ࡱ> =*(@  0 0cskolnik@oag.state.md.us>mailto:cskolnik@oag.state.md.us 0cskolnik@oag.state.md.us>mailto:cskolnik@oag.state.md.us/ 00DArialNew RomanttX: 0DTahomaew RomanttX: 0" DWingdingsRomanttX: 00DTimes New RomanttX: 0 B .  @n?" dd@  @@`` `XQa  '     32 32 )* 6 - ()   ()  IJKLMNOPQRSVZ[\]^_`abcdeghijklmnopqrstuvwxyz{|}  0AA cwww34%u6@wwwT./ g4GdGdn 0ppp@ <4!d!d@w 0t4:<4BdBd@w 0t4:mS ʚ;t8ʚ;<4dddd@ x 0@g44d4do 00pp p0___PPT10 N___PPT90(*? %O  =K6&DLegal Obligations to Disclose or Protect University Records  EC((Carolyn W. Skolnik, Assistant Attorney General Office of the Attorney General 200 St. Paul Place Baltimore, Maryland 21202 cskolnik@oag.state.md.us,P1$L, k  0}xhBI. Statutory Requirements for Disclosure of Electronic Data CC( Numerous federal and state laws impose obligations on the University to disclose electronic data and records, including: Amendments to the Federal Rules of Civil Procedures regarding electronic discovery; CALEA; USA Patriot Act; Digital Millennium Copyright Act. :zz 'E-Discovery under the Federal Rules {On December 1, 2006, Congress approved amendments to the Federal Rules of Civil Procedure regarding electronic Discovery. ||+@Federal Rules of Civil Procedures regarding electronic discoveryAA()Under the New Amendments: All Electronically Stored Information is Discoverable. Once a party requests its production, the information is discoverable. If a party is subpoenaed, the person to whom the subpoena is directed shall provide all electronically stored information in his/her possession. :77,!Changes Under the New Amendments:Production of Electronically Stored Information: Requesting party may specify how the electronically stored information must be produced. If there is an objection to the form, or if the requesting party does not specify how the responding party should produce the electronically stored information, the responding party should produce the electronically stored information in a format that is reasonably usable or ordinarily maintained. `2PYPP,P2Y/!Changes Under the New Amendments:Usable form does not mean that the responding party can produce the electronically stored information in a format that makes it difficult for the responding party to use the information in the litigation.  0 !Changes Under the New Amendments:,Electronic Discovery is Mandated. Even without a discovery request, all parties must provide opposing counsel with a copy of, or description by category and location of, all electronically stored information that the disclosing party may use to support its claims or defense. Parties must meet to discuss any issue relating to electronic discovery and develop a discovery plan that indicates the parties concerns relating to electronically stored information, as well as issues relating to privilege and protection of work product. ."ZZ"1!!Changes Under the New Amendments: Under the new amendments, District Court judges shall enter scheduling orders that include a section regarding the discovery of electronically stored information and agreements the parties reach with respect to claims of privilege and protection of work product.   2"!Changes Under the New Amendments:YLimits on Electronic Discovery: A party is not required to provide electronically stored information if it is not reasonably accessible to provide the information because it is an undue burden or has high costs associated with providing the information. You are still required to save the information, even if it is not reasonably accessible. \ Z:Z +Y3#!Changes Under the New Amendments:{Privilege Provisions: If information produced is subject to a claim of privilege or is work protected, the party making the privilege claim must inform the requesting party of this. If privileged information has already been distributed to the opposing party, then the receiving party must promptly return, sequester, or destroy the specified information and any copies it has. Bfv 4$!Changes Under the New Amendments:uSafe Harbor Provisions: A court may not impose sanctions on a party for failing to provide electronically stored information lost as a result of routine, good faith operation of an electronic information system. Routine operation has been interpreted to mean how a system is generally designed, programmed, and implemented to meet a parties technical and business needs. d]"How this effects the University|These rules apply to all electronic information: Stored at University work stations; Stored on University laptops; Stored on voice mail systems; or Stored at a University employee s home. .1ZZ1$$!The Amendments Require(That a party suspend: routine or intentional purging; overwriting; re-using; deleting; or destruction; of any electronic information relevant to a dispute. XZXZ7ZX1#Electronic InformationElectronic information includes, but is not limited to: Emails; Digital images; Voicemail messages; Word processing; Calendars; Videos; Phonographs; Information on PDA s; Backup of tapes; Offsite storage media; And any other related materials. .8ZZ8$The E-Discovery Process<The duty to preserve electronic information begins through notice called a  litigation hold or a  preservation hold. Once a hold is issued you will be asked to identify and preserve ALL potential sources of electronically stored information in your possession or under your control. lwLEc<The  Litigation Hold DoctrinejApplies wherever litigation is  reasonably foreseeable Requires that a  hold be placed on all relevant information Risk an adverse inference at trial for any missing informationZWhen is litigation  reasonably foreseeable ? .-$$6A government claim, tort claim, special investigation, or regulatory audit A major accident or injury Incident that results in a police report Whenever an employee is terminated Whistleblower and whistleblower retaliation claims Third party requests indemnification A party says that s/he is going to sue 7Z7"Other SituationsMultiple complaints about the same practice Experience with similar situations Investigations that corroborate complaints Where the party holding information is contemplating its own lawsuitOther ConsiderationsThere must be actual notice of a specific and definite claim The value of the claim is irrelevant The scope or nature of the claim is irrelevant personal injury cases - 24% intellectual property cases - 20% contract cases - 18% employment cases - 15% other - 23%ZvZ<"$"  ."9b1" btWhat to do when circumstances call for a  Litigation Hold ;;(t(This includes all forms of electronic communication in all locations and forms) You must preserve evidence; You should interrupt regular document retention/destruction schedules; You must protect against overwriting; Address what to do about  deleted data? Restore back-up tapes?; You must instruct all who hold evidence; Repeat instructions to all affected employees and staff; You must hold all evidence until litigation is resolved. PQPfPPPQf/What are some Issues that You Have to Consider?Laptops and home computers; People forget  Need to repeat instructions; Failure to do a complete enough inventory at the start  voice information; Failure to appreciate technical issues  metadata; Explain to others the types of electronic information contained on campus Redacting privileged information; Do you have a system in place to do this? Costs associated with properly storing electronic information, and retrieving information in compliance with the new rules. ZJZ"Z*Z~ZZJ"*&Develop a Preservation Plan :Map out steps to identify and properly preserve electronically stored information Examples: Determine how to deal with emails, which drafts will be saved and which will not Establish routine destruction/overwriting process of electronically stored files Backup of materials- what will be saved and for how long bS S 'Information Retrieval PlanIt is also vital to create a plan for information retrieval. This is something you and other University employees must address. This means that you, as IT personnel, should speak with employees and educate them as to how electronic information is generated, stored, archived, and destroyed. You should advise other employees of your process for maintaining electronic information and the time frame it will take for you to obtain certain types of information if information is requested pursuant to litigation. <==(#Confidential/Privileged InformationAlthough the electronic communication will be preserved, it is extremely important to note that no electronic information will be disclosed to opposing counsel without being reviewed by the Court to determine whether the information is relevant or privileged. &`)*Importance of Preservation of Information You must preserve all electronic information after receiving a preservation notice, even if you believe it is confidential or privileged. -Failure to Preserve InformationzMay result in many bad things: Monetary Sanctions; Attorneys fees and costs; Preclusion of evidence at trial; Instructions to jury to draw adverse inference; Dismissal or default judgment.&.Examples of Non-ComplianceColeman Holdings Inc. v. Morgan Stanley - 2005 Failure to coordinate search for backup tapes led to late discovery of more than 2,500 tapes, and partial default judgment, which contributed to a jury verdict of $1.5 billion. United States v. Philip Morris USA, Inc. - 2004 Eleven senior executives failed to follow internal procedures for preservation of evidence; court barred witnesses from testifying at trial and imposed total sanctions of $2,750,000. Zubulake v. UBS Warburg -- 2004 Failure to communicate within organization and with counsel led to late production and loss of data, warranted adverse inference instructions; jury returned $29,000,000 verdict). 0ZZ1ZZ!ZZZZ*""","""!""""  %-Successful Compliance with the Federal Rules Requires that all electronic information be preserved in its original electronic form. This means that you are required to provide the information in its electronic form, not in hard copy form. You are further required to retain the preserved data until either the Statute of Limitations has expired with respect to the claim or until litigation has concluded (meaning the case and all appeals have been concluded). BZ{\ Lessons LearnedImportance of having regular document retention/destruction policies Importance of putting together a team to establish a plan for each unique case Importance of good communication throughout process with the right individuals  The Future7Prediction: The End of the Adversary Discovery Process?7'6II. Federal Statutes and Electronic Data and Records77(ASeveral federal statutes impose obligations to protect the privacy and security of electronic data and records. Three of the most significant statutes are: The Family Educational Rights and Privacy Act; The Health Insurance Portability and Accountability Act; and The Financial Services Modernization Act of 1999 (GLB).4ZZ8(1Family Educational Rights and Privacy Act (FERPA)FERPA deals with  student education records.  Student education records means any records that contain information directly related to a student maintained by a school. FERPA prohibits universities from disclosing education records or personal information within those records other than certain basic  directory information.<.Z}ZZ.}:*1Family Educational Rights and Privacy Act (FERPA)Schools can be subject to statutory remedies when a school has a policy or practice that violates FERPA. Inadequate computer security or known systems vulnerabilities that continue uncorrected, may constitute a violation of FERPA. $9)1Family Educational Rights and Privacy Act (FERPA)A student s education records can be disclosed: To the student or his/her parent if the student is  dependent; To anyone with the student s written consent; Or if an exception applies; for example, the student s records are lawfully subpoenaed. (This requires prior notification to student of subpoena so student has opportunity to contest it.)*0+0+;+1Family Educational Rights and Privacy Act (FERPA)A major exception under FERPA is that school officials may access student records if there is a  legitimate educational interest.  Legitimate education interest has been defined to mean performance of legitimate institutional functions.&ll<,1Family Educational Rights and Privacy Act (FERPA)The limitation of access to records means that faculty and staff must limit their use of data to that which is permitted by FERPA. This means that school officials should access only those student education records needed to perform their authorized functions and only for that purpose. =-1Family Educational Rights and Privacy Act (FERPA)BThe Department of Education's Office of Family Compliance Policy (OFCP) has urged that there is a need for each educational agency or institution to establish and enforce proper policies and procedures, including appropriate training to ensure that school officials do not misuse education records for their own purposes. >.1Family Educational Rights and Privacy Act (FERPA)OFCP has provided the following guidance on the use of student identifiers in an electronic setting: May not post grades using full or partial Social Security Numbers or any general university-issued student ID number. However, an ID number specifically issues for posting grades, and no other purpose, may be used. A unique, university ID number may be designated and disclosed as directory information, if it cannot be used to access non-directory personal information.xfZxZbZZZfxb  ?/1Family Educational Rights and Privacy Act (FERPA)An institution that allows a student or a third party to access education records by providing only publicly available information without additional authentication of identity, may be in violation of FERPA, because it could lead to unauthorized disclosures of education records. @0<Health Insurance Portability and Accountability Act (HIPPA) bEnacted by Congress in 1996 to create a national standard for the protection if personally identifiable information relating to health care in order to facilitate the development of an electronic health infrastructure. Applies to  covered entities. Covered entities include health care providers who transmit individually identifiable health information in electronic form in connection with standard transactions, such as billing. .ZZA1;Health Insurance Portability and Accountability Act (HIPPA)ZTwo major standards have been adopted: The Privacy Rule; and The Security Rule. These rules establish duties and prescribe measures to safeguard  protected health information (PHI).  PHI is individually identifiable health information that is created or received by a covered entity that relates to past, present, or future medical conditions, health care treatment, or coverage of the individual. Student education records covered by FERPA, and medial treatment records otherwise defined within FERPA, are exempt from the scope of the Privacy Rule. DZZZB2;Health Insurance Portability and Accountability Act (HIPPA) The Privacy Rule: In effect for all covered entities. Provides that covered entities may not use or disclose PHI unless the use or disclosure is: Authorized in writing by the patient; For the purpose of treatment or payment regarding that patient, or general health operations (such as quality control) For one of a number of public interest and benefit activities (such as reporting domestic abuse, complying with law enforcement demands, providing data for research purposes Incidental to a permitted used or disclosure ByyC3;Health Insurance Portability and Accountability Act (HIPPA)|The Privacy Rule also requires that covered entities give patients written notice of their privacy practices and the ways in which they may use and disclose PHI in accordance with the content of the notices. Notice must be made available electronically on any web site the entity maintains. Several provisions of the Privacy Rule bear on a covered entity s obligation to maintain the integrity and security of electronic systems containing PHI.PD4;Health Insurance Portability and Accountability Act (HIPPA)A covered entity must: Have appropriate administrative, technical and physical safeguards in place to protect the privacy of PHI; Reasonably safeguard PHI from any intentional or unintentional use or disclosure that is in violation of the Privacy Rule; Designate a privacy official who is responsible for developing and implementing its privacy policies and procedures; Train all members of its workforce on its privacy policies and procedures; Have, apply, and document appropriate sanctions against members of its workforce who violate the Privacy Rule or its polices/procedures; When using third parties to provide services or perform functions on its behalf that involve the use or disclosure of PHI, enter into a  Business Associate Agreement that obligates Business Associate to use appropriate safeguards to prevent use or disclosure of the data and to report any violation of which it learns. 