement mechanisms on companies and US government agencies including: affirmations and assurances about proper personal data use; restrictions on onward transfer; oversight mechanisms; an abolition of mass surveillance and indiscriminate collection; and sanctions for companies including the ability to exclude non-compliant companies. In addition, EU citizens will be able to file complaints against companies and US government agencies with third parties like arbitration panels and an ombudsman which will be available for escalated complaints. Further, companies will be required to answer complaints within 45 days, provide free dispute resolution, and work with data protection agencies in resolving complaints and agency concerns. The final item that is worth mentioning is that there will be joint monitoring by EU and US agencies including a privacy summit and public reporting.</p>
<p>Practically, for US companies, this will mean similar compliance self-certification as previously mandated under Safe Harbor, but in addition, Privacy Shield now adds an enforcement mechanism requiring that they work with EU citizens and privacy agencies to resolve complaints and provide sanctions for non-compliance.</p>
<p><strong>Status</strong></p>
<p>Initially scheduled to come into effect at the end of June, the US has fast-tracked several laws and agreements to implement the Privacy Shield changes including the Judicial Redress Act, which gives EU citizens the right to enforce data protection rights in US courts, and the Umbrella Act which seeks to implement and enforce data protection rules. Despite these initial aggressive efforts, several obstacles and criticisms have prevented approval of Privacy Shield by the EU. Most recently, the European Parliament passed a resolution listing several deficiencies in the agreement as proposed and asked for further negotiations.</p>
<p>While Privacy Shield is being reviewed and negotiated, other less streamlined options for legitimate data transfer will have to suffice such as model contract clauses, binding corporate rules, and consent agreements. Making the need for a Privacy Shield passage even more urgent, the Irish Data Protection Commissioner recently challenged the model contract clauses. As of writing this blog post a ruling by the European Court of Justice has not yet been issued on that matter.</p>
<p>For more information about Privacy Shield see the <a href="https://www.commerce.gov/news/fact-sheets/2016/02/fact-sheet-overview-eu-us-privacy-shield-framework" data-wpel-link="external" rel="external noopener noreferrer">USCommerce.gov fact sheet</a>.</p>
<p>&nbsp;</p>
<p><em>Disclaimer: The purpose of this post is to provide general education on Information Governance topics. The statements are informational only and do not constitute legal advice. If you have specific questions regarding the application of the law to your business activities, you should seek the advice of your legal counsel.</em></div>
			</div>
			</div>
				
				
				
				
			</div><div class="et_pb_row et_pb_row_19">
				<div class="et_pb_column et_pb_column_4_4 et_pb_column_19  et_pb_css_mix_blend_mode_passthrough et-last-child">
				
				
				
				
				<div class="et_pb_with_border et_pb_module et_pb_team_member et_pb_team_member_9 clearfix  et_pb_bg_layout_light">
				
				
				
				
				<div class="et_pb_team_member_image et-waypoint et_pb_animation_off"><img loading="lazy" decoding="async" width="96" height="96" src="https://zasio.com/wp-content/uploads/2022/08/Rick-01-96x96-1.jpg" alt="Author: Rick Surber, CRM, IGP" class="wp-image-1934" /></div>
				<div class="et_pb_team_member_description">
					<h4 class="et_pb_module_header">Author: Rick Surber, CRM, IGP</h4>
					<p class="et_pb_member_position">Senior Analyst / Licensed Attorney</p>
					
					
				</div>
			</div>
			</div>
				
				
				
				
			</div>
				
				
			</div>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=https%3A%2F%2Fzasio.com%2Fus-eu-privacy-shield-introduction-and-current-status%2F&amp;linkname=EU-US%20Privacy%20Shield%20Introduction%20and%20Current%20Status" title="Facebook" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_x" href="https://www.addtoany.com/add_to/x?linkurl=https%3A%2F%2Fzasio.com%2Fus-eu-privacy-shield-introduction-and-current-status%2F&amp;linkname=EU-US%20Privacy%20Shield%20Introduction%20and%20Current%20Status" title="X" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_button_linkedin" href="https://www.addtoany.com/add_to/linkedin?linkurl=https%3A%2F%2Fzasio.com%2Fus-eu-privacy-shield-introduction-and-current-status%2F&amp;linkname=EU-US%20Privacy%20Shield%20Introduction%20and%20Current%20Status" title="LinkedIn" rel="nofollow noopener external noreferrer" target="_blank" data-wpel-link="external"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=https%3A%2F%2Fzasio.com%2Fus-eu-privacy-shield-introduction-and-current-status%2F&#038;title=EU-US%20Privacy%20Shield%20Introduction%20and%20Current%20Status" data-a2a-url="https://zasio.com/us-eu-privacy-shield-introduction-and-current-status/" data-a2a-title="EU-US Privacy Shield Introduction and Current Status" data-wpel-link="external" rel="external noopener noreferrer"></a></p><p>The post <a href="https://zasio.com/us-eu-privacy-shield-introduction-and-current-status/" data-wpel-link="internal">EU-US Privacy Shield Introduction and Current Status</a> appeared first on <a href="https://zasio.com" data-wpel-link="internal">Zasio</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://zasio.com/us-eu-privacy-shield-introduction-and-current-status/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
