<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Regulations Archives - i-SIGMA</title>
	<atom:link href="https://isigmaonline.org/category/blog/regulations/feed/" rel="self" type="application/rss+xml" />
	<link>https://isigmaonline.org/category/blog/regulations/</link>
	<description>i-SIGMA Annual Conference and Expo Sites</description>
	<lastBuildDate>Thu, 24 Oct 2024 14:48:45 +0000</lastBuildDate>
	<language>en-CA</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.5</generator>
	<item>
		<title>CCTV Outages and How to Report Them</title>
		<link>https://isigmaonline.org/cctv-outages-and-how-to-report-them/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 24 Oct 2024 14:47:38 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6514</guid>

					<description><![CDATA[<p>We’ve likely all been there, right? You’ve just bought a new computer or phone, made certain it was installed correctly, following every bit of instruction down to the letter. And then, you let it be, hoping this new bit of technology is just as easy as it advertises on the box. And yet, there it [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/cctv-outages-and-how-to-report-them/">CCTV Outages and How to Report Them</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><img fetchpriority="high" decoding="async" class=" wp-image-6515 alignright" src="https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-300x300.png" alt="" width="253" height="253" srcset="https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-300x300.png 300w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-1024x1024.png 1024w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-150x150.png 150w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-768x768.png 768w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-99x99.png 99w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-425x425.png 425w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18-465x465.png 465w, https://isigmaonline.org/wp-content/uploads/2024/10/Member-Portal-18.png 1200w" sizes="(max-width: 253px) 100vw, 253px" /></h4>
<p>We’ve likely all been there, right? You’ve just bought a new computer or phone, made certain it was installed correctly, following every bit of instruction down to the letter. And then, you let it be, hoping this new bit of technology is just as easy as it advertises on the box.</p>
<p>And yet, there it is–the telltale ERROR message that has you spending hours online, trying to figure out what exactly went wrong and what you need to do to fix it.</p>
<p>The fact is that technology isn’t foolproof, regardless of how seamless it claims to be, and even if it’s installed correctly, there is always a chance that it may fail at some point or another.</p>
<p>So, what do you do when this technology happens to be the Closed-Circuit Television (CCTV) that is required by your NAID AAA Certification? What should be your next step when there is a loss of data or outage outside of your control?</p>
<p>Well, thankfully, the i-SIGMA Certification team has a contingency for this exact situation so that you and your facility can avoid any issues with regards to maintaining your certification should this untimely event happen in the future.</p>
<p>But first, let’s start by both defining what is expected of a NAID AAA Certification with regards to CCTV monitoring and what an outage would look like.</p>
<h4>CCTV Coverage and Outages</h4>
<p>To be found in compliance with NAID AAA standards, all Facility-based operations are required to have a CCTV system that monitors all access points into the secure building/area in which confidential material is received, staged, processed and/or destroyed. Additionally, there should be enough clarity and lighting to identify both the people within frame as well as their activities, and recordings of these activities must be retained for 90 consecutive days.</p>
<p>Conversely, an outage of CCTV coverage is considered by NAID AAA Certification standards to be <em><strong>any</strong></em> issue that would result in a loss of data within this timeframe. As in, anything that causes the CCTV to lose footage or become corrupted? That would be an outage!</p>
<h4>So, I Have Experienced an Outage. What Next?</h4>
<p>If you happen to notice an outage of your CCTV coverage, the solution is simple; although, you must act fast! To still be considered NAID AAA compliant, you <em><strong>must</strong></em> provide notice of the outage to i-SIGMA’s Certification staff within <em><strong>48 hour</strong></em>s of its discovery.</p>
<p>You can do this either by calling any of our Certification staff (602-788-6243) or emailing the <strong><a href="mailto:certification@isigmaonline.org" target="_blank" rel="noopener">Certification inbox</a></strong>. Then, a Certification staff member will note this in our system so that any auditors are aware of the outage, and it will not be counted against you in a future audit.</p>
<p>Additionally, this outage procedure <strong>must</strong> be outlined in your policies and procedures to be considered in full compliance.</p>
<p>It’s that simple, really! By following these procedures, your business can proudly maintain its certification status without being at the mercy of technology’s failures and avoid any fines that may come alongside it.</p>
<p><strong>Written by: Victoria Vale, i-SIGMA Certification Associate</strong></p>
<p>The post <a href="https://isigmaonline.org/cctv-outages-and-how-to-report-them/">CCTV Outages and How to Report Them</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</title>
		<link>https://isigmaonline.org/sec-adopts-rules-on-cybersecurity-risk-management-strategy-governance-and-incident-disclosure-by-public-companies/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Thu, 27 Jul 2023 21:13:09 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=6039</guid>

					<description><![CDATA[<p>The SEC recently announced that it adopted rules requiring public companies to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance. i-SIGMA CEO Nathan Campbell provides comment on the recently adopted rules. Dear i-SIGMA Members, I’m writing to inform you about [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/sec-adopts-rules-on-cybersecurity-risk-management-strategy-governance-and-incident-disclosure-by-public-companies/">SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The SEC <strong><a href="https://www.sec.gov/news/press-release/2023-139?utm_medium=email&amp;utm_source=govdelivery)" target="_blank" rel="noopener">recently announced</a></strong> that it adopted rules requiring public companies to disclose material cybersecurity incidents they experience and to disclose on an annual basis material information regarding their cybersecurity risk management, strategy, and governance. i-SIGMA CEO Nathan Campbell provides comment on the recently adopted rules.</p>