0ZqZqE5;Health Insurance Portability and Accountability Act (HIPPA)9The Privacy Rules also requires that covered entities maintain documentation, in written or electronic form, of their policies and procedures, any communications required to be in writing and anything else required to be documented under the Rule. Documents must be maintained for 6 years from creation or the last date they were in effect. Covered entities need to ensure that electronic systems can accommodate records retention, patient requests for access and alterations, and notations with respect to patient requests for restrictions and alternative procedures.,:PF6:Health Insurance Portability and Accountability Act (HIPPAThe Security Rule: Focuses on ensuring that only those who are authorized actually have access. Is closely aligned with the Privacy Rule and proceeds from the Privacy Rule s requirement of  appropriate administrative, technical, and physical safeguards for PHI, through a series of standards, which in turn include a series of mandatory or addressable implementation specifications. *ZpZpG7;Health Insurance Portability and Accountability Act (HIPPA)Example of a standard and corresponding Implementation Specification: Standard: institutions must implement policies and procedures to prevent, detect, contain and correct security violations. Implementation specification (Required): conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity and availability of electronic protected health information held by the covered entity. How the specification is met is up to the institution. dFZxZ8ZF s(8H8;Health Insurance Portability and Accountability Act (HIPPA)HIPPA Enforcement There is no private right of action by individuals to enforce HIPPA s data privacy protections. A person may file a complaint with the appropriate agency alleging a violation of the Privacy or Security Rule. The agency will investigate the complaint and work with the covered entity to achieve voluntary compliance and corrective action. The agency may also conduct compliance reviews and the covered entity is required to cooperate and provide access to records. .ZZPI9;Health Insurance Portability and Accountability Act (HIPPA)QPenalties for non-compliance: Civil Monetary Penalties: if a violation is found and not corrected through voluntary compliance, civil monetary penalties of up to $100.00 per violation may be imposed. The penalties will be capped at $25,000 during any calendar year for all violations of an identical requirement or prohibition. Criminal Penalties: of up to $250,000 in fines and 10 years imprisonment may be imposed on anyone who knowingly and in violation of HIPAA, uses or causes to be used a unique health identifier or obtains or discloses individually identifiably health information.   J:NFinancial Services Modernization Act of 1999, or Gramm Leach Bliley Act (GLB) OM$(1GLB was enacted in 1999 to enable banks to engage in a diverse assortment of commercial activities while protecting customers private information. Financial institutions must: safeguard nonpublic customer data, limit disclosures of such data, and notify customers of their information-sharing practices and privacy polices. "GZZHK; Gramm Leach Bliley Act (GLB)(Higher education institutions generally participate in a substantial amount of lending activity (and other covered activities as well), therefore the Federal Trade Commission (FTC) considers them covered financial institutions subject to GLB. The FTC says institutions complying with FERPA are exempt from having to comply with the privacy rules issued under GLB; but such institutions remain subject to the GLB customer information safeguarding rules. ZL<Gramm Leach Bliley Act (GLB)( The Safeguarding Rules under GLB: Came into effect on May 23, 2004; Cover paper as well as electronic data; Extend to all nonpublic personal information, defined as personally identifiable financial information, which in turn was defined to cover a broad range of data.&""M= Gramm Leach Bliley Act (GLB)(@Requirements of the Safeguarding Rule: Institution must develop, implement and maintain a written comprehensive information security program that contains administrative, technical, and physical safeguards appropriate to its size and complexity, the nature and scope of its activities and the sensitivity of the relevant customer data. The plan must be reasonably designed to achieve the security and confidentiality of customer data, to protect against anticipated threats or hazards, and to protect against unauthorized access or use that could result in substantial harm. ,''N>Gramm Leach Bliley Act (GLB)(4Requirements of the Safeguarding Rule: Institutions must also designate an information security program coordinator and identify reasonably foreseeable risks in areas such as employee training, IT operations, and detecting, preventing, and responding to intrusions and system failures; Institutions must evaluate and adjust their security programs in light of the results of their own testing, any material changes to their operations, or any other circumstances that you know or have reason to know may have a material impact on your information security programJ'PP P' O?Gramm Leach Bliley Act (GLB)$BSuggestions for Minimizing Risk of Liability: Minimizes the use of SSNs and other sensitive personal data; Limit the storage of SSNs, credit card data, and other highly sensitive personal data to secure servers; Consider using encryption in the storage and transmission of sensitive data; Consider appropriate background checks for persons accessing sensitive personal data; Promptly investigate all breaches; Address computer security breaches in crisis response plans; Provide ongoing education on how to avoid major privacy and security risks (phishing, worms, spyware) via websistes, electronic newsletters, etc. Amend institutional IT policies to include disclaimer re security, and do not overstate the level of privacy or security afforded personal or other data maintained in or transmitted through institutional systems. 0/ZZ/bD:  ue8Communication Assistance for Law Enforcement Act (CALEA),Congress passed the Communications Assistance for Law Enforcement Act (CALEA) in 1994 to make it easier for law enforcement to wiretap digital telephone networks. The FCC, in August 2005, concluded that CALEA applies to facilities-based broadband Internet access providers and providers of interconnected voice-over-Internet-Protocol (VoIP) services. In May 2006, the American Council on Education (ACE) brought suit against the FCC, arguing that the FCC had unlawfully extended CALEA to private computer networks operated by colleges and universities. faZZZ4LPvfCALEA In deciding American Council on Education v. FCC, (June 9, 2006), the court rejected this argument and upheld the FCC s interpretation applying CALEA to private computer networks operated by colleges and universities. However, a college or university remains exempt from CALEA so long as its computer network: (1) Is "private," i.e., is only used by a particular class of users, such as faculty, students, administrators, and alumni, and (2) Does not "support" the connection of the private network to the Internet. This means that the institution does not itself construct, purchase, lease or otherwise operate fiber optic or other transmission facilities and associated switching equipment that link the campus network to an Internet Service Provider. v0Z\ZZZ $\  wg!If your University is not exempt:the CALEA compliance deadline is May 14, 2007, to have in place equipment that will provide the necessary CALEA assistance capabilities specified in the law. Public Notice released by the FCC in December 2006 establishes filing deadlines for CALEA-mandated System Security and Integrity (SSI) and Monitoring Reports. Monitoring reports must be filed by February 12, and the SSI report by March 12. PP@USA Patriot Act Formal name:  Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act. Purpose is  to deter and punish terrorist acts in the United States and around the world, to enhance law enforcement investigatory tools, and for other purposes. The Act grants law enforcement increased access to electronic communications. 6QAUSA Patriot Act!Amends certain other laws to make it easier for law enforcement personal to gain access to confidential information: The Family Education Records Privacy Act of 1974 (FERPA); The Foreign Intelligence Surveillance Act of 1978 (FISA) The Electronic Communications Privacy Act of 1986 (ECPA) &uuRBUSA Patriot ActFERPA and The Patriot Act: The Patriot Act amends FERPA by creating a new exception to the privacy protections,  emergency disclosure. If a U.S. assistant attorney general, or similarly ranked federal official, obtains a court order relevant to a terrorist investigation, the law now requires that an educational institution must turn over the requested records without the student s consent. Moreover, the institution need not even maintain a record of the transaction. ,SCUSA Patriot ActFISA and The Patriot Act: FISA stands for the proposition that if law enforcement believes a  hostile foreign power is behind the criminal activity under investigation, the investigation does not have to follow the traditional Fourth Amendment protection. 