Create a document retention policy for your college

Assignment Help Computer Engineering
Reference no: EM13834753

I need help with this project for homework assignment

Introduction

You are the Chief Information Officer for Premier College. Recently, your college has received a notice from the Department of Education about an investigation of your college based on the state-specific testing and compliance procedures. The Department of Education has sent a Litigation Hold Notice wherein they have asked all college staff and administrators of the college to preserve all relevant documents, records, data, contracts (regardless of its location or medium), and correspondence notes.

The information requested may exist in various forms, including paper records, hand-written notes, telephone log entries, e-mail, and other electronic communications (including voicemail), word processing documents (including drafts, spreadsheets, databases, and calendars), telephone logs, electronic address books, personal digital assistant (PDA) like Palm Pilots and BlackBerrys, Internet usage files, systems manuals, and network access information in their original format.

All electronically stored information (ESI) should be preserved in its originally created, or "native" format, along with related metadata. Relevant backup tapes and all indexes for those tapes should also be preserved. Reasonably accessible information must also be preserved, because such sources will need to be identified under compelling circumstances, and may need to be produced. If you have any doubts as to whether specific information is responsive, err on the side of preserving that information.

1. Create a document retention policy for your College that complies with all state and Federal regulations.

Reference no: EM13834753

Questions Cloud

Outline why the account is at significant risk : Problem 1: From your business risk analysis, identify three (3) accounts to be at significant risk. For each of the accounts you identify:
Draw erd with key attributes and data dictionary : Draw ERD with key attributes. You can use any notation to draw the ERD. Must include legend - Data dictionary for the above scenario
Some of the worst con artists practice their craft based : Some of the worst con artists practice their craft based on meteorological events
Maria hernandez-associates : In June 2004, Maria Hernandez found herself out of a job for the second time in six months. As she left the building that had housed her failed dot-com employer, carrying a small box of personal belongings, her mind was already embracing a plan th..
Create a document retention policy for your college : Create a document retention policy for your College that complies with all state and Federal regulations
Principles that govern labor relations in the public sector : Discussion question responses should be at least 200-300 words. Your Module 7 discussion is to describe and analyze one of the following: A) Principles that govern labor relations in the public sector
Perform data analysis on the relevant variables : Problem is related to business computing - Analysis the given data
Discuss various methods of obtaining information : Identify the methods of acquiring information from a complainant or witness. Discuss various methods of obtaining information from reluctant or fearful victims or witnesses.
Federal grant and school district match : Your Local school district receives a grant from the federal government to support programs directed at special needs students. The grant is a matching grant in which each dollar spent by the school district on teacher salaries for special needs e..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the manner in which you can employ the purchased

imagine you are an administrator for a large corporation that has just purchased a new company. to access some of the

  Analyze all e-mail messages found in the pst file

Use FTK to analyze all e-mail messages found in the pst file. Find correspondence that supports the company's suspicions. The company wants a solid case, so showing the information was exchanged is important

  Security issues while users processing the database

Describe the security issues which may be encountered when the multiple users process the database concurrently.

  Description of the situation, intended users

Write down a paper demonstrating the application of your chosen DSS.

  Assume that you are a cto of a retail organization that has

assume that you are a cto of a retail organization that has adopted the rfid technology. discuss the advantages and

  Computing the cryptosystem

Consider the following cryptosystems and compute which security service(s) (e.g. Authentication, Integrity…etc) they offer: Example: Ek(M) - Confidentiality

  You have just been hired as an information security

you have just been hired as an information security engineer for a large multi-international corporation.

  A program on a registration application for a school

a program on A registration application for a school

  Can you suggest process for choosing appropriate data-mining

Consider on how you would know if a computer were thinking like a human.

  What is the largest value of x

A soft real-time system has four periodic events with periods of 50, 100, 200 and 250 msec each. assume four events require 35, 20, 10 and X msec of CPU time, respectively. What is the largest value of X for which the system is schedulable.

  Discuss the advantages and disadvantages of each approach

COMP247 Data Communications. What is the maximum data capacity for traffic between Hornsby and the City store?

  Troubleshooting the software

AV software has eliminated the malware from highly infected system. After the first reboot, an error message is displayed that consists of the reference to strange DLL file that is missing.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd