SlideShare uma empresa Scribd logo
1 de 45
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I. INTRODUCTION ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
I. INTRODUCTION cont’d (1)
I. INTRODUCTION cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II. WHY HAVE AN RRDP? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.A Statutory Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.A  Statutory Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.A  Statutory Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.A  Statutory Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.A  Statutory Obligations cont’d ,[object Object],[object Object],[object Object],[object Object]
II.B Compliance with Contractual Obligations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.B Contractual Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.B Contractual Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.B Contractual Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.B Contractual Obligations cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction ,[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction cont’d ,[object Object],[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction cont’d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
II.C Appropriate Document Destruction cont’d ,[object Object],[object Object],[object Object],[object Object]
III. DEVELOPING AND MANAGING A RRDP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
III.B Getting Started – Assessing the Situation ,[object Object],[object Object],[object Object],[object Object],[object Object]
III.C Defining the Scope of the RRDP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
III.D Regulatory and Contractual Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
III.E Establishing the Standards ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
III.F Implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object]
IV. Litigation and e-Discovery cont`d ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
V. Notes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
eds.com Questions??

Mais conteúdo relacionado

Mais procurados

Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP CertificationSam Bowne
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1anilinvns
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillTrustArc
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data SecurityWilmerHale
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesAvritek
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsCma Mohd
 
Digital investigation
Digital investigationDigital investigation
Digital investigationunnilala11
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_indiaAltacit Global
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domainppd1961
 

Mais procurados (20)

Online defamation
Online defamationOnline defamation
Online defamation
 
Introduction: CISSP Certification
Introduction: CISSP CertificationIntroduction: CISSP Certification
Introduction: CISSP Certification
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Cyber forensic 1
Cyber forensic 1Cyber forensic 1
Cyber forensic 1
 
WB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection BillWB-2022-01-25-India Data Protection Bill
WB-2022-01-25-India Data Protection Bill
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Privacy and Data Security
Privacy and Data SecurityPrivacy and Data Security
Privacy and Data Security
 
E mail Investigation
E mail InvestigationE mail Investigation
E mail Investigation
 
Data Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best PracticesData Sanitization and Disposal: Best Practices
Data Sanitization and Disposal: Best Practices
 
La1 Malaysia Cyber Laws
La1 Malaysia Cyber LawsLa1 Malaysia Cyber Laws
La1 Malaysia Cyber Laws
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Software piracy
Software piracySoftware piracy
Software piracy
 
Digital investigation
Digital investigationDigital investigation
Digital investigation
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Data Privacy Compliance
Data Privacy ComplianceData Privacy Compliance
Data Privacy Compliance
 
Data protection in_india
Data protection in_indiaData protection in_india
Data protection in_india
 
Cyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital DomainCyber Forensic - Policing the Digital Domain
Cyber Forensic - Policing the Digital Domain
 

Destaque

Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Pointlnarvid
 
Dist record 112070804007
Dist  record 112070804007Dist  record 112070804007
Dist record 112070804007Patel Parth
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Richard Austin
 
Records Retention Scheduling
Records Retention SchedulingRecords Retention Scheduling
Records Retention SchedulingFe Angela Verzosa
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Destaque (6)

Document Retention And Destruction Power Point
Document Retention And Destruction Power PointDocument Retention And Destruction Power Point
Document Retention And Destruction Power Point
 
Dist record 112070804007
Dist  record 112070804007Dist  record 112070804007
Dist record 112070804007
 
Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015Records Retention and Destruction Policies 2015
Records Retention and Destruction Policies 2015
 
Records Retention Scheduling
Records Retention SchedulingRecords Retention Scheduling
Records Retention Scheduling
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 
Slideshare ppt
Slideshare pptSlideshare ppt
Slideshare ppt
 