0TDUSA Patriot ActFISA and The Patriot Act: Section 501 of the Patriot Act s  business records amendment to FISA allows a federal agency armed with a court order to obtain certain business records pursuant to an investigation of  internal terrorism or other clandestine intelligence activities, so long as the investigation is  not conducted of a United States person solely upon the basis of activities protected by the first amendment. The record keeper is prohibited from disclosing the request to anyone  other than those persons necessary to produce the tangible things under this section. J++UEECPA and the Patriot Act(z (ECPA is the  wiretapping act for the Internet.) Patriot Act Amendments of ECPA: Required Disclosure Prior to the Patriot Act, law enforcement required a traditional subpoena in order to acquire  routing information; the Patriot Act permits  rubber stamp subpoenas to replace traditional authorization standard. The purpose of the  rubber stamping of subpoenas under ECPA is to make it easier for law enforcement to obtain information. f36U04TVFECPA and the Patriot Act(Patriot Act Amendments of ECPA: Voluntary Disclosure  Emergency disclosure provision of Patriot Act amendment to ECPA allows an owner or operator of a network system who reasonably believes he has accessed information endangering life or limb, to disclose that information to virtually anyone, without fear of subsequent liability.:66WGECPA and the Patriot Act(Patriot Act Amendments of ECPA: Computer Trespass Permits a network owner/operator to request law enforcement agents to investigate a computer abuse so long as the owner/operator reasonably believes such is the case, and the investigation remains limited to the trespass. There is nothing in the legislation that ensures the owner/operator s specific control of the investigation:  limited to the investigation of trespass may be interpreted broadly by law enforcement agents. 4Z  4XHECPA and the Patriot Act(wPatriot Act Amendments of ECPA: Computer Trespass What is the best course of action for a college or a university contemplating an invitation to federal law enforcement to investigate computer trespass? No individual member of the college or university community should be allowed to make the request of federal law enforcement without administrative and legal consultation.H3Z2/YIUSA Patriot ActTwo of the most immediate questions about the Act as it relates to information technology are: Does it require proactive architectural or structural alterations to networks? And Does it require networks to retain data logs? `ZJUSA Patriot ActThe answer to both of the proceeding questions is no. No network re-architecting is proactively required, but in the presence of a subpoena, redesigns may be necessary. It is important to note that Section 222 of the Patriot Act states that  reasonable compensation may be obtained for the  reasonable expenses incurred in accommodating authorizations that require the application of surveillance devices. The Patriot Act also does not require that networks retain logs. However, if law enforcement presents authorization requesting logging information, either the network must then begin to provide or they must preserve the logs they have on hand specific to the information requested in the authorization. \ZZBZZB[K%Maryland Public Information Act (PIA)Provides that,  [a]ll persons are entitled to have access to information about the affairs of government and the official acts of public officials and employees. This means that  [e]xcept as otherwise provided by law, a custodian shall permit a person or governmental unit to inspect any public record at any reasonable time. There is no need for the person to show that he or she is  aggrieved or a  person in interest. Nor is access restricted to citizens or residents of Maryland. P,0\L%Maryland Public Information Act (PIA) An agency has no obligation to create records to satisfy a PIA request. Nor is an agency required to reprogram its computers or aggregate computerized data files so as to effectively create new records.  Programming involves the creation of new instructions to the database so that access to data linked in certain ways becomes possible. Thus, programming requires the expenditure of significant time by an individual with specialized knowledge of computer or electronic databases to generate the particular report. It would not be considered  programming if a clerical employee with standard computer skills could generate the report by following pre-existing instructions. Nor would redaction of material from an existing report generally constitute  programming. XVPPP0]M%Maryland Public Information Act (PIA)Scope of Search: The court asks whether the agency has conducted a search reasonably calculated to uncover all relevant documents, not whether it has unearthed every single potentially responsive document. Under this standard, agencies may be required to conduct relatively broad and time-consuming searches. Onus is on the agency to demonstrate that a search would be unduly burdensome, and this obligation is met only in cases involving truly massive volumes of records. xZ&ZZZ97  ^N%Maryland Public Information Act (PIA)Right to Copies: PIA grants any person who has the right to inspect a public record the right to be furnished copies, printouts, or photographs for a reasonable fee. One issue unresolved by Maryland courts is whether the right to copies affords to a requester the right to pick the format in which records are copied. For example, does a requester have the right to obtain a disk containing computerized data when the agency offers to provide a printout? The Attorney General s Office currently takes the position that that the agency, not the requester, has the right to select the format of disclosure. P.PPPP.  _O%Maryland Public Information Act (PIA)Reasonable Fees for Copies: An office custodian may charge a reasonable fee for copies. Fees should not be set simply to deter requests to inspect records or get copies &`P%Maryland Public Information Act (PIA)Search and Preparation Fees: An official custodian may charge reasonable fees for the search and preparation of records for inspection and copying. Search and preparation fees are to be reasonably related to the actual costs to the governmental unit in processing the request. Search fees: the costs to an agency for locating requested records. Usually, this involves the cost of an employee s time spent in locating the requested records. Preparation fees: the costs to an agency to prepare a record for inspection or copying, including the time needed to assess whether any provision of law permits or requires material to be withheld. FZgZ&aQ%Maryland Public Information Act (PIA)Exceptions to Disclosure: The PIA s exceptions to disclosure fall into three basic categories: When a source of law outside the Public Information Act prevents disclosure. Mandatory exceptions for specific classes of records and information. Discretionary exceptions - allow the custodian to exercise discretion over disclosure of certain specified records. N_Z ZZE FbR%Maryland Public Information Act (PIA)Exceptions Based on Other Sources of Law State Statute; Federal Statue or Regulation; A rule adopted by the Court of Appeals or order of a court of record.&)s)scS%Maryland Public Information Act (PIA) State Statute Examples: Protection of police records pertaining to minors; Inmates case records; Tax information; Medical records. 8mmdT%Maryland Public Information Act (PIA)Federal Statutes Examples: FERPA; Information concerning food stamp applicants; Certain critical infrastructure information; Certain homeland security information that the federal government shares with the State or local governments may not be disclosed under the PIA. (eU%Maryland Public Information Act (PIA)-Court Rules and Orders Examples: disclosure of matters occurring before a grand jury is prohibited by the Maryland Rules A public official or employee who improperly discloses search warrant information prematurely may be prosecuted for contempt. An order to seal records in a divorce or custody case.<!X!XfV%Maryland Public Information Act (PIA)Privileges: Traditional privileges like the attorney-client privilege and the doctrine of grand jury secrecy. Another example of a privilege is confidential executive communications of an advisory or deliberative nature. 