Proper Destruction of Records
When paper or electronic records have reached the end of their retention period, how do you appropriately destroy them? Below is a summary of common records destruction methods. Paper Records…
When paper or electronic records have reached the end of their retention period, how do you appropriately destroy them? Below is a summary of common records destruction methods. Paper Records…
Simply removing direct and indirect personal identifiers isn’t enough to achieve de-identification of a dataset. Data controllers must also analyze the context in which the data is presented, as well…
The Office of Inspector General (OIG) has broad authority to exclude a healthcare organization from participating in federal healthcare programs (e.g. Medicare, Medicaid). Although exclusions commonly arise from violations of…
Individuals value their privacy. In contrast, businesses value the ability to leverage personal information to deliver quality products and services to meet the needs of their clients. The legal standards…
In the world we live in today, customer support is a requirement for most products or services we use for both business and personal reasons. At some point, we’ve all…
A company’s records retention schedule (RRS) needs proper retention periods for their records and information. So, what do these retention periods do? They help designate information you should retain and…
The clock is ticking on the European Union’s new privacy law, the General Data Protection Regulation (GDPR). We’re less than one year away from when the GDPR comes into force,…
Records managers often overlook laws that regulate record formats. Most companies store the bulk of their records electronically—or they’re moving in that direction. This makes it important to consider legal requirements…
On May 25, 2018, the General Data Protection Regulation (GDPR) goes into effect. The GDPR harmonizes data protection and reshapes the way businesses approach data privacy. To achieve this goal,…
Countries are continuing to escalate restrictions on storage location and transfers of data, with China being the most recent to follow suit. China broadened its cybersecurity initiatives significantly in 2016…
Get the latest news, product releases and updates, and conference and event announcements from Zasio.