<p style="padding-left: 40px">Dear i-SIGMA Members,</p>
<p style="padding-left: 40px">I’m writing to inform you about a significant update from the Securities and Exchange Commission (SEC) regarding cybersecurity disclosures for public companies. The new rules will require registrants to disclose material cybersecurity incidents and provide annual disclosures on their cybersecurity risk management, strategy, and governance. As a non-profit supporting information governance professionals, we understand the importance of proper policies and procedures that protect sensitive information. This new requirement has been introduced, aiming to enhance transparency and accountability in the face of cybersecurity incidents. As part of the regulatory changes, registrants will now be required to disclose any material cybersecurity incidents on the recently introduced Item 1.05 of Form 8-K. Under these rules, registrants must promptly report the nature, scope, timing, and material impact of such incidents. In most cases, the disclosure on Form 8-K will be due within four business days of identifying the incident&#8217;s materiality. Moreover, these new regulations also introduce Regulation S-K Item 106, which mandates <u>registrants to provide detailed insights into their processes for assessing, identifying, and managing material risks arising from cybersecurity threats.</u> This includes disclosures of the board of directors&#8217; oversight and management&#8217;s role and expertise in handling cybersecurity risks.</p>
<p style="padding-left: 40px">i-SIGMA members prioritize safeguarding sensitive data, these disclosures will become a mandatory part of an organization&#8217;s annual reports. With these changes, the government is striving to strengthen cybersecurity practices and ensure that organizations are prepared to tackle potential threats effectively. Together, let&#8217;s uphold a secure and resilient business environment for all the clients we serve.</p>
<p style="padding-left: 40px">Thanks, Nate</p>
<h5><a href="https://www.sec.gov/news/press-release/2023-139?utm_medium=email&amp;utm_source=govdelivery)" target="_blank" rel="noopener">You can read the full press release from the SEC here &gt;&gt;</a></h5>
<p>The post <a href="https://isigmaonline.org/sec-adopts-rules-on-cybersecurity-risk-management-strategy-governance-and-incident-disclosure-by-public-companies/">SEC Adopts Rules on Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure by Public Companies</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Efficiently Keeping Your Business in Compliance</title>
		<link>https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:31:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5940</guid>

					<description><![CDATA[<p>Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/">Efficiently Keeping Your Business in Compliance</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4><strong><img decoding="async" class="size-medium wp-image-5941 alignright" src="https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-300x300.jpg" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-99x99.jpg 99w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2023/05/Untitled-design-30.jpg 750w" sizes="(max-width: 300px) 100vw, 300px" /></strong></h4>
<p>Running a business can be a daunting task, especially when it comes to ensuring compliance with various regulations and laws. Compliance is important not only for legal and ethical reasons but also for the efficiency of your business. By partnering with an i-SIGMA Certified Company who has obtained either their NAID AAA or PRISM Privacy+ Certification, your company is already leagues ahead in terms of compliance. The list below highlights ten things you can do to help run your business more efficiently, all of which are required of i-SIGMA Certified Providers. <strong><a href="https://directory.isigmaonline.org/suppliers/" target="_blank" rel="noopener">Find an i-SIGMA Certified Service Provider Here &gt;&gt;</a></strong></p>
<h4><strong>Identify and prioritize compliance requirements</strong></h4>
<p>The first step towards efficient compliance is to identify and prioritize the requirements that apply to your business. Depending on your industry and location, you may need to comply with various regulations, such as data privacy laws, labor laws, and tax regulations. Make a list of these requirements and prioritize them based on their importance and impact on your business.</p>
<h4><strong>Create a compliance program</strong></h4>
<p>Once you have identified the compliance requirements, create a compliance program that outlines the policies and procedures for meeting these requirements. This program should be tailored to your business and should cover all relevant compliance areas. Ensure that all employees are trained on the compliance program, and make sure that it is regularly updated to reflect changes in regulations.</p>
<h4><strong>Hire a compliance officer</strong></h4>
<p>If your business is large enough, consider hiring a dedicated compliance officer who will oversee the compliance program and ensure that all employees are following the policies and procedures. The compliance officer should have a thorough understanding of the regulations that apply to your business and should be able to keep up with any changes in these regulations.</p>
<h4><strong>Use technology to automate compliance tasks</strong></h4>
<p>Technology can help you automate many compliance tasks, such as tracking employee hours, filing tax returns, and monitoring data privacy compliance. By automating these tasks, you can reduce the risk of human error and save time and resources. Consider investing in compliance software that can help you manage compliance more efficiently.</p>
<h4><strong>Conduct regular compliance audits</strong></h4>
<p>Regular compliance audits can help you identify areas where your business may not be meeting regulatory requirements. These audits should be conducted by an independent third party who has expertise in the relevant compliance areas. The findings of the audit should be used to improve the compliance program and make any necessary changes to policies and procedures.</p>