0  gW%Maryland Public Information Act (PIA)An ordinance enacted by a local government cannot by itself supply a basis for withholding a public record otherwise available under the PIA. Nor may an agency regulation provide an independent basis for withholding a public record. hX%Maryland Public Information Act (PIA)Adoption and Welfare records Personnel Records Letters of Reference Retirement Records Student Records Library Records Motor Vehicle Administration records  Risk Based Capital Records (RBC) Filed with Insurance Commissioner Arrest Warrants Police Reports Sought for Marketing Legal Services Other Miscellaneous RecordsiY%Maryland Public Information Act (PIA)Medical, Psychological and Sociological Data Trade Data; Confidential Business and Financial Information Home Addresses and Phone Numbers of Public Employees Records of an Individual s Personal Finances ,ZZ jRecords of an Individual s Personal Finances Occupational and Professional Licensing Records Records Containing Investigatory Procurement Information Other Miscellaneous InformationZjZ%Maryland Public Information Act (PIA)Discretionary Exceptions: A custodian may deny the right of inspection to certain records or parts of records, but only if disclosure would be contrary to the  public interest. These records are: Interagency or intra-agency memoranda or letters that would be privileged in litigation; Testing records for academic, employment, or licensing examinations; Specific details of a research project that an institution of the State or of a political subdivision is conducting; Contents of a real estate appraisal made for a public agency about a pending acquisition (except from the property owner); Records of investigation, intelligence information, security procedures, or investigatory files; Site-specific location of certain plants, animals, or property; Information relating to an invention owned by a State public institution of higher education;PPP k[%Maryland Public Information Act (PIA)! Discretionary Exceptions (continued): Information relating to a trade secret, confidential commercial information, or confidential financial information owned by the Maryland Technology Development Corporation or by a public senior higher educational institution; Plans and procedures relating to emergency procedures and records relating to buildings, facilities, and infrastructure, the disclosure of which would jeopardize security, facilitate planning of a terrorist attack, or endanger life or physical safety; Records reflecting rates for certain services and facilities held by the Maryland Port Administration and research concerning the competitive position of the port; Records of University of Maryland University College concerning the provision of competitive education services. *PPP% l\+The Digital Millennium Copyright Act (DMCA)NFile Sharing and Liability of ISPs: Internet service providers face potential liability for contributory copyright infringement because they provide the pipe lines that make file sharing possible. The DMCA generally provides universities with a  safe harbor from liability for the illegal file-sharing of their students, so long as they satisfy two general requirements: (1) they must adopt,  reasonably implement and inform users of  a policy that provides for the termination in appropriate circumstance of& repeat infringers, (2) it must accommodate and not interfere with any standardized technical measure that copyright owners use to identify and protect their works. F$R2$R2p`D DMCA  Safe Harbor ProvisionsjTo be eligible for this safe harbor, the University ISP must also meet the following specific requirements: The ISP must not initiate the transmission or select either the material or the recipients. The transmission must be carried out through an automatic technical process The material must not be maintained in the ISP s system either for longer than reasonably necessary for the transmission to take place or in a manner ordinarily accessible to anyone other than anticipate recipients; The material must be transmitted without modification of its content. .mZZmqaLQuestions about the DMCA  safe harbor VAlthough the safe harbors granted by the DMCA may protect the institution, the precise meaning of the many requirements to qualify for these safe harbors is still open to argument. Are you sure that you have sufficiently informed your student of your termination policy and that you have  reasonably implemented it? Have you affirmatively determine whether your system architecture adequately  accommodates standard copyright protection technology? Do you know exactly how long infringing material rests on your system as it makes its ways from sender to recipient.? If not, you may not be eligible for a safe harbor. Even if your institution clearly is protected by a safe harbor, your students are not and your institution may be required to provide information relating to file sharing by its students. ZZ4ZZ ^4EprbDMCA Subpoenas The DMCA established a subpoena process through which copyright owners could obtain  information sufficient to identify the alleged infringer of the [copyright owners ] material on an expedited basis, before even filing a lawsuit. However,the DMCA subpoena process is not available in  conduit cases, which likely include 99%of all file sharing. $]ZZ` ltdLitigation Subpoenas The RIAA s more recent approach appears to use  John Doe lawsuits exclusively. Under the  John Doe lawsuit strategy, the RIAA can still obtain the information it needs by first filing individual  John Doe lawsuits against alleged infringers and then serving normal litigation subpoenas on their ISPs or on anyone else likely to have relevant information. The scope of what is considered relevant for purposes of a litigations subpoena is quite broad; if information sought pertains to a student, the institution will also be required to comply with FERPA by giving the student  reasonable advance notice before turning the information over. P5%Questions and Answersc Additional questions can be directed to Carolyn W. Skolnik, via email: cskolnik@oag.state.md.us "cd,6  0Jb   0` 33` Sf3f` 33g` f` www3PP` ZXdbmo` \ғ3y`Ӣ` 3f3ff` 3f3FKf` hk]wwwfܹ` ff>>\`Y{ff` R>&- {p_/̴>?" dd@,|?" dd@   " @ ` p?" dd@  @@`` PR    @ ` ` p>> $(    6  `}  T Click to edit Master title style! !  0  `  RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S  0\ ^ `  X*  0誗 ^   Z*  0 ^ `  Z*H  0޽h ? 33D<___PPT10..-?L Custom Design:  0` 33PP` 13` 3333` Q_{` 333fpKNāvI` j@v۩ῑ΂H>?" dd@,?n<d@ `7 `2@`7``2 p?" dd@  @@`` PR    @ ` ` p>> Z R  P (  P P <&" @  P T)d" @  P <-"U_ @  P T1d">& @  P N4"P @  P <9"p @  P C x=?d?"bUv @   P <L@ #" `   T Click to edit Master title style! !$  P 0B "   RClick to edit Master text styles Second level Third level Fourth level Fifth level!     S  P 6I "]}  \*  P 6N "] }   ^*  P 6Q "]T}  ^*B P s *޽h ? 333380___PPT10.(г%  Blends  . 0 / ' T (  TT + T "+bb P@ T# "Dwoh T s *"PP T Bd" P@bb P 0  T# "Nyh T s *"P   T Bd"P 0 z  T <" a*h  T s *"  T  f?d?"+)  T BЗ ?#" ` p  T Click to edit Master title style! !  T 0 " `    W#Click to edit Master subtitle style$ $ T 6 "`p   `* T 6 "`p   b* T 6 "`  b*B T s *޽h ? 333380___PPT10.(г% 0 {$(  $  $ N8F<kk z%  < v* K%%KKpp $ NU<kk  @% < x* K%%KKppd $ c $ ?V^ 2 < $ NX<kk &Z < y9Click to edit Master text styles Second level Third level!   : $ T`<kk z  < v* K%%KKpp $ T k<kk  @ < x* K%%KKppH $ 0.k ? ̙3380___PPT10.C3p (     Nc<kk z%  < v* K%%KKpp  Nȉ<kk  @% < x* K%%KKpp  T\<kk z  < v* K%%KKpp  T̎<kk  @ < x* K%%KKppH  0.k ? ̙3380___PPT10.}/ 0 P$(  r  S  T  r  S   T@`   H  0޽h ? 3333___PPT10i.?PP-+D=' = @B +} . 0  $(  r  S 0. P   r  S 1 P   H  0޽h ? 3333___PPT10i.@^+D=' = @B +B  . 0 \(  \r \ S $ P     \ S  P   <$  0  , \ 0 ,$  0 DThese amendments apply to all cases filed after December 1, 2006. 8D0n<Z 2E H \ 0޽h ? 3333___PPT10./?x+ D2' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(D>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*\{%(D' =-m6Bbox(in)*<3<*\{D.' =%(D' =%(D~' =A@BBBB0B%())))?D' =1:Bvisible*o3>+#.<*\%(D' =-m6Bbox(in)*<3<*\+p+0+\0 ++0+\0 +} . 0 $(  r  S  P    r  S p P    H  0޽h ? 3333___PPT10i.?F+D=' = @B +} . 0 $(  r  S \ P S   r  S X P   H  0޽h ? 3333___PPT10i.?~v!+D=' = @B +} . 0 $(  r  S d P    r  S  Pp  H  0޽h ? 3333___PPT10i.?pX+D=' = @B +} . 0 $(  r  S  $ P    r  S & P   H  0޽h ? 3333___PPT10i.? _+D=' = @B +} . 0 $(  r  S 9 P    r  S : P0  H  0޽h ? 3333___PPT10i.?B+D=' = @B +} . 0 $(  r  S ; P    r  S ' P   H  0޽h ? 3333___PPT10i.?p+D=' = @B +} . 0  $(  r  S 8M P    r  S N P    H  0޽h ? 3333___PPT10i.?pLR+D=' = @B +} . 0 0$(  r  S  P    r  S  PP   H  0޽h ? 3333___PPT10i.?+~+D=' = @B + . 0 dP(  dr d S  P     d S  Pw<$ 0  H d 0޽h ? 3333___PPT10.0? և+=D2' = @B D ' = @BA?%,( < +O%,( < +D' =%(D' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*d1%(D' =-6B'blinds(horizontal)*<3<*d1D ' =%(D ' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*d1U%(D' =-6B'blinds(horizontal)*<3<*d1UDT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*dUt%(D' =-6B'blinds(horizontal)*<3<*dUtDT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*dt%(D' =-6B'blinds(horizontal)*<3<*dtDT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*d%(D' =-6B'blinds(horizontal)*<3<*d+8+0+d0 +} . 0 X$(  Xr X S  P    r X S DZ PP  H X 0޽h ? 3333___PPT10i./?e+D=' = @B +! . 0 `P(  `r ` S  P     ` S  P  <$ 0  H ` 0޽h ? 3333___PPT10e.0?Љn+$MD' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(DX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`8%(D' =-6B+checkerboard(across)*<3<*`8D' =%(D' =%(Ds' =4@BBBB%()))D' =1:Bvisible*o3>+#.<*`8A%(D' =-6B#blinds(vertical)*<3<*`8ADX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`AQ%(D' =-6B+checkerboard(across)*<3<*`AQDX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`Qe%(D' =-6B+checkerboard(across)*<3<*`QeDX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`ew%(D' =-6B+checkerboard(across)*<3<*`ewDX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`w%(D' =-6B+checkerboard(across)*<3<*`wDX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`%(D' =-6B+checkerboard(across)*<3<*`DX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`%(D' =-6B+checkerboard(across)*<3<*`DX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`%(D' =-6B+checkerboard(across)*<3<*`DX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`%(D' =-6B+checkerboard(across)*<3<*`DX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`%(D' =-6B+checkerboard(across)*<3<*`DX' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*`%(D' =-6B+checkerboard(across)*<3<*`+8+0+`0 +} . 