Defensible Disposition Jennifer Crawford, CRM Director, Product Management Iron Mountain What We Will Cover What is Defensible Disposition? Why should I care? How do I get there? What is Defensible Disposition? Defensible Disposition: Disposal (deletion/destruction) of content in good-faith compliance with legal, regulatory, privacy, and security requirements. Managing Records Does NOT Require Perfection FRCP 37 “recognizes that ‘reasonable steps’ to preserve suffice; it does not call for perfection.” Reasonable steps - “routine, good-faith operation of an electronic information system” is a factor to consider… Bare Minimum Path to Defensible Disposition Current Retention Schedule Preservation Confidence Secure Destruction Reliable Reporting Tell Me About Yourselves Which of the following are true? Where is your RIM function? • Compliance • Finance • Legal • Operations/Corporate Services • Risk • Sourcing/Vendor Mgt • Technology • Elsewhere? • We always consistently dispose in accordance with our retention schedule and preservations because we are perfect. • We have a retention schedule and preservation policy, but we struggle to convince legal or other stakeholders to get comfortable with destruction. • We have a retention schedule and preservation policy, but we struggle to enforce individual employee adoption and/or technology implementation across the company. • We need improvements to our policy/retention schedule before we can even begin to think about defensible disposition. • We just do what Legal tells us to do. Why Should I Care? The Value of Defensible Disposition Exponential Growth in Electronic Data Results in Crippling Costs 90% of all information was created in the last 2 years. 44x more information will exist in 2020 than today. 650% volume increase between 2005-2015. Requires 50% more staff to manage. Most Organizations Over-Retain Information According to a 2012 Compliance, Governance and Oversight Counsel (CGOC) survey, at any given time: 1% of corporate information is on litigation hold; 5% is in a records category; and 25% has current business value. This means that as much as 69 percent of all the data stored in an organization could be defensibly eliminated, that is, disposed of without increasing the risk to the company of undercutting business initiatives or risking legal or regulatory penalties. Save on Costs and Drama 69% of information within a company is needlessly retained far beyond retention requirements. Over-retained information is a liability and racks up costs. They can’t hack what you don’t have. Get rid of what you legally can to protect yourself from data breaches. Every company, regardless of size or industry, should have a current retention schedule in place. Managing Costs and Risks While the basic cost to manage a terabyte of information may be about $5,000, if that terabyte is retained unnecessarily and becomes the subject of discovery (and collection, processing, analysis, and review), that unneeded data may cost the organization an extra $15,000; i.e. $20,000 per TB. Jake Frazier & Anthony Diana, 'Hoarders': The Corporate Data Edition, LAW TECH.NEWS (Dec. 19, 2012). Data Breach Costs Data breach laws in US and Europe are increasing fines and liability for failure to protect private information maintained on individuals increasing risks of maintaining information that has outlived its usefulness. For example, EU fines can be as much as 4% of global sales or 20 million euros. 1000 respondents from around the world in 12 industries and federal and local government 70% ARMA Members 85% North America BENCHMARK REPORT: Demographics 15% Europe, Asia, Africa, Latin America, Mid East BENCHMARK REPORT FINDINGS: Transforming Info Management KEY THEMES 1 Organizations recognize IG as a business priority yet still struggle to overcome institutional and cultural barriers. 2 Automation of critical lifecycle and governance activities is elusive. 3 Lack of training and compliance monitoring continue to inhibit RIM and IG program maturity. BENCHMARK REPORT FINDINGS 2013 | 2014 2016 | 2017 WHAT THIS MEANS No forward progress in RIM and IG program maturity How Do I Get There? Implementing a Defensible Disposition Program Remember this slide? Bare Minimum Path to Defensible Disposition Current Retention Schedule Preservation Confidence Secure Destruction Reliable Reporting INSIGHTS: Records Retention Schedules Respondents continue to seek improvements: Opportunity to Improve SIDE EFFECTS MAY INCLUDE: Fewer categories • Inconsistent retention rules for Fewer event-based periods • Uniformity across business like records • More up-to-date Difficult to apply to electronic Global standard records • 2013 | 2014 2016 | 2017 63% 59% Not reacting quickly 67% 65% enough to 69% 71% changes in laws and regs • 55% 60% 44% 32% Employee misapplication of rules to records respondents say they need no improvement Inaction20% basedofon not knowing while in 2013 | 2014 that number was 41% when a trigger occurs Prescription For Change • Take a closer look at how you can collapse classes into larger buckets for ease of use by employees and technology 35% STILL FIND IT HARD TO MAP RECORDS TO SCHEDULE (Same as in 2013|2014) • Use automated tools to classify records on creation or through a workflow CHECK OUT EVENT-BASED RETENTION GUIDE Practical advice for reducing amount, capturing triggers and more IRON MOUNTAIN’S POLICY CENTER • Notification of changes to the Schedule as rules and regs change • Global research • Cloud-based for easy access across the enterprise Path to Defensible Disposition Current Retention Schedule Preservation Confidence Secure Destruction • Update/refresh retention schedule every 12-18 months • Be aware of and enforce privacy obligations • Make sure everyone is working from the same version of the truth • Train all employees at least annually on retention/privacy obligations • Enforce record code application through process and system controls, such as: • Reliable Reporting • Require that all electronic systems include ILM capabilities, including record code classification (automate disposal) • Require authorized record code application when creating orders to send boxes to storage (NO commingling!) • Require standardization of onsite storage procedures, to include indexing and lifecycle management • Update business processes to include record code classification and other lifecycle-related metadata, such as: • Record Code • Retention Start Date (Event Date, Create Date, Receipt Date, etc.)/Destruction Eligibility Date • Unique Identifier, Departmental Identifier, System Identifier, etc. Other best practices? Path to Defensible Disposition Current Retention Schedule Preservation Confidence Secure Destruction Reliable Reporting • Central tracking/maintenance mechanism for preservation management • Ensure that preservation data is current and trustworthy, with unique hold codes and specific, actionable, metadatalevel parameters (custodian, record class, application/system level, etc.) • Train all employees at least annually on preservation obligations • Enforce preservation/hold code application through process and system controls, such as: • Require that all electronic systems have unique identifiers/content descriptions so that holds can be placed at system level and implement controls to prohibit destruction eligibility when under preservation • Apply hold codes to boxes in offsite storage, with rules that boxes with hold codes are not destruction eligible • Update business processes/systems to contemplate preservation requirements and implement controls to prohibit destruction eligibility when under preservation • • Get rid of copies/duplicative information where Rule of Best Evidence does not apply Other best practices? Path to Defensible Disposition Current Retention Schedule Preservation Confidence Secure Destruction Reliable Reporting • Are you confident that retention has been satisfied and no preservations apply? If yes, then: • Electronic Deletion: • • • • Full deletion of all content + upstream/downstream data without possibility of reconstitution • Disposition Summary vs keeping full metadata log of what was destroyed Offsite Storage Destruction (for all media): • Review Destruction Eligibility Reports produced by vendor • No destruction without authorization from customer central point of contact • Vendor destruction chain of custody/destruction practice confidence • Certificates of Destruction Onsite Physical Records Destruction: • Secured containers for disposal, emptied securely and routinely. Who has the key? • Clean Desk Policy Other best practices? Path to Defensible Disposition Current Retention Schedule Preservation Confidence Secure Destruction Reliable Reporting • How current is your retention schedule? When was it last updated? What changed and when? • What is on hold? When was the hold established? Who established it? What are the parameters? • Was was on hold? When was the hold released? Who released it? What were the parameters? • What was destroyed? (Summary/batch info may be sufficient) • When was it destroyed? • Who authorized destruction? • When were your employees trained on retention policy? Who completed the training? • Can you demonstrate conformation to Right to Erasure data handling (and other GDPR/Privacy requirements) at the individual level? • Let’s talk about Privacy and the GDPR… GDPR Applicability General Data Protection Regulation Does my company offer goods or services to Individuals? Does my company monitor the behavior of Individuals? Does my company have employees in the EU? Answering these three questions can help determine whether your company is impacted by the GDPR. If the answer is “yes” to any of these questions, the GDPR may apply to your company. Source: Essential Guide to the GDPR, TRUSTe Major Provisions of the EU General Data Protection Regulation • Scope: EU law would apply to EU citizens’ personal data, even if the data is collected, stored, processed, etc. outside of the EU. • Definitions and conditions to consent: Data subjects would have to give explicit, fully informed consent to anyone processing personal data. • Profiling: Restrictions on profiling would mandate a highly visible right to object. • Right to compensation: EU citizens would have the right to seek compensation for