<h4><strong>Monitor regulatory changes</strong></h4>
<p>Regulatory requirements are constantly changing, and it&#8217;s important to stay up-to-date on these changes. Subscribe to regulatory newsletters and attend relevant conferences and events to stay informed about any changes that may impact your business. Update your compliance program and policies as needed to ensure that you are meeting the latest regulatory requirements.</p>
<h4><strong>Train employees on compliance</strong></h4>
<p>All employees should be trained on the compliance program and the policies and procedures for meeting regulatory requirements. This training should be provided on a regular basis and should cover all relevant compliance areas. Ensure that employees understand the importance of compliance and the consequences of non-compliance.</p>
<h4><strong>Implement a whistleblower policy</strong></h4>
<p>A whistleblower policy can help you identify and address compliance issues before they become serious problems. This policy should provide employees with a way to report any suspected violations of regulations or company policies without fear of retaliation. Ensure that all employees are aware of the whistleblower policy and understand how to use it.</p>
<h4><strong>Maintain accurate records</strong></h4>
<p>Accurate record-keeping is essential for compliance. Keep all relevant records, such as financial statements, tax returns, and employee records, organized and up-to-date. Use a secure storage system to protect sensitive information and ensure that only authorized personnel have access to these records.</p>
<h4><strong>Seek professional help</strong></h4>
<p>If you&#8217;re unsure about how to meet regulatory requirements or if you&#8217;re facing a compliance issue, seek professional help. Consult with a lawyer or compliance expert who can provide you with guidance and advice on how to meet regulatory requirements and avoid compliance issues.</p>
<p>Compliance is a critical aspect of running a business, and it&#8217;s important to ensure that your business is meeting all regulatory requirements. By following the ten steps outlined in this article, with the help of an <strong><a href="https://directory.isigmaonline.org/" target="_blank" rel="noopener">i-SIGMA Certified Service Provider</a></strong>, you can help run your business more efficiently with compliance and reduce risk.</p>
<p>The post <a href="https://isigmaonline.org/efficiently-keeping-your-business-in-compliance/">Efficiently Keeping Your Business in Compliance</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</title>
		<link>https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/</link>
		
		<dc:creator><![CDATA[kelly]]></dc:creator>
		<pubDate>Thu, 10 Nov 2022 19:04:13 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5698</guid>

					<description><![CDATA[<p>Earlier this year, i-SIGMA hosted a webinar by guest presenter Daniel Risen, an Employee Benefits Advisor and Business Development Executive for OneDigital. Daniel shared with Members how to maximize the Cares Act Incentives via this webinar and a follow-up article in the iG Journal . You can access these here: Maximizing the Cares Act Incentives [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/">Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Earlier this year, i-SIGMA hosted a webinar by guest presenter Daniel Risen, an Employee Benefits Advisor and Business Development Executive for OneDigital. Daniel shared with Members how to maximize the Cares Act Incentives via this webinar and a follow-up article in the iG Journal . You can access these here:</p>
<ul>
<li><a href="https://isigmaonline.box.com/s/af227n34guqkygzl16vhe9wb87sfxmrq" target="_blank" rel="noopener">Maximizing the Cares Act Incentives &#8211; Webinar</a></li>
<li><a href="https://issuu.com/isigmaonline/docs/ig_journal2022_issue3_issuu/26" target="_blank" rel="noopener">Maximizing the Cares Act Incentives &#8211; Article</a></li>
</ul>
<p>Following the webinar, i-SIGMA received a few member inquiries under our Ask the Professionals program and are sharing the responses. </p>
<p><strong>Please Note: </strong>i-SIGMA is not a Certified Public Account and is not providing specific legal or accounting advice. We recommend that you reach out to your local tax professional to determine what specifically applies to your business in your local jurisdiction.</p>
<p>&nbsp;</p>
<h3>Question</h3>
<p><em>Dear Ask the Professionals,</em></p>
<p><em>We are excited about adding ERC funds to the PPP money we already qualified for but I&#8217;m confused if these funds will be consider taxible income later on. Please advise.</em></p>
<p><em>Sincerely,</em></p>
<p><em>Tax Ignorant</em></p>
<h3>Answer</h3>
<p><em>Dear Tax Ignorant,</em></p>
<p><em>We reached out to CPA Kristina Morgan of Sechler Morgan CPAs PLLC, who advised us of the following:</em></p>
<p><em>Nonprofit entities will NOT have to file an amended tax return (other than the required payroll tax return).</em></p>
<p><em>For-profit entities WILL have to file an amended tax return for the years they claim the credit. Those amounts will increase the companies’ profits (or reduce losses or carryover losses) and will therefore be taxable.</em></p>
<p><em>i-SIGMA also discovered that if a business claims the credit and is not eligible but certifies that they are, this is considered tax fraud. As such, we advise our members to work with a professional to understand the many requirements and calculations that are involved, especially if they also received a PPP Loan(s).</em></p>
<p><em>Sincerely,</em></p>
<p><em>i-SIGMA &amp; Professionals</em></p>
<h3>Question</h3>
<p><em>Dear Ask the Professionals,</em></p>
<p><em>I attended the webinar that i-SIGMA held regarding the Employee Retention Credit (ERC). We have a very small team with only a handful of employees. It seems that most firms want to work with large businesses and are focused only on revenue loss as a basis for applying for the credit. Do you have any information on the other ways of qualifying?</em></p>
<p><em>Sincerely</em></p>
<p><em>Small But Mighty</em></p>
<h3>Answer</h3>
<p><em>Dear Small But Mighty,</em></p>