0 h$(  hr h S  P    r h S | P   H h 0޽h ? 3333___PPT10i.?`+D=' = @B +  . 0 8V(  8x 8 c $d P     8 S d P `<$  0  H 8 0޽h ? jcYwww z ___PPT10Z .+AD ' = @B D ' = @BA?%,( < +O%,( < +D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*88%(D' =-s6Bwipe(left)*<3<*88D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*89v%(D' =-s6Bwipe(left)*<3<*89vD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*8w%(D' =-s6Bwipe(left)*<3<*8w+8+0+80 + . 0 @(  @ @ c $p P@><$ 0    @ c $p P <$  0  H @ 0޽h ? jcYwww___PPT10z.+ D' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*@.%(D' =-o6Bdissolve*<3<*@.D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@L%(D' =-s6Bwipe(left)*<3<*@LD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@Lh%(D' =-s6Bwipe(left)*<3<*@LhD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@h%(D' =-s6Bwipe(left)*<3<*@hD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@%(D' =-s6Bwipe(left)*<3<*@D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@%(D' =-s6Bwipe(left)*<3<*@D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@%(D' =-s6Bwipe(left)*<3<*@D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*@6%(D' =-s6Bwipe(left)*<3<*@6+p+0+@0 ++0+@0 + . 0 D(  D D c $  P <$ 0    D c $ Pp <$  0  H D 0޽h ? jcYwww~ v ___PPT10V .+,OD ' = @B D ' = @BA?%,( < +O%,( < +D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*D,%(D' =-s6Bwipe(left)*<3<*D,D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*D,O%(D' =-s6Bwipe(left)*<3<*D,OD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*DOz%(D' =-s6Bwipe(left)*<3<*DOzD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*Dz%(D' =-s6Bwipe(left)*<3<*Dz+8+0+D0 +" . 0 H\(  Hx H c $& P     H c $' Pp<$  0  H H 0޽h ? jcYwww___PPT10.+ADv' = @B D1' = @BA?%,( < +O%,( < +D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H>%(D' =-s6Bwipe(left)*<3<*H>D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H>c%(D' =-s6Bwipe(left)*<3<*H>cDp' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*Hc%(D' =-s6Bwipe(left)*<3<*HcDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H%(D' =-s6Bwipe(left)*<3<*HDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H%(D' =-s6Bwipe(left)*<3<*HDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H%(D' =-s6Bwipe(left)*<3<*HDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H%(D' =-s6Bwipe(left)*<3<*HDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*H %(D' =-s6Bwipe(left)*<3<*H +8+0+H0 +! . 0 L\(  Lx L c $M P     L c $N P <$  0  H L 0޽h ? jcYwww___PPT10.+ADi' = @B D$' = @BA?%,( < +O%,( < +D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*LQ%(D' =-s6Bwipe(left)*<3<*LQD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*LQm%(D' =-s6Bwipe(left)*<3<*LQmD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*Lm%(D' =-s6Bwipe(left)*<3<*LmD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*L%(D' =-s6Bwipe(left)*<3<*LD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*L%(D' =-s6Bwipe(left)*<3<*LD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*LE%(D' =-s6Bwipe(left)*<3<*LED' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*LE~%(D' =-s6Bwipe(left)*<3<*LE~D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*L~%(D' =-s6Bwipe(left)*<3<*L~D'' =%(D' =%(Dw' =4@BBB B%()))D' =1:Bvisible*o3>+#.<*L%(D' =-6B'blinds(horizontal)*<3<*LDL' =%(D' =%(D' =4@BBBB%(D' =,543*3>!.='<*L+8+0+L0 +2 . 0 P\(  Px P c $lb P@mY    P c $lc PP <$  0  H P 0޽h ? jcYwww___PPT10.+AD' = @B DA' = @BA?%,( < +O%,( < +D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*P%(D' =-s6Bwipe(left)*<3<*PD' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*PI%(D' =-s6Bwipe(left)*<3<*PID' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*PI%(D' =-s6Bwipe(left)*<3<*PID@' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*P%(D' =-s6Bwipe(left)*<3<*PDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*P%(D' =-s6Bwipe(left)*<3<*PD@' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*P4%(D' =-s6Bwipe(left)*<3<*P4DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*P4^%(D' =-s6Bwipe(left)*<3<*P4^D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*P^%(D' =-s6Bwipe(left)*<3<*P^+8+0+P0 +~ . 0 pP(  pr p S 8} P     p S ~ P <$ 0  H p 0޽h ? 3333f^___PPT10>.?)w+=D' = @B D]' = @BA?%,( < +O%,( < +D' =%(D' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*pR%(D' =-6B'blinds(horizontal)*<3<*pRD' =%(D0' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*pS_%(D' =-6B'blinds(horizontal)*<3<*pS_DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*p_%(D' =-6B'blinds(horizontal)*<3<*p_DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*p%(D' =-6B'blinds(horizontal)*<3<*pDT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*p:%(D' =-6B'blinds(horizontal)*<3<*p:DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*pS_%(D' =-6B'blinds(horizontal)*<3<*pS_DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*p_%(D' =-6B'blinds(horizontal)*<3<*p_DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*p%(D' =-6B'blinds(horizontal)*<3<*pDT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*p:%(D' =-6B'blinds(horizontal)*<3<*p:+p+0+p0 ++0+p0 +} . 0  t$(  tr t S Ȼ P    r t S hɻ P   H t 0޽h ? 3333___PPT10i.? ~?+D=' = @B +} . 0 0x$(  xr x S h P    r x S @ P   H x 0޽h ? 3333___PPT10i.?`" +D=' = @B +} . 0 `$(  r  S  P    r  S L P   H  0޽h ? 3333___PPT10i.?0j#+D=' = @B +z . 0 P(  r  S @ P      S $ P <$ 0  H  0޽h ? 3333bZ___PPT10:.?@B+$y-D' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(D@' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*%(D' =-o6Bbox(out)*<3<*D' =%(D' =%(D@' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*3%(D' =-o6Bbox(out)*<3<*3D' =%(D' =%(D@' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*3N%(D' =-o6Bbox(out)*<3<*3ND' =%(D' =%(D@' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*No%(D' =-o6Bbox(out)*<3<*NoD' =%(D' =%(D@' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*o%(D' =-o6Bbox(out)*<3<*oD' =%(D' =%(D@' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*%(D' =-o6Bbox(out)*<3<*+8+0+0 + . 0 h(  ~  s * P      s * P <$  0  H  0޽h ? jcYwwwf^___PPT10>.+UD' = @B D' = @BA?%,( < +O%,( < +D@' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0%(D' =-s6Bwipe(left)*<3<*0DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0%(D' =-s6Bwipe(left)*<3<*0D@' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-s6Bwipe(left)*<3<*DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-s6Bwipe(left)*<3<*D@' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-s6Bwipe(left)*<3<*DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-s6Bwipe(left)*<3<*+8+0+0 +3 . 0 lP(  lr l S  P     l S  P<$  0  H l 0޽h ? 3333___PPT10.?(1++dD' = @B DJ' = @BA?%,( < +O%,( < +D{' =%(D#' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*lW%(D'  =+4 8?\CB#ppt_xBCB#ppt_xB*Y3>B ppt_x<*lWD'  =+4 8?dCB1+#ppt_h/2BCB#ppt_yB*Y3>B ppt_y<*lWD{' =%(D#' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*lW%(D'  =+4 8?\CB#ppt_xBCB#ppt_xB*Y3>B ppt_x<*lWD'  =+4 8?dCB1+#ppt_h/2BCB#ppt_yB*Y3>B ppt_y<*lWD{' =%(D#' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*l%(D'  =+4 8?\CB#ppt_xBCB#ppt_xB*Y3>B ppt_x<*lD'  =+4 8?dCB1+#ppt_h/2BCB#ppt_yB*Y3>B ppt_y<*l+8+0+l0 +f  . 0 Pd\(  dx d c $  P     d c $< P@`<$  0  H d 0޽h ? jcYwwwB : ___PPT10 .+z^ifD' = @B Du' = @BA?%,( < +O%,( < +D' =%(%(D4' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*dE%(D' =-s6Bwipe(left)*<3<*dEDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*dF%(D' =-s6Bwipe(left)*<3<*dFDD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*d%(D' =-s6Bwipe(left)*<3<*d+8+0+d0 +/ 0 0lV(  lx l c $2 T p 2  l S 2 TP <$  0 2 H l 0޽h ? jcYwww___PPT10b.+,OD' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(DD' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*l8%(D' =-s6Bwipe(left)*<3<*l8+8+0+l0 +  . 0 pP(  r  S 2 P  2   S t2 P <$ 0 2 H  0޽h ? 3333  ___PPT10 .?,+[W_Dc ' = @B D ' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*p%(D ' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*p%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<* %(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<* B%(+8+0+0 +} . 0 $(  r  S *2 P   2 r  S $.2 P  2 H  0޽h ? 3333___PPT10i.?+D=' = @B +< . 0 P(  r  S <2 P   2   S =2 PP <$ 0 2 H  0޽h ? 3333$___PPT10.?p+[W_D' = @B DS' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*i%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*i%(+8+0+0 +} . 0 $(  r  S G2 P   2 r  S  K2 P  2 H  0޽h ? 3333___PPT10i.? +D=' = @B +} . 0 $(  r  S Y2 P   2 r  S `Z2 P  2 H  0޽h ? 3333___PPT10i.?L+D=' = @B +} . 