monetary and nonmonetary damages from any data processing considered unlawful by the EU. • Sanctions: Fines for noncompliance could reach 20 million euros or 4% of total worldwide annual turnover of the preceding year (whichever is higher). Schoch, Teresa Pritchard. “EU Privacy Regulations’ Impact on Information Governance.” Information Management, January/February 2016. Major Provisions of the EU General Data Protection Regulation, cont’d. • Permission: An organization must obtain permission from an EU DPA and inform the affected person before complying with a non-EU country government’s request to disclose personal data processed. • Breach notification: The notice of breach requirement is set at within 24 hours of breach. • PII definition: Personally identifiable information (PII) includes personal information as any information that if combined with another available piece of information would allow the identification of an individual. Information does not need to be assimilated to be considered PII. • “Sensitive data” definition: The EU definition of “sensitive data” relating to background such as religion, national origin, medical history, sexual orientation, etc. is more specific than before. Holding this type of information will require more stringent security, since the impact of dissemination is considered more egregious. Schoch, Teresa Pritchard. “EU Privacy Regulations’ Impact on Information Governance.” Information Management, January/February 2016. Impacts of Data Breaches Nonexistent Information Cannot Be Breached • Lawsuits • Negative publicity • Fines and penalties • Damage to “brand equity” • Loss of customer loyalty • Damage to company reputation • Loss of revenue • Increased operations costs • Erosion of share price • Loss of intellectual property They can’t hack what you don’t have. Get rid of what you legally can to protect yourself from data breaches. Schoch, Teresa Pritchard. “EU Privacy Regulations’ Impact on Information Governance.” Information Management, January/February 2016. GDPR High Risk Data Remember also that it is not enough to conform to data handling requirements under the GDPR – your company also must be able to demonstrate that it conforms. Source: Essential Guide to the GDPR, TRUSTe GDPR Obligations • Maintain the data subject’s consent for collection and use • Protect the data from unauthorized access • Retain the data for the appropriate length of time and dispose of it subject to the EU’s limitations on the length of time it can be kept • House it in a manner that would allow immediate access to it and action to meet the EU’s quick data breach notification requirements Schoch, Teresa Pritchard. “EU Privacy Regulations’ Impact on Information Governance.” Information Management, January/February 2016. INSIGHTS: Barriers to Disposition 2013 | 2014 2016 | 2017 SIDE EFFECTS MAY INCLUDE: “Keep everything culture” is impediment to exposure efficient to •anUnnecessary RIM/IG breaches •Can’t Increasing storage costs let go of information, • • 81% 78% Ineffective data analytics • Time consuming searches even if eligible 64% 64% Cannot obtain approvals for destruction 37% 40% Over-production for litigation INSIGHTS: Automation Deficit to Assist with Disposition 2013 | 2014 75% 2016 | 2017 78% Lack of automation processes remains the greatest barrier to timely and consistent disposition for paper and electronic records Scoring Your Disposition Program CONTROL Secure Destruction of Eligible Records DESCRIPTION Records eligible for destruction are securely disposed of in accordance with RIM Policy and Information Security protocols. SUPPORTING INFO Roles and responsibilities of the secure disposition process are clearly defined and communicated in policy and procedure. Electronic data or physical record secure destruction standards are upheld consistently and audited. RATING 1. All eligible records are disposed of routinely and securely. The process is documented and regularly audited. 2. Eligible records are disposed of securely, but the process is not audited or discrepancies have been found in the process. 3. Some, but not all, eligible records are securely destroyed or there is no confirmation in writing of the secure destruction. 4. Records are not disposed of in a secure manner. Establish a consistent rating scale for all controls SUPPORTING INFO RATING RATING Records eligible for destruction are securely disposed of in accordance with RIM Policy and Information Security protocols. 1. Roles and responsibilities of the 1. disposition process are Allsecure eligible records are disposed of clearly defined and communicated routinely andprocedure. securely. The process in policy and is documented and regularly Electronic data or physical record audited. secure destruction standards are upheld consistently anddisposed audited. of 2. Eligible records are securely, but the process is not audited or discrepancies have been found in the process. LOW Secure Destruction of Eligible Records DESCRIPTION HIGH CONTROL All eligible records are disposed of routinely and securely. The process is documented and regularly audited. 