Semelhante a Records Retention And Destruction Policies

SkyLaw submission to securities commission re: proposed plan of arrangement i...
SkyLaw submission to securities commission re: proposed plan of arrangement i...SkyLaw submission to securities commission re: proposed plan of arrangement i...
SkyLaw submission to securities commission re: proposed plan of arrangement i...SkyLaw Professional Corporation
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxakshitarathi77
 
Netflix 2009
Netflix 2009Netflix 2009
Netflix 2009huaiyuli
 
King county-superior-court-order-on-rha-v-city-of-seattle-22421
King county-superior-court-order-on-rha-v-city-of-seattle-22421King county-superior-court-order-on-rha-v-city-of-seattle-22421
King county-superior-court-order-on-rha-v-city-of-seattle-22421Roger Valdez
 
Pikeville v. Suddenlink complaint
Pikeville v. Suddenlink complaintPikeville v. Suddenlink complaint
Pikeville v. Suddenlink complaintMountain Top News
 
dish network annual reports 2004
dish network annual reports 2004dish network annual reports 2004
dish network annual reports 2004finance24
 
City of Winter Springs Transmittal Letter and P&T
City of Winter Springs Transmittal Letter and P&TCity of Winter Springs Transmittal Letter and P&T
City of Winter Springs Transmittal Letter and P&TVictoriaColangelo
 
Law 421 final exam questions
Law 421 final exam questionsLaw 421 final exam questions
Law 421 final exam questionsStudent Whiz
 
Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.
Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.
Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.Workplace Investigations Group
 

Semelhante a Records Retention And Destruction Policies (20)

RRDP - 2015.02.26
RRDP - 2015.02.26RRDP - 2015.02.26
RRDP - 2015.02.26
 
UK Adjudicators July 2020 newsletter
UK Adjudicators July 2020 newsletterUK Adjudicators July 2020 newsletter
UK Adjudicators July 2020 newsletter
 
SkyLaw submission to securities commission re: proposed plan of arrangement i...
SkyLaw submission to securities commission re: proposed plan of arrangement i...SkyLaw submission to securities commission re: proposed plan of arrangement i...
SkyLaw submission to securities commission re: proposed plan of arrangement i...
 
Cfpb proposed modifications-mortgage-rules
Cfpb proposed modifications-mortgage-rulesCfpb proposed modifications-mortgage-rules
Cfpb proposed modifications-mortgage-rules
 
Cfpb proposed modifications-mortgage-rules
Cfpb proposed modifications-mortgage-rulesCfpb proposed modifications-mortgage-rules
Cfpb proposed modifications-mortgage-rules
 
UK Adjudicators August 2020 newsletter
UK Adjudicators August 2020 newsletterUK Adjudicators August 2020 newsletter
UK Adjudicators August 2020 newsletter
 
UK Adjudicators September 2019 newsletter
UK Adjudicators September 2019 newsletterUK Adjudicators September 2019 newsletter
UK Adjudicators September 2019 newsletter
 
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptxINFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
INFORMATION TECHNOLOGY ACT 2000 and its provisions.pptx
 
The Indian IT act.pptx
The Indian IT act.pptxThe Indian IT act.pptx
The Indian IT act.pptx
 
Netflix 2009
Netflix 2009Netflix 2009
Netflix 2009
 
It act law ppt
It act law pptIt act law ppt
It act law ppt
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
King county-superior-court-order-on-rha-v-city-of-seattle-22421
King county-superior-court-order-on-rha-v-city-of-seattle-22421King county-superior-court-order-on-rha-v-city-of-seattle-22421
King county-superior-court-order-on-rha-v-city-of-seattle-22421
 
Pikeville v. Suddenlink complaint
Pikeville v. Suddenlink complaintPikeville v. Suddenlink complaint
Pikeville v. Suddenlink complaint
 
dish network annual reports 2004
dish network annual reports 2004dish network annual reports 2004
dish network annual reports 2004
 
City of Winter Springs Transmittal Letter and P&T
City of Winter Springs Transmittal Letter and P&TCity of Winter Springs Transmittal Letter and P&T
City of Winter Springs Transmittal Letter and P&T
 
Law 421 final exam questions
Law 421 final exam questionsLaw 421 final exam questions
Law 421 final exam questions
 
Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.
Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.
Securities and Exchange Commission Cease & Desist Order Against KBR, Inc.
 
IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008IT Act 2000 & IT Act 2008
IT Act 2000 & IT Act 2008
 
Dbc anpe bienes_rm_88 modelo dbc
Dbc anpe bienes_rm_88 modelo dbcDbc anpe bienes_rm_88 modelo dbc
Dbc anpe bienes_rm_88 modelo dbc
 

Mais de Richard Austin

The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical IssuesRichard Austin
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical IssuesRichard Austin
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeRichard Austin
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)Richard Austin
 
Knowing and managing what's been agreed the case for contract management
Knowing and managing what's been agreed   the case for contract managementKnowing and managing what's been agreed   the case for contract management
Knowing and managing what's been agreed the case for contract managementRichard Austin
 
Audit clauses in IT agreements
Audit clauses in IT agreementsAudit clauses in IT agreements
Audit clauses in IT agreementsRichard Austin
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12Richard Austin
 
Protecting Third Party Information under FOI Legislation
Protecting Third Party Information  under FOI LegislationProtecting Third Party Information  under FOI Legislation
Protecting Third Party Information under FOI LegislationRichard Austin
 
Outsourcing Trends 2009
Outsourcing Trends 2009Outsourcing Trends 2009
Outsourcing Trends 2009Richard Austin
 
International Market Selection Strategies for Softwarte Companies
International Market Selection Strategies for Softwarte CompaniesInternational Market Selection Strategies for Softwarte Companies
International Market Selection Strategies for Softwarte CompaniesRichard Austin
 

Mais de Richard Austin (10)

The Artificial Intelligence World: Responding to Legal and Ethical Issues
The Artificial Intelligence World:  Responding to Legal and Ethical IssuesThe Artificial Intelligence World:  Responding to Legal and Ethical Issues
The Artificial Intelligence World: Responding to Legal and Ethical Issues
 
AI on the Case: Legal and Ethical Issues
AI on the Case:  Legal and Ethical IssuesAI on the Case:  Legal and Ethical Issues
AI on the Case: Legal and Ethical Issues
 
Intermediary Accountability in the Digital Age
Intermediary Accountability in the Digital AgeIntermediary Accountability in the Digital Age
Intermediary Accountability in the Digital Age
 
Ai on the case legal and ethical issues (may 17 2019)
Ai on the case   legal and ethical issues (may 17 2019)Ai on the case   legal and ethical issues (may 17 2019)
Ai on the case legal and ethical issues (may 17 2019)
 
Knowing and managing what's been agreed the case for contract management
Knowing and managing what's been agreed   the case for contract managementKnowing and managing what's been agreed   the case for contract management
Knowing and managing what's been agreed the case for contract management
 
Audit clauses in IT agreements
Audit clauses in IT agreementsAudit clauses in IT agreements
Audit clauses in IT agreements
 
Source Code Escrow Agreements 2010.02.12
Source Code Escrow Agreements   2010.02.12Source Code Escrow Agreements   2010.02.12
Source Code Escrow Agreements 2010.02.12
 
Protecting Third Party Information under FOI Legislation
Protecting Third Party Information  under FOI LegislationProtecting Third Party Information  under FOI Legislation
Protecting Third Party Information under FOI Legislation
 
Outsourcing Trends 2009
Outsourcing Trends 2009Outsourcing Trends 2009
Outsourcing Trends 2009
 
International Market Selection Strategies for Softwarte Companies
International Market Selection Strategies for Softwarte CompaniesInternational Market Selection Strategies for Softwarte Companies
International Market Selection Strategies for Softwarte Companies
 

Records Retention And Destruction Policies