<p><em>We followed up with Daniel Risen who did the presentation as well as spoke to other members applying for the credit. You are correct that initially, firms assess revenue. However, less than 5% of businesses that have received ERC have qualified under this criteria. (What qualifies? In 2020, if you saw a 50% drop in revenue, compared to the same quarter in 2019, you would be eligible for all of 2020. In 2021, if you saw a 20% reduction in revenue, compared to the same quarter in 2019, you would be eligible for that entire quarter in 2021.</em></p>
<p><em>More businesses qualify for ERC via the &#8220;Governmental Orders&#8221; criteria. If in your state or federally you were affected in your ability to conduct COMMERCE, TRAVEL, or GROUP MEETINGS by the pandemic under certain criteria, you could qualify. A few examples of qualifiers Daniel has seen within our industry in some states include:</em></p>
<ol>
<li><em>Supply Chain Disruption</em></li>
<li><em>Requirement of the company to spend time and money on PPE to clean and sanitize equipment</em></li>
<li><em>Furloughed Employees</em></li>
<li><em>Sales were forced to go virtual (if you were unable to attend tradeshows or sales conferences)</em></li>
<li><em>Employees may not be “active” all day or were forced to perform work outside of their normal job duties</em></li>
</ol>
<p><em>One member did share with us that while his CPA was reluctant to work with him, after approaching another CPA, their business is getting back $250K. His advice was to keep looking for firms who are willing to sit and take the time to work with you!</em></p>
<p><em>Sincerely,</em></p>
<p><em>i-SIGMA &amp; Professionals</em></p>
<p> <br />
<strong>Important:</strong> Some experts contend that since our industry was mostly exempted from the shutdown, <strong><em>due to our industry being deemed essential</em></strong>, some businesses may not qualify. We advise our members to work with a professional to understand the many requirements and calculations that are involved with your specific business and local jurisdiction.</p>
<p>The post <a href="https://isigmaonline.org/ask-the-professionals-obtaining-the-employee-retention-credit-erc-us-companies/">Ask the Professionals About the Employee Retention Credit (ERC) (US companies)</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Updates on the Morgan Stanley Data Breach</title>
		<link>https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Fri, 28 Oct 2022 15:20:17 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Electronics]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5675</guid>

					<description><![CDATA[<p>By now, most readers have most likely heard of the Morgan Stanley Data Breach incident. The latest $35M fine from the SEC, on top of the $128.2M Morgan Stanley has already shelled out, is due to the breach of personal data of 15 million customers appearing on hard drives at an auction where the data [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/">Updates on the Morgan Stanley Data Breach</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>By now, most readers have most likely heard of the <a href="https://techcrunch.com/2022/09/21/morgan-stanley-hard-drives-data-breach/" target="_blank" rel="noopener">Morgan Stanley Data Breach incident.</a> The latest $35M fine from the SEC, on top of the $128.2M Morgan Stanley has already shelled out, is due to the breach of personal data of 15 million customers appearing on hard drives at an auction where the data was supposed to have been wiped.</p>
<p>What happened that fines are still being assessed and we are still talking about this mayhem? </p>
<p>Morgan Stanley originally hired the moving company, Triple Crown, in 2016 to decommission IT assets from two data centers. It was known that Triple Crown was strictly a moving company and not experienced with electronic data destruction. The contract identified an unnamed e-scrap management company that would sanitise the devices and resell them for a commission, with Morgan Stanley obtaining a cut. It&#8217;s become known that early on, Triple Crown stopped working with the unidentified company and began working with AnythingIT without Morgan Stanley&#8217;s knowledge. AnythingIT was sold the eletronics with data still on them, having been told by Triple Crown that they had already been wiped. They in turn resold these devises downstream to KruseCom, who either destroyed or sold them on an auction site. </p>
<p>Truly a story in passing the buck and a loss in accountability. Where is the certificate of destruction? Where is the vendor due diligence? There was none, which is why Morgan Stanley is paying dearly. </p>
<p>If you look-up AnythingIT today, you&#8217;ll note that they are NAID AAA Certified. There has been some confusion on if this third-party vendor who worked in the Morgan Stanley debactle was certified, how could all of this have happened? As you can see, 1) they were given misinformation and not contracted to do the actual data wiping, AND 2) at the time of them being contracted they were not yet NAID AAA Certified. Since this incident, AnythingIT has become NAID AAA Certified and shown that they in fact DO robust quality best practices, even submitting to unannounced audits. </p>
<p>There are many lessons learned through this incident for everyone, clients and service providers alike. </p>
<p>Morgan Stanley did not take the correct precautions to ensure they hired a reputable service provider, such as a NAID AAA Certified company who would have had rigorous guidelines in place for wiping the hard drives. And it seems that service provider to service provider contracts may have been lacking as well regrading the goods being transferred (do you have language in place when you take acquisition of assets without destroying it?). </p>
<p><a href="https://isigmaonline.org/certifications/naid-aaa-certification/why-become-certified/" target="_blank" rel="noopener">Why You Should Earn Your NAID AAA Certification &gt;&gt;</a></p>
<p><a href="https://isigmaonline.org/certifications/naid-aaa-certification/why-use-a-certified-co/" target="_blank" rel="noopener">Why You Should Use a NAID AAA Certified Company &gt;&gt;</a></p>
<p>The post <a href="https://isigmaonline.org/updates-on-the-morgan-stanley-data-breach/">Updates on the Morgan Stanley Data Breach</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Beyond Certification</title>
		<link>https://isigmaonline.org/beyond-certification/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 25 May 2022 18:43:10 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=5462</guid>

