1. |
- Security Policies
- Security
- Everyone: All Users
- 7/25/2022
- Relevance: 81
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:13:18 AM
-
-
|
2. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 73
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
3. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 69
-
-
12/31/9999 11:59:59 PM
-
Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:02:19 PM
-
-
|
4. |
- Security Policies
- Security
- Everyone: All Users
- 7/14/2022
- Relevance: 68
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:52 PM
-
-
|
5. |
You need to evolve and innovate to be successful. But the cloud is as complex as it is powerful. Our staff and partnership with Rackspace leverages the right experts and environments who are certified in all the leading public cloud platforms and technologies — so you don’t have to be. Oxcyon, through it's partnership with Rackspace offers managed security services to help you leverage the public, private, hybrid and multi-cloud offerings while meeting even the most stringent security and compliance requ...
- Security Policies
- Security
- Everyone: All Users
- 10/25/2022
- Relevance: 56
-
-
12/31/9999 11:59:59 PM
-
SOC 2 Report 2017, Centralpiont Hosting & Security Policies, Cloud, Host, Hosting, Compliance, Certificate, Centralpoint, Oxcyon, Gartner, Digital Experience, Knowledge Management, Data Mining, Document Retention, Data Aggregation, Inference Engine, Technical, Specifications, Stack, Content Management, Sharepoint Alternative, Big Data, Metadata, Automate metadata, Taxonomy, Enterprise, Magic Quadrant, Centralpoint Compliance, Centralpoint Technical
-
-
-
-
-
-
-
-
3/27/2023 4:03:55 PM
-
-
|
6. |
- Security Policies
- Operations, Security
- Everyone: All Users
- 6/1/2022
- Relevance: 42
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/27/2023 4:03:48 PM
-
-
|
7. |
|
8. |
Lack of security control transparency is a leading inhibitor to the adoption of cloud services. The Cloud Security Alliance Consensus Assessments Initiative (CAI) was launched to perform research, create tools and create industry partnerships to enable cloud computing assessments. We are focused on providing industry-accepted ways to document what security controls exist in IaaS, PaaS, and SaaS offerings, providing security control transparency. This effort by design is integrated with and will support ...
- Site Map
- Everyone: All Users
- 6/5/2017
- Relevance: 42
-
-
12/31/9999 11:59:59 PM
-
CMS CAIQ Compliance, CAIQ Portal, ECM CAIQ
-
-
-
-
-
-
-
-
9/19/2018 5:58:02 AM
-
-
|
9. |
- Security Policies
- Security
- Everyone: All Users
- 7/27/2022
- Relevance: 19
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:02:27 AM
-
-
|
10. |
- Security Policies
- Security
- Everyone: All Users
- 6/18/2022
- Relevance: 19
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:02:11 AM
-
-
|
11. |
- Security Policies
- Security
- Everyone: All Users
- 8/26/2021
- Relevance: 17
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
9/27/2023 11:13:03 AM
-
-
|
12. |
Oxcyon, is compliant with ISO27k by proxy of Certificate Number OHS 587454 . Those prefixed with ‘A’ are listed in Annex A of ISO/IEC 27001:2013 and are explained in more detail in ISO/IEC 27002:2013. Further ISO27k standards fill-in various supplementary details ( e.g. ISO/IEC 27005 on information risk management and ISO/IEC 27018 on privacy in cloud computing), while other ISO and non-ISO standards and resources provide lots more information, and in some cases recommend alternative o...
- Site Map
- Everyone: All Users
- 8/2/2014
- Relevance: 16
-
-
12/31/9999 11:59:59 PM
-
ISO27K, EU, EU Compliance, Standards, Policy, ISO/IEC 27001:2013
-
-
-
-
-
-
-
-
8/8/2017 11:24:16 AM
-
-
|
13. |
Oxcyon, Inc.and its subsidiaries respect the privacy of their employees, users and customers and are committed to protecting employee, user and customer data maintained by the company. Due to the global nature of Oxcyon, Inc.’ business, transfers of employee and customer Personal Data, defined below, across national boundaries may occur. As a result, Oxcyon, Inc.has adopted this Safe Harbor Data Privacy Policy and adheres to the Safe Harbor Principles published by the U.S. Department of Commerce, in agre...
- Site Map
- Everyone: All Users
- 4/12/2013
- Relevance: 9
-
-
12/31/9999 11:59:59 PM
-
Centralpoint by Oxcyon's Safe Harbor Policy
-
-
-
-
-
-
-
-
8/8/2017 11:30:38 AM
-
-
|
14. |
- Centralpoint Module Gallery
- Deep Dive - Video Overview
- Everyone: All Users
- 3/28/2019
- Relevance: 8
-
-
12/31/9999 11:59:59 PM
-
Retention Policies, Document Retention Policies, Automate Retention Policies, Schedule Retention, Document Deletion, Archiving Documents, metadata,ontology,intranet,portal,transformation,Artificial Intelligence,aggregation
-
Automate document retention policies using Centralpoint. It equips you with user-friendly tools for defining diverse retention policies, incorporating custom filters, queries, and start/end dates. Centralpoint also manages storage repository data, connecting to File Folders, SQL, Oracle, IBM, and third-party providers like Workday, Citibank, and ADP.