2. Eligible records are disposed of securely, but the process is not audited or discrepancies have been found in the process. 3. Some, but not all, eligible records are securely destroyed or there is no confirmation in writing of the secure destruction. 3. Some, but not all, eligible records are securely destroyed or there is 4. Records are not disposed of in a secure manner. no confirmation in writing of the secure destruction. 4. Records are not disposed of in a secure manner. Prescription For Change INSTITUTE A DEFENSIBLE DISPOSITION FRAMEWORK Institutionalize a consistent protocol for all to use Govern the program through ongoing monitoring and testing Identify and address weaknesses in RIM/IG processes Provide evidence of compliance to authorities Creating Retention Schedules Records Schedules are Complex The amount of time an electronic record should be maintained by an organization depends on many factors: • The record classification, • The record content (e.g., does it contain private information), • Business needs, • Legal holds (is the information related to subject matter relevant to an identified litigation matter?), • Legal requirements imposed by local, state, federal, or global law and regulations. Developing a Retention Policy Records retention policies are, in part, subjective and are filtered through legal risk appetite factoring in: Costs of over/under retention; Risks of over/under retention; Potential conflicts among legal obligations to purge/retain; and, Impact of statutes of limitation which may extend beyond retention periods. Analyzing Conflicting Obligations in the Application of Schedules Conflicts often arise when operations span different jurisdictions. • When resolving conflicts, key objective should be good faith compliance with all laws and obligations. • When this is not possible, the organization should thoroughly document its efforts to reconcile the conflict and its resulting decision-making process. When applying retention schedules, privacy, data protection, security, records and information management, risk management, and sound business practices should all be considered. The Sedona Conference Commentary on Information Governance, Sedona Conference Journal, 15 Sedona Conf. J. 125, Fall 2014 Creating Legal Records Schedules: Costly Endeavour “Determining the retention schedule for a given organization through traditional methods of legal research is a labor intensive and expensive effort. In the case of a global enterprise…doing business in 130 countries could easily exceed one million dollars.” Dagan, Charles R., It’s a Duty and It’s Smart Business, 19 Rich.J.L. and Tech. 12 (2013), at 14. Costly Schedule Creation (An organization)…could easily spend $10,000 per state jurisdiction.* Best practice requires that schedules be updated annually or every eighteen months. Dagan, Charles R., It’s a Duty and It’s Smart Business, 19 Rich.J.L. and Tech. 12 (2013), at 14. fn44. Affordable Retention Policy from the Most Trusted Name in Records Management COMMON BUSINESS CHALLENGES • Keeping records longer than required for legal, regulatory, or business reasons • Limited resources to build, curate, and update a legally defensible, global retention schedule • Inconsistent regulatory citation and change tracking that impacts legal defensibility • Manual placement of the rules and regulations across your content infrastructure A retention schedule dictates how long records must be retained before they may be deleted or destroyed. POLICY CENTER STANDARD EDITION A prebuilt legally defensible retention schedule management platform, backed by the same high quality legal research used by the world’s largest companies. Why does a prebuilt retention schedule matter to you? • Annual updates provided by Iron Mountain • A simple browser-based editor • Faster implementation of policy • Lower start up cost • Easy way to share your policy within your organization Maintaining a retention schedule through traditional methods of legal research is a labor-intensive and expensive effort. With Policy Center Standard Edition you can now… • Grow beyond manual, time-intensive processes to research, update, and communicate changes to retention policies • Keep your retention guidelines current and compliant for all types of information • Personalize your records classes and modify your retention rules • Subscribe to this prebuilt retention schedule without a large, upfront fee Policy Center Solution Suite ESSENTIAL EDITION STANDARD EDITION PROFESSIONAL EDITION ENTERPRISE EDITION Pre-Built Retention Schedule Customizable Customizable General Business Functions Retention Schedule Singular Multiple Multiple Read Only Partially Editable Up to 5 Unlimited Up to 10 Global Ongoing Ongoing Industry Specific Retention Schedule Custom Views Country Coverage Retention Schedule/Rule Updates 1 1 US or Canada US, Canada, or UK Annual Annual Q&A ©2017 Iron Mountain Incorporated. All rights reserved. Iron Mountain and the design of the mountain are registered trademarks of Iron Mountain Incorporated in the U.S. and other countries. All other trademarks and registered trademarks are the property of their respective owners.
© Copyright 2026 Paperzz