					<description><![CDATA[<p>The title of this blog may seem odd coming from a person who has spent the last 22 years promoting service provider certification. Please bear with me. As readers already know, the premise of Data Processor certifications has changed. Where once they simply provided a general reassurance that a reputable third party had signed off [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/beyond-certification/">Beyond Certification</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="alignright size-medium wp-image-5463" src="https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-300x300.png" alt="" width="300" height="300" srcset="https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-300x300.png 300w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-1024x1024.png 1024w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-150x150.png 150w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-768x768.png 768w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-99x99.png 99w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-425x425.png 425w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6-465x465.png 465w, https://isigmaonline.org/wp-content/uploads/2022/05/Untitled-design-6.png 1080w" sizes="(max-width: 300px) 100vw, 300px" />The title of this blog may seem odd coming from a person who has spent the last 22 years promoting service provider certification. Please bear with me.</p>
<p>As readers already know, the premise of Data Processor certifications has changed. Where once they simply provided a general reassurance that a reputable third party had signed off on the vendor’s practices, now, if properly constructed and managed, those certifications fulfill a client’s regulatory due diligence requirements. Certification has gone from providing a warm and fuzzy intangible, to a very real, tangible benefit.</p>
<p>Another way to look at it is that clients have two options to meet their vendor selection due diligence requirements. 1.) They can review their prospective Data Processors themselves – both initially and ongoing after hiring – against the relevant regulatory and security requirements, or 2.) They can rely on a reputable, bonafide certification program to do it for them.</p>
<p>So, what is this about looking beyond certification?</p>
<p>The fact is, there are two things a certification cannot do… and should not do… which are equally important to a client compliance and/or risk, namely, the quality of their data processor contracts and insurance.</p>
<p>All data protection regulations necessitate a contract between the Data Controller (the client) and the Data Processor (service provider)</p>
<p>I specifically use the word “necessitates” because some U.S. regulations are silent on such contractual engagements, but, in all practicality, the absence of such a contract would almost certainly be deemed negligent. In court the question would be, “Do you mean to justify to the court that you were entrusting this vendor with personal information your firm was required to protect and you had no contract with to hold them accountable?”</p>
<p>Again, for the most part, regulations, even in U.S. do require a Data Controller-Data Processor contract. Furthermore, with data protection regulations now applying to citizens versus territories, the only prudent course is to default to the most rigorous.</p>
<p>Contracts are by nature not something a certification can have much overlap, besides, that is, the obvious overlap of a contract requiring a vendor maintain a certified status. Beyond that, however, a certification cannot (and should not) be expected to stipulate all the various particular issues and clauses that a Data Controller-Data Processor contract would. There are simply too many variables and subtleties.</p>
<p>The same can be said about insurance, and, more specifically, Professional Liability Insurance (PLI). PLI would be the insurance a service provider would rely on to cover the expense on any accident or negligence in the performance of their professional duties. From the Data Controller’s perspective, the availability and quality of PLI are critical, since the insurance is what allows the Data Processor to be held financially responsible.</p>
<p>As a side note, I cannot tell you how many times I have seen Data Controllers passing on financial liability to a Data Processor with no reciprocal requirement for that Data Processor to have PLI. Of course, this stipulation would be useless unless it was accompanied by the Data Controller’s evaluation of the PLI, since there is the strong possibility that the policy has problematic exclusions.</p>
<p>Back to the topic at hand, though, this is exactly the reason a certification cannot simply mandate Data Processor maintain PLI, since the certification cannot evaluate the insurance anymore than it can mandate necessarily specialized, custom contracts.</p>
<p>So what?</p>
<p>Well, for the client requiring certification it means there is more to do, and that there is no shortcut. Contracts and the professional liability of the service provider are always going to be something requiring they get into the weeds.</p>
<p>For the service provider, it means opportunity. Being able to help clients understand and navigate their contract and insurance requirements and risks will both set them apart from their competition as a true professional and earn them the margins they deserve as such a professional.  Looking at it from another angle, it is only a matter of time before clients become aware of these issues. It will certainly reflect more positively if the service provider that has already made it known that they are aware of these issues, or at least is able to respond intelligently, versus simply looking back at the client, shrugging and clueless.</p>
<p>End note for clarity: Contracts fall under both compliance and risk management. Insurance, on the other hand, is not a compliance issue but definitely falls very high on the risk management continuum.</p>
<div class="col col_two_thirds ">
<article id="Post" class="blogposts">
<h6 style="text-align: right;">Written by Robert Johnson, CSDS | 25 May 2022</h6>
</article>
</div>
<p>The post <a href="https://isigmaonline.org/beyond-certification/">Beyond Certification</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>If Certification is in Your Plans, Now is the Time!</title>