0 $(  r  S Dc2 P   2 r  S d2 P  2 H  0޽h ? 3333___PPT10i.?`+D=' = @B +} . 0 $(  r  S m2 P   2 r  S \n2 P  2 H  0޽h ? 3333___PPT10i.?J)+D=' = @B +* . 0 P(  r  S xt2 P   2   S xu2 P P<$ 0 2 H  0޽h ? 3333  ___PPT10 .? g+=D ' = @B DA ' = @BA?%,( < +O%,( < +D' =%(D' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*f%(D' =-6B'blinds(horizontal)*<3<*fD`' =%(D' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*g%(D' =-6B'blinds(horizontal)*<3<*gDT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*@%(D' =-6B'blinds(horizontal)*<3<*@D' =%(D' =%(DT' =A@BBB B0B%(D' =1:Bvisible*o3>+#.<*A%(D' =-6B'blinds(horizontal)*<3<*A+8+0+0 +} . 0 $(  r  S 2 P   2 r  S Ј2 P   2 H  0޽h ? 3333___PPT10i.@+D=' = @B +} . 0 $(  r  S T2 P   2 r  S ,2 P  2 H  0޽h ? 3333___PPT10i.@@A+D=' = @B +) . 0 P(  r  S 2 P   2   S 2 P  <$D 0 2 H  0޽h ? 3333 ___PPT10.@B+)D' = @B D@' = @BA?%,( < +O%,( < +DE' =%(D' =%(DG' =4@BBB B%(D' =1:Bvisible*o3>+#.<*'%(D' =-6B'blinds(horizontal)*<3<*'D' =%(DG' =4@BBB B%(D' =1:Bvisible*o3>+#.<*'>%(D' =-6B'blinds(horizontal)*<3<*'>D' =%(DG' =4@BBB B%(D' =1:Bvisible*o3>+#.<*>R%(D' =-6B'blinds(horizontal)*<3<*>RD4' =%(D' =%(D>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*R%(D' =-m6Bbox(in)*<3<*RD>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-m6Bbox(in)*<3<*D' =%(D' =%(D>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*.%(D' =-m6Bbox(in)*<3<*.+8+0+0 + . 0  P(  r  S о2 P   2   S 2 P   <$ 0 2 H  0޽h ? 3333___PPT10.@+[W_D8' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-u6Bdiamond(in)*<3<*D' =%(D' =%(DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*7%(D' =-u6Bdiamond(in)*<3<*7D. ' =%(D ' =%(DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*7%(D' =-u6Bdiamond(in)*<3<*7DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-u6Bdiamond(in)*<3<*DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0%(D' =-u6Bdiamond(in)*<3<*0DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0%(D' =-u6Bdiamond(in)*<3<*0DF' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<* %(D' =-u6Bdiamond(in)*<3<* +8+0+0 +  . 0 0P(  r  S 2 P   2   S 2 P <$  0 2 H  0޽h ? 3333t l ___PPT10L .@`+Ewy^D ' = @B D ' = @BA?%,( < +O%,( < +D' =%(D' =%(D>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-m6Bbox(in)*<3<*D' =%(D' =%(D>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%%(D' =-m6Bbox(in)*<3<*%D' =%(D' =%(D>' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%%(D' =-m6Bbox(in)*<3<*%+8+0+0 +r . 0 @P(  r  S 2 P   2   S 2 P <$ 0 2 H  0޽h ? 3333ZR___PPT102.@c+ D' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-o6Bdissolve*<3<*D' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-o6Bdissolve*<3<*D' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*%(D' =-o6Bdissolve*<3<*D' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*s%(D' =-o6Bdissolve*<3<*sD' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*s%(D' =-o6Bdissolve*<3<*sD' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*G%(D' =-o6Bdissolve*<3<*GD' =%(D' =%(D@' =A@BB BB0B%(D' =1:Bvisible*o3>+#.<*G%(D' =-o6Bdissolve*<3<*G+8+0+0 +&  . 0 PP(  r  S 2 P   2   S 2 PP <$D 0 2 H  0޽h ? 3333___PPT10.@+#.<*%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*V%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*V:%(+} . 0 `$(  r  S L5 P   5 r  S $5 P  5 H  0޽h ? 3333___PPT10i.@ +D=' = @B +} . 0 p$(  r  S 5 P   5 r  S 5 P   5 H  0޽h ? 3333___PPT10i.@Pqʅ+D=' = @B +} . 0  $(   r   S )5 P   5 r   S *5 PP  5 H   0޽h ? 3333___PPT10i.@ j"+D=' = @B +  . 0 P(  r  S p>5 P   5   S p?5 PP<$@ 0 5 H  0޽h ? 3333  ___PPT10 .@n+DS ' = @B D ' = @BA?%,( < +O%,( < +DF' =%(D' =%(DG' =4@BBB B%(D' =1:Bvisible*o3>+#.<*%(D' =-6B'blinds(horizontal)*<3<*DG' =4@BBB B%(D' =1:Bvisible*o3>+#.<*J%(D' =-6B'blinds(horizontal)*<3<*JD' =%(D' =%(DG' =4@BBB B%(D' =1:Bvisible*o3>+#.<*KR%(D' =-6B'blinds(horizontal)*<3<*KR+< . 0 P(  r  S $O5 Pp  5   S @5 P <$ 0 5 H  0޽h ? 3333$___PPT10.@PS+[W_D' = @B DS' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*G%(+8+0+0 +< . 0 P(  r  S (c5 Pp   5   S (d5 P <$ 0 5 H  0޽h ? 3333$___PPT10.@pn+[W_D' = @B DS' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(+8+0+0 +} . 0 $(  r  S y5 P   5 r  S y5 P  5 H  0޽h ? 3333___PPT10i.@S+D=' = @B +  . 0  P(   r   S  P.      S T PP <$ 0  H   0޽h ? 3333me___PPT10E.@`L+[W_D' = @B D' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<* '%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<* 'Q%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<* QA%(+8+0+ 0 +} . 0 ,$(  ,r , S ؑ5 P.y  5 r , S 5 P`  5 H , 0޽h ? 3333___PPT10i.@9+D=' = @B +; . 0 0P(  0r 0 S <5 P3  5  0 S 5 P@@<$ 0 5 H 0 0޽h ? 3333#___PPT10.@E+[W_D' = @B DR' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0.%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0/m%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0m%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0#%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0#y%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0y%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0l%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*0lC%(+8+0+00 + . 0  P(  r  S 5 P   5   S 5 P <$D 0 5 H  0޽h ? 3333___PPT10.@MM+YD~' = @B D9' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*a%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*b-%(+  . 0  P(  r  S D5 P  5   S D5 P<$D 0 5 H  0޽h ? 3333v n ___PPT10N .@G+YD" ' = @B D ' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(D' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*6%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*6%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<* %(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<* %(+ . 0  P(  r  S O P      S P PP <$D 0  H  0޽h ? 3333___PPT10.@@-n+YD~' = @B D9' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(+} . 0  4$(  4r 4 S 5 P   5 r 4 S ta P  5 H 4 0޽h ? 3333___PPT10i.@G+D=' = @B +} . 0 08$(  8r 8 S |7 P   7 r 8 S T7 P   7 H 8 0޽h ? 3333___PPT10i.@P +D=' = @B +} . 0 @<$(  <r < S 47 P   7 r < S  7 P   7 H < 0޽h ? 3333___PPT10i.@pep+D=' = @B +} . 0 P@$(  @r @ S +7 P   7 r @ S +7 P  7 H @ 0޽h ? 3333___PPT10i.@>+D=' = @B +} . 0 `D$(  Dr D S 37 P   7 r D S 47 PP   7 H D 0޽h ? 3333___PPT10i.@P+D=' = @B + . 0 pHP(  H H S  I7 P <$D 0 7 r H S I7 P   7 H H 0޽h ? 3333 ~ ___PPT10^ .@@Wi+YD2 ' = @B D ' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*H3%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*H3T%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*HTi%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*Hi?%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*H?%(+} . 0 L$(  Lr L S ^7 P   7 r L S N7 P   7 H L 0޽h ? 3333___PPT10i.@ഒj+D=' = @B + . 0 PP(  Pr P S +#.<*P4%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*P%(+ . 0 TP(  Tr T S  P   7  T S  P  <$D 0  H T 0޽h ? 3333___PPT10.@7+YD~' = @B D9' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*T3%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*Tx%(+v  . 0 XP(  Xr X S 7 P   7  X S 7 P <$D 0 7 H X 0޽h ? 3333^V___PPT106.@P+YD ' = @B D' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*X_%(D' =%(Dh' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*X`%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*X%(+ . 0 \P(  \r \ S H7 P   7  \ S H7 P `<$D 0 7 H \ 0޽h ? 3333 ~ ___PPT10^ .@V+YD2 ' = @B D ' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*\7%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*\7%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*\%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*\%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*\%(+b  . 0 `P(  `r ` S 7 Pp  7  ` S \7 P <$D 0 7 H ` 0޽h ? 3333J B ___PPT10" .@0bb+YD ' = @B D ' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*`%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*`I%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*`I%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*`%(+$ . 0 d$(  dr d S 7 P   7 r d S h7 P 7 H d 0޽h ? 333380___PPT10.@}$ . 0 h$(  hr h S 7 P   7 r h S 7 P  7 H h 0޽h ? 333380___PPT10.@I|$ . 0  l$(  lr l S 7 P   7 r l S 7 P   7 H l 0޽h ? 333380___PPT10.@$ . 0  p$(  pr p S 7 P   7 r p S 7 Py 7 H p 0޽h ? 333380___PPT10.@@$ . 0  t$(  tr t S p8 P   8 r t S H8 P  8 H t 0޽h ? 333380___PPT10.@e> . 0 0 xP(  xr x S D8 P   8  x S D8 P <$ 0 8 H x 0޽h ? 3333  ___PPT10 .@PJ+[W_Ds ' = @B D. ' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*x%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*x_%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*x_%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*x%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*xh%(+8+0+x0 +$ . 0 @ |$(  |r | S l'8 P   8 r | S D(8 P  8 H | 0޽h ? 333380___PPT10.@`w$ . 0 P $(  r  S 38 P   8 r  S 48 PP  8 H  0޽h ? 333380___PPT10.@pTݘ$ . 0 ` $(  r  S l?8 P   8 r  S 78 PP  8 H  0޽h ? 333380___PPT10.@p$ . 0 p $(  r  S  B8 P   8 r  S B8 P  8 H  0޽h ? 333380___PPT10.@& . 0  P(  r  S 0O8 P   8   S 0P8 PP <$D 0 8 H  0޽h ? 3333___PPT10.@+#.<* p%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*p%(+$ . 