Centralpoint's scheduled feature regularly scans these repositories, as per your chosen frequency, to identify expired records per your policies. Detected files can be routed to administrators for approval of destruction. Upon approval, Centralpoint systematically eradicates records from each system, meticulously recording each step. With Centralpoint's automated document retention policy management, ongoing compliance is effortlessly maintained.
Businesses are required by law to retain confidential client, employee, and company information for a minimal amount of time. But many documents eventually outlive their purpose, and holding onto them for too long puts you at risk of a security breach and non-compliance with today’s privacy legislation. How long you store business records should be determined by a retention schedule that balances each record’s usefulness with the legal requirements. This schedule will depend on the type of business and the lifecycle of specific documents.
Below is a document retention schedule that outlines how long you should hold on to important documents. After their retention period is complete, you should ensure that they are securely destroyed by a third-party information security provider. Please note that these recommendations on document retention are general guidelines only. They are not intended to represent legal advice. Contact your legal expert(s) or federal, state or provincial government to ensure you are following current legal requirements for your area.
Alphabetized by Document Category
ACCOUNTING |
Retention Period |
AR/AP Ledger |
7 Years |
Bank Reconciliations |
2 Years |
Cash Disbursements/ Receipts |
Permanently |
Chart of Accounts |
Permanently |
Depreciation Schedule |
Permanently |
Expense Reports |
7 years |
Financial Statements |
Permanently |
General Ledger |
Permanently |
Inventory Records |
Permanently |
Journal Entries |
Permanently |
Petty Cash Records |
7 years |
Tax Returns |
Permanently |
HUMAN RESOURCES & PAYROLL |
Retention Period |
Accident Reports |
7 Years |
Attendance |
7 Years |
Benefits |
5-7 Years |
Employment Applications |
3 Years |
Payroll - After Termination |
10 Years |
Personnel - After Termination |
7 Years |
Personnel - Current Employee |
Permanently |
Safety Reports |
5 Years |
Salary History |
8 Years |
Time Reports |
7 Years |
SHIPPING AND RECEIVING |
Retention Period |
Export Declarations |
4 Years |
Freight Bills |
4 Years |
Manifests |
4 Years |
Waybills and Bills of Lading |
4 Years |
CORPORATE / LEGAL |
Retention Period |
Annual Report |
Permanently |
Articles of Incorporation |
Permanently |
Audit Reports - External |
Permanently |
Audit Reports - Internal |
6 Years |
Contracts |
Permanently |
Copyrights, Trademarks, Patents |
Permanently |
Correspondence, General |
2 Years |
Correspondence, Legal/Tax |
Permanently |
Correspondence, Routine |
7 Years |
Mortgages, Licences, Deeds |
Permanently |
Organizational Charts |
Permanently |
Partnership Agreements |
Permanently |
PURCHASING AND SALES |
Retention Period |
Purchase orders |
3 Years |
Requisitions |
3 Years |
Sales contracts |
3 Years |
Sales invoices |
3 Years |
* Retention periods begin after the termination, expiration, disposal, etc., of the item.
-
-
-
-
-
-
-
2/19/2024 12:10:00 PM
-
https://qc.xoprod20.com/Uploads/Public/Blogs/DocumentRetentionCompliant3.gif
-
|
15. |
Automate Document Retention Policy Mangagement with Centralpoint
- Site Map
- Everyone: All Users
- 3/28/2019
- Relevance: 8
-
-
12/31/9999 11:59:59 PM
-
Document Retention, Retention Policy Management, Retention Policies, Automated Document Retention, Scheduled Retention Policies, Automate Retention Management, Archives, Retention, On premise document retention
-
-
-
-
-
-
-
-
8/10/2023 4:49:13 PM
-
-
|
16. |
What is Retention Policy Management, and why do you need a system to keep up with it? Document or Records Retention Management deals with the policies which your organization must follow, keeping some records on file for a certain period of time, and making sure that others are deleted and not on file, after that retention policy period. Here are samples of common document retention policies. These rules can change drastically based upon your industry type, and changing regulations. Do not use thes...
- Site Map
- Everyone: All Users
- 4/12/2019
- Relevance: 8
-
-
12/31/9999 11:59:59 PM
-
Records retention, Document Retention, Retention Policies, Retention Policy Management, Expired Documents, Archives, Automating deletion of documents
-
-
-
-
-
-
-
-
4/12/2019 8:39:25 AM
-
-
|
17. |
Businesses are required by law to retain confidential client, employee, and company information for a minimal amount of time. But many documents eventually outlive their purpose, and holding onto them for too long puts you at risk of a security breach and non-compliance with today’s privacy legislation. How long you store business records should be determined by a retention schedule that balances each record’s usefulness with the legal requirements. This schedule will depend on the type of business...
- Site Map
- Everyone: All Users
- 3/14/2019
- Relevance: 8
-
-
12/31/9999 11:59:59 PM
-
-
-
-
-
-
-
-
-
3/14/2019 9:35:25 AM
-
-
|