		<link>https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 23:57:33 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4363</guid>

					<description><![CDATA[<p>First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger. In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright wp-image-4364" src="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg" alt="" width="199" height="199" srcset="https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14.jpg 1080w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-425x425.jpg 425w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-465x465.jpg 465w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-150x150.jpg 150w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-300x300.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-768x768.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-1024x1024.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/11/Thornton-Medical-14-99x99.jpg 99w" sizes="auto, (max-width: 199px) 100vw, 199px" />First of all, it is important to remember that i-SIGMA is a non-profit trade association with a mission to improve market conditions for all its members, and the same was true of NAID and PRISM International before the merger.</p>
<p>In its role as a member-owned organization, i-SIGMA provides a robust repertoire of member benefits, including state-of-the-art contracts and agreements, marketing materials, regulatory intervention, and educational events. Find the full list and details of <a href="https://isigmaonline.org/membership/membership-join/" target="_blank" rel="noopener noreferrer">all i-SIGMA benefits</a> on <a href="https://isigmaonline.org/">the association website</a>, and all members are encouraged to review and make use of them.</p>
<p><strong>Certifications</strong><em>:</em> Included among the benefits of i-SIGMA membership benefits is access to information protection’s two leading service provider certifications, NAID AAA and PRISM Privacy+. With the overwhelming majority of its more than 1,200 member-locations holding one or both of those certifications, they are the most success programs i-SIGMA has offered to date.</p>
<p>By now, it is well known that i-SIGMA membership replaces NAID and PRISM International membership at the end of this month, and that going forward the use of NAID and PRISM will be limited to their respective certifications.</p>
<p><strong>A Personal/Business Decision</strong><em>:</em> Over the years, our surveys have consistently shown that the vast majority of non-certified members fully intend to become certified as soon as they can find the time. And whether now is the right time or not, it is critical for those members to know they are still benefiting from the association’s efforts and their contribution to the association continues to promote client education and adoption of their services.</p>
<p>It is also important, however, for non-certified members to take stock. In a matter of weeks, NAID and PRISM will only be associated with each respective certification program. If past surveys are correct, and certification is a future goal, there is no better time to do it than now; thereby maintaining your link to the two most recognized information protection brands in the world.</p>
<p><strong>How to Become Certified</strong>: Becoming Certified is not as complicated as some may think.</p>
<ol>
<li>Meet all required specifications as outlined in the <a href="https://isigmaonline.box.com/s/xv82llmhun8ad1hjkcc17p0iemohe0ia" target="_blank" rel="noopener noreferrer">i-SIGMA Certification Specifications Reference Manual</a></li>
<li>Submit a completed certification application</li>
<li>Successfully complete an initial scheduled audit verifying all aspects of compliance</li>
</ol>
<p><a href="mailto:certification@isigmaonline.org">Contact the i-SIGMA Certification Department</a> for more information.</p>
<h6 style="text-align: right;">Written by Bob Johnson | 30 November 2021</h6>
<p>The post <a href="https://isigmaonline.org/if-certification-is-in-your-plans-now-is-the-time/">If Certification is in Your Plans, Now is the Time!</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Subject Protections Continue to Drive New Privacy Laws</title>
		<link>https://isigmaonline.org/data-subject-protections-continue-to-drive-new-privacy-laws/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 13 Oct 2021 20:16:26 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4299</guid>

					<description><![CDATA[<p>Quebec’s Bill 64 was passed unanimously becoming the most recent example of the continued conveyor belt of regulations inspired by the EU General Data Protection Directive that focuses on new Data Subject protections. Titled, &#8220;An Act to modernize legislative provisions as regards the protection of personal information&#8221;, the regulation was adopted unanimously, on the 21 [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/data-subject-protections-continue-to-drive-new-privacy-laws/">Data Subject Protections Continue to Drive New Privacy Laws</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-4300 alignright" src="https://isigmaonline.org/wp-content/uploads/2021/10/Legislation.jpg" alt="" width="414" height="207" srcset="https://isigmaonline.org/wp-content/uploads/2021/10/Legislation.jpg 2048w, https://isigmaonline.org/wp-content/uploads/2021/10/Legislation-300x150.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/10/Legislation-768x384.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/10/Legislation-1024x512.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/10/Legislation-1536x768.jpg 1536w" sizes="auto, (max-width: 414px) 100vw, 414px" />Quebec’s Bill 64 was passed unanimously becoming the most recent example of the continued conveyor belt of regulations inspired by the EU General Data Protection Directive that focuses on new Data Subject protections.</p>
<p>Titled, &#8220;<em>An Act to modernize legislative provisions as regards the protection of personal information&#8221;</em>, the regulation was adopted unanimously, on the 21 September, 2021, and applies to all public and private organizations covered by Canada’s primary data protection law the Personal Information Protection and Electronic Document Act (PIPIEDA). The effective date is on the same date in 2022.</p>
<p>Among the Data Subject (individual) provisions included are:</p>
<ul>