0  $(  r  S t]8 P   8 r  S L^8 P  8 H  0޽h ? 333380___PPT10.@U . 0  x(  r  S b8 P   8   c $c8 PP <$ 0 8   S f8 P` <$  0 8 t  6i,$@ 0 Required Denials-Specific Records: A custodian must deny the inspection of certain specified records. However, any of these records may be available for inspection if  otherwise provided by law : 4#   #H  0޽h ? 3333 ___PPT10.@+B/DQ' = @B D ' = @BA?%,( < +O%,( < +D' =%(D' =%(D' =4@BBBB%())))?D' =1:Bvisible*o3>+#.<*#%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*#%(D;' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*/%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*/D%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*DW%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*Wg%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*gw%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*w%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*C%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*CS%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*S%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(+p+0+0 ++0+0 + . 0  L(  r  S (8 P   8   S 8 P@  <$@ 0 8   S 8 P @ <$  0 8 N  0`8 R Required Denials-Specific Information: A custodian must deny the inspection of the part of a public record that contains the following specific information: 4(  w (wH  0޽h ? 3333___PPT10.@O.+D' = @B D' = @BA?%,( < +O%,( < +D' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*-%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*i%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*-%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*i%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*-i%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*-%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*-]%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*]%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(+p+0+0 ++0+0 + . 0  P(  r  S @8 P   8   S @8 PP<$D 0 8 H  0޽h ? 3333___PPT10.@+YD~' = @B D9' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(+ . 0  P(  r  S 8 P   8   S 8 P <$D 0 8 H  0޽h ? 3333 ~ ___PPT10^ .@R^+YD2 ' = @B D ' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<**%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*+ %(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*  %(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<* %(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(+  . 0  P(  r  S 8 P`)  8   S 8 P p<$ 0 8 H  0޽h ? 3333  ___PPT10 .@-^+[W_D* ' = @B D ' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*$%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*v%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*v%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(+8+0+0 + . 0 @ P(  r  S 8 P   8   S 8 P <$ 0 8 H  0޽h ? 3333  ___PPT10 .@P?+[W_Ds ' = @B D. ' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*m%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*m%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*6%(+8+0+0 + . 0 P P(  r  S 8< P   <   S $< P@ <$D 0 < H  0޽h ? 3333___PPT10.@$+YDn' = @B D)' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*>%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*>%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*;%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*;o%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*o,%(+&  . 0 ` P(  r  S c P      S  e P<$D 0  H  0޽h ? 3333___PPT10.@?+YD' = @B Du' = @BA?%,( < +O%,( < +D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*^`%(D4' =%(D' =%(D' =4@BBBB%(D' =1:Bvisible*o3>+#.<*]%(+  . 0  P(  r  S $+< P   <   S $,< P <$ 0 < H  0޽h ? 3333me___PPT10E.@c+[W_D' = @B D' = @BA?%,( < +O%,( < +DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*Q%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*Qh%(DA' =%(D' =%(D' =A@BBBB0B%(D' =1:Bvisible*o3>+#.<*h%(+8+0+0 +} . 0 @$(  r  S ;< P   < r  S << PPp < H  0޽h ? 3333___PPT10i.?X+D=' = @B +r _UTN``(QE*K4C_1ScBg]_qb+ +kmdxz5pr?uwIz|Zo~GQ[@6@mCEwH>T\dKgq]t$.Y@P|,Kw%(vEk]]etp0ـڠtP(\]&x1Oh+'05 px   , 8 DPX$Presentation name or presenter name Joy DaviesRev. 1 - October 2000Suresh Balakrishnan33Microsoft PowerPoint@훔@aJ2@@֩E6GP4g  Q  y--$xx--'33--$,4 4 ,,--'-::--$ , 5 5 , ,--ff--$ , 5 5 , ,----$ , 55, ,----$,55,,----$,55,,----$,55,,---'--$4<<44--'---$ 3 <<3 3--X--$3<<33--݌--$3<<33----$3<<33----$3<<33----$3<<33----$3<<33---'QA   2( ~~ll[[JJ99%%rraaOO>>--xxff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aaa--$&8&9'9'8&8--ddd--$'8'9(9(8'8--fff--$(8(9)9)8(8--hhh--$)8)9*9*8)8--jjj--$*8*9+9+8*8--lll--$+8+9,9,8+8--nnn--$,8,9-9-8,8--ppp--$-8-9.9.8-8--sss--$.8.9/9/8.8--uuu--$/8/90908/8--www--$0809191808--zzz--$1819292818--|||--$2829393828--~~~--$3839494838----$4849595848----$5859696858----$6869797868----$7879898878----$8889999888----$9899:9:898----$:8:9;9;8:8----$;8;9<9<8;8----$<8<9=9=8<8----$=8=9>9>8=8----$>8>9?9?8>8----$?8?9@9@8?8----$@8@9A9A8@8----$A8A9B9B8A8----$B8B9C9C8B8----$C8C9D9D8C8----$D8D9E9E8D8----$E8E9G9G8E8----$G8G9H9H8G8----$H8H9I9I8H8----$I8I9J9J8I8----$J8J9K9K8J8----$K8K9L9L8K8----$L8L9M9M8L8----$M8M9N9N8M8----$N8N9O9O8N8----$O8O9P9P8O8----$P8P9Q9Q8P8----$Q8Q9S9S8Q8----$S8S9T9T8S8----$T8T9V9V8T8----$V8V9W9W8V8----$W8W9Y9Y8W8----$Y8Y9Z9Z8Y8----$Z8Z9[9[8Z8----$[8[9]9]8[8----$]8]9^9^8]8----$^8^9`9`8^8----$`8`9a9a8`8----$a8a9c9c8a8----$c8c9d9d8c8----$d8d9f9f8d8----$f8f9h9h8f8----$h8h9j9j8h8----$j8j9l9l8j8----$l8l9n9n8l8----$n8n9p9p8n8----$p8p9r9r8p8----$r8r9t9t8r8----$t8t9w9w8t8----$w8w9y9y8w8----$y8y9{9{8y8----${8{998{8----$89988----$89988----$89988----$89988----$89988----$89988---'@"Tahoma-. 33C2 )(Legal Obligations to Disclose or ."System:-@"Tahoma-. 33.2 4Protect University Records.-@"Tahoma-. 2 B/ Carolyn W. .-@"Tahoma-. 2 BXSkolnik.-@"Tahoma-.  2 Bp, .-@"Tahoma-. .2 L"Assistant Attorney General.-@"Tahoma-. 42 R-Office of the Attorney General.-@"Tahoma-. "2 Y;200 St. Paul Place.-@"Tahoma-. -2 _0Baltimore, Maryland 21202n.-@"Tahoma-. +2 e.cskolnik@oag.state.md.us.--e.es-՜.+,D՜.+,8    On-screen ShowCompaq Computer Corp.\ bArialTahoma WingdingsTimes New RomanCustom DesignBlendsELegal Obligations to Disclose or Protect University Records CI. Statutory Requirements for Disclosure of Electronic Data (E-Discovery under the Federal Rules AFederal Rules of Civil Procedures regarding electronic discovery"Changes Under the New Amendments:"Changes Under the New Amendments:"Changes Under the New Amendments:"Changes Under the New Amendments:"Changes Under the New Amendments:"Changes Under the New Amendments:"Changes Under the New Amendments: How this effects the UniversityThe Amendments RequireElectronic InformationThe E-Discovery ProcessThe Litigation Hold Doctrine.When is litigation reasonably foreseeable?Other SituationsOther Considerations;What to do when circumstances call for a Litigation Hold0What are some Issues that You Have to Consider?Develop a Preservation Plan Information Retrieval Plan$Confidential/Privileged Information+Importance of Preservation of Information Failure to Preserve InformationExamples of Non-Compliance.Successful Compliance with the Federal Rules Lessons Learned The Future7II. Federal Statutes and Electronic Data and Records2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)2Family Educational Rights and Privacy Act (FERPA)=Health Insurance Portability and Accountability Act (HIPPA) <Health Insurance Portability and Accountability Act (HIPPA)<Health Insurance Portability and Accountability Act (HIPPA)<Health Insurance Portability and Accountability Act (HIPPA)<Health Insurance Portability and Accountability Act (HIPPA)<Health Insurance Portability and Accountability Act (HIPPA);Health Insurance Portability and Accountability Act (HIPPA<Health Insurance Portability and Accountability Act (HIPPA)<Health Insurance Portability and Accountability Act (HIPPA)<Health Insurance Portability and Accountability Act (HIPPA)OFinancial Services Modernization Act of 1999, or Gramm Leach Bliley Act (GLB)  Gramm Leach Bliley Act (GLB)Gramm Leach Bliley Act (GLB) Gramm Leach Bliley Act (GLB)Gramm Leach Bliley Act (GLB)Gramm Leach Bliley Act (GLB)9Communication Assistance for Law Enforcement Act (CALEA)CALEA "If your University is not exempt:USA Patriot ActUSA Patriot ActUSA Patriot ActUSA Patriot ActUSA Patriot ActECPA and the Patriot ActECPA and the Patriot ActECPA and the Patriot ActECPA and the Patriot ActUSA Patriot ActUSA Patriot Act&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA)&Maryland Public Information Act (PIA),The Digital Millennium Copyright Act (DMCA)# DMCA Safe Harbor Provisions'Questions about the DMCA safe harborDMCA Subpoenas Litigation Subpoenas Questions and Answers  Fonts UsedDesign Template Slide Titles\4 8@ _PID_HLINKSA  mailto:cskolnik@oag.state.md.us mailto:cskolnik@oag.state.md.us+_ƹSuresh BalakrishnanSuresh Balakrishnan  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\^_`abcdefghijklmnopqrstuvwyz{|}~Root EntrydO)Current UserSummaryInformation(]5PowerPoint Document(DocumentSummaryInformation8xl