<li>Enhanced consent and transparency obligations, requiring that individuals request a copy of any information in an organizations possession and that they be made aware of and be provided the right to opt-in to all uses of their information at their sole discretion.</li>
<li>Introducing the “right to be forgotten,” which means individuals have the right to request their information be permanently deleted by an organization if there is no legal reason to retain it.</li>
</ul>
<p>The new regulation also has teeth, moving away from an Ombudsman model where the regulator makes recommendations to organizations, it calls for the imposition of fines that include CA$50,000 for individuals and the greater of CA$10 million or 2% of the global turnover from the previous year for organizations. Where a violation constitutes an offence under the Act, fines may be imposed of up to CA$100,000 for an individual and $25 million or 4% for an organization global turnover of the previous year.</p>
<p>The post <a href="https://isigmaonline.org/data-subject-protections-continue-to-drive-new-privacy-laws/">Data Subject Protections Continue to Drive New Privacy Laws</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The i-SIGMA Compliance Monitoring Service Has Arrived</title>
		<link>https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 22 Sep 2021 20:00:56 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Press Room]]></category>
		<category><![CDATA[Regulations]]></category>
		<category><![CDATA[Sales & Marketing]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4256</guid>

					<description><![CDATA[<p>The eagerly awaited i-SIGMA Compliance Monitoring Service has arrived. Starting immediately, many service providers will use it, and soon clients around the world will begin seeing promotions encouraging them to use it too. And, if the underlying assumptions behind its creation are correct, they will eventually come to rely on it as a vital demonstration [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/">The i-SIGMA Compliance Monitoring Service Has Arrived</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-contrast="none">The eagerly awaited </span><strong><a href="https://directory.isigmaonline.org/compliance/">i-SIGMA Compliance Monitoring Service</a></strong><span data-contrast="none"> has arrived. Starting immediately, many service providers will use it, and soon clients around the world will begin seeing promotions encouraging them to use it too. And, if the underlying assumptions behind its creation are correct, they will eventually come to rely on it as a vital demonstration of their own regulatory compliance.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<h2>Why Did i-SIGMA Create This Service?</h2>
<p><span data-contrast="none">All data protection regulations require clients to demonstrate initial and ongoing due diligence when selecting third-party service providers to process personal information. The key word there is “demonstrate.” In fact, when a large investment firm was recently fined after its discarded electronics exposed personal information about its clients, the judgment was based on the fact that </span><span data-contrast="none">they failed to employ “adequate due diligence in selecting a vendor and monitoring its performance.” </span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276}"> This new, free service from i-SIGMA helps organizations fulfill that regulatory obligation by sending out comprehensive compliance reports detailing the qualifications of vendors offering records storage, imaging, scanning, secure shredding, and electronic media recycling.</span></p>
<p><span data-contrast="none">Of course, the challenge to clients (such as the investment firm) of complying with such regulations is that, 1) they rarely have the bandwidth to perform such due diligence and, 2) even if they did have the bandwidth, they can hardly be expected to know what to look at. Enter i-SIGMA certification programs, which are not only designed to review the relevant regulatory and security overlap, but to do so on an ongoing basis.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p><span data-contrast="none">By obtaining the automatic reports issued by the <strong><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener noreferrer">i-SIGMA Compliance Monitoring Service</a></strong>, the client has evidence by which <strong>they can demonstrate both initial and ongoing compliance</strong> of their service provider. In short, the client themselves gets the tangible benefit of being able to demonstrate their own vendor-selection compliance requirements.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p><span data-contrast="auto">“We began the service when customers requested that we email them alerts when their service provider renewed or lapsed,” says i-SIGMA CEO Bob Johnson. </span></p>
<p><span data-contrast="auto">“Now, we&#8217;ve taken that concept a step further. The service is based on the fact that many data controllers are required to demonstrate initial and ongoing due diligence when they use data-related service providers,” Johnson continues. “And, because NAID AAA and PRISM Privacy+ Certifications address the relevant security vulnerabilities and regulatory overlap, the information verified during audits mirrors what that due diligence should look like.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">“Essentially,” Johnson added, “they’re supposed to do it, but often don’t what to look at or don’t take the time, so we can do it for them even better than they can.”</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="none">Clearly, any client will see the value of obtaining this free report, and once they are aware it is available will come to insist on it.</span><span data-ccp-props="{&quot;335559739&quot;:120,&quot;335559740&quot;:276,&quot;469777462&quot;:[1800],&quot;469777927&quot;:[0],&quot;469777928&quot;:[1]}"> </span></p>
<p>Users of the service will first be brought to a welcome screen, and next will be able to choose their provider that they wish to monitor (as shown below). If the user does not have a provider in mind, they can also find a local service provider.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="wp-image-4257 alignleft" src="https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A.png" alt="" width="751" height="504" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A.png 1151w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-300x201.png 300w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-768x515.png 768w, https://isigmaonline.org/wp-content/uploads/2021/09/Compliance-Monitoring-Image-A-1024x687.png 1024w" sizes="auto, (max-width: 751px) 100vw, 751px" /></p>
<p>Once the user has selected their service provider, all they have to do is enter their email address (stored anonymously). The report will show up in the user&#8217;s inbox within minutes. Future reports will be sent annually as each company renews its certification and whenever they make changes in their serviceswhich may impact the details of their certification on file.</p>
<p><img loading="lazy" decoding="async" class="wp-image-4258 alignleft" src="https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup.png" alt="" width="703" height="668" srcset="https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup.png 896w, https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup-300x285.png 300w, https://isigmaonline.org/wp-content/uploads/2021/09/report-Mockup-768x730.png 768w" sizes="auto, (max-width: 703px) 100vw, 703px" /></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>i-SIGMA is very excited to announce and roll out this eagerly awaited program. For information on certification programs, contact: <strong><a href="mailto:certification@isigmaonline.org">certification@isigmaonline.org</a>.</strong> For technical assistance regarding this tool, please contact: <strong><a href="mailto:webhelp@isigmaonline.org">webhelp@isigmaonline.org</a>.</strong></p>
<h4><a href="https://directory.isigmaonline.org/compliance/" target="_blank" rel="noopener noreferrer">Use the Compliance Monitoring Service Now &gt;&gt;</a></h4>
<p>The post <a href="https://isigmaonline.org/the-i-sigma-compliance-monitoring-tool-has-arrived/">The i-SIGMA Compliance Monitoring Service Has Arrived</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Legal Marijuana Raises Drug Screening Questions and Risks</title>
		<link>https://isigmaonline.org/legal-marijuana-raises-drug-screening-questions-and-risks/</link>
		
		<dc:creator><![CDATA[maggiegeolat]]></dc:creator>
		<pubDate>Wed, 09 Jun 2021 18:08:31 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Business Management]]></category>
		<category><![CDATA[Operations]]></category>
		<category><![CDATA[Regulations]]></category>
		<guid isPermaLink="false">https://isigmaonline.org/?p=4018</guid>

					<description><![CDATA[<p>(This blog is provided for perspective only and not to be taken as legal advice) As I often remind service providers, though i-SIGMA certifications (NAID AAA/PRISM Privacy+) require drug screening prior to hiring, and either ongoing drug screening or training to recognize substance abuse, the certifications themselves do not prescribe how service providers respond to [&#8230;]</p>
<p>The post <a href="https://isigmaonline.org/legal-marijuana-raises-drug-screening-questions-and-risks/">Legal Marijuana Raises Drug Screening Questions and Risks</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em><img loading="lazy" decoding="async" class="alignright wp-image-4019" src="https://isigmaonline.org/wp-content/uploads/2021/06/hiring-marijuana.jpg" alt="" width="297" height="204" srcset="https://isigmaonline.org/wp-content/uploads/2021/06/hiring-marijuana.jpg 1705w, https://isigmaonline.org/wp-content/uploads/2021/06/hiring-marijuana-300x206.jpg 300w, https://isigmaonline.org/wp-content/uploads/2021/06/hiring-marijuana-768x528.jpg 768w, https://isigmaonline.org/wp-content/uploads/2021/06/hiring-marijuana-1024x704.jpg 1024w, https://isigmaonline.org/wp-content/uploads/2021/06/hiring-marijuana-1536x1056.jpg 1536w" sizes="auto, (max-width: 297px) 100vw, 297px" />(This blog is provided for perspective only and not to be taken as legal advice)</em></p>
<p>As I often remind service providers, though i-SIGMA certifications (NAID AAA/PRISM Privacy+) require drug screening prior to hiring, and either ongoing drug screening or training to recognize substance abuse, the certifications themselves do not prescribe how service providers respond to the results of those screens.</p>
<p>The point of the screening is so that service providers are aware, and can, as a result, make their own determination on what their own substance abuse policy mandates. Clearly there is a difference between a positive test at hiring and a positive test by a long-standing, contributing employee. Clearly there is a difference as to whether the employee was under the influence at work, or it just showed up on a screen. What the service provider does is up to their policy, and advice from their legal counsel (ideally an employment lawyer.)</p>
<p>Enter the fact that marijuana is now legal in a growing number of states.</p>
<p>Presently, in the states of Montana, Maine, Nevada, New York, and New Jersey, not hiring an individual on the basis of recreational marijuana use is considered discriminatory. The same thing goes for cities such as Atlanta, New York City, Philadelphia, Washington DC, Rochester, NY, and Richmond, VA. Then there are another twenty states that have enacted laws protecting employment rights of <strong>medical</strong><strong> </strong>marijuana users.</p>
<p>So what?</p>
<p><strong>One:</strong> You need to comply with the anti-discrimination laws. If your state or city is or becomes a place where marijuana use is legal, you could risk a discrimination suit if you’re not prepared.</p>
<p><strong>Two:</strong> It is no secret that we are entering a tight employment market. I get a call a week from someone asking if others are having the same trouble as they are attracting and keeping good help. Legal use of marijuana is growing, and like it or not, there is an increasing chance that prospective hires using it recreationally will turn up at your door. I’m not telling anyone what to do, but you need a plan that is non-discriminatory and that does not deny you a potentially good employee at a time when finding them is tough.</p>
<p><em>Note: Most states do shield such employers from marijuana-use discrimination where those employers are required to follow federal drug-testing mandates.</em></p>
<h6 style="text-align: right;">Written by Bob Johnson | 9 June 2021</h6>
<div class="col col_two_thirds "></div>
<p>The post <a href="https://isigmaonline.org/legal-marijuana-raises-drug-screening-questions-and-risks/">Legal Marijuana Raises Drug Screening Questions and Risks</a> appeared first on <a href="https://isigmaonline.org">i-SIGMA</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
