Information Managers
  • Home
  • Services
    • All Services
  • Templates
  • Blog
  • Contact Us
  • Practice Management Success
  • Podcasts

10 Ways You Can Create Awesome Meetings

Posted on January 25, 2016 by Jean Eaton in PMN Replay, PMN Stitcher, Practice Management Nugget Interview

In this FREE 30-minute Practice Management Nugget Webinar with Professional Meeting Facilitator Gord Sheppard that explains 10 Ways You Can Create Awesome Meetings… and YOU are invited!

If you attend meetings or lead meetings and you want practical tips that you can use right away to make meetings more productive and profitable then you need to register for this webinar right away!

Recorded Live on Thursday, January 28, 2016

 Join us for Practice Management Nugget Webinar

10 Ways You Can Create Awesome Meetings

“10 Ways You Can Create Awesome Meetings” is an entertaining and informative presentation by Professional Meeting Facilitator, Consultant, Speaker, Instructor and Author, Gord Sheppard. Based on his experience in more than 2000 meetings, Gord offers funny stories and practical information that will help you to take action and create awesome meetings that are more productive and profitable!

On this interview you are going to hear Gord's Top 10 Ways You Can Create Awesome Meetings including

  • how to estimate the total cost per hour of your meetings, so that you can then make every second count
  • take responsibility for your own actions during a meeting is one of the most powerful ways to improve the meeting
  • techniques that you and your colleagues can use to build trust with each other so you can make your next meeting more productive
  • how to assess your current meeting facilitator, and then figure out a few ways to help them become more effective
  • how to link every meeting to your organization strategy
  • how to build a blockbuster agenda that everyone can get excited about

and MORE!

10 Ways To Create Awesome Meetings – E-Book

 

Changing The World, One Meeting At A Time.

What other people have to say about Gord Sheppard

“Over the years, I have been part of numerous planning sessions, but I have to say that Gord’s ability to get straight to the point and see through all of the cloudiness is inspirational. He has an uncanny gift of being able to read individuals and situations, while bringing out their best in a very short amount of time. He helped us to produce great results that are truly actionable.”
Cynthia Annett, Board Chair
Special Olympics Edmonton

“Having gathered a group of smart and powerful people to consult on a potential new project, I was nervous; these were not people with time to waste. I put my trust in Gord to create a meeting that would make good use of the time they were spending in the room that day, and he did not disappoint. Somehow, he simultaneously fostered a relaxed and casual atmosphere while keeping us on topic and on schedule. He ushered us through an extremely productive and rewarding conversation but never gave us any feeling of being controlled or overly formal. Not only did we accomplish our objectives, several of my attendees commented to me afterwards on the quality of the meeting and the facilitation. I’m grateful to have had Gord in my corner that day.”
Nadine Riopel
Facilitator and Community Organizer

Gord Sheppard 228x300

 Gord Sheppard

Gord Sheppard is a Professional Meeting Facilitator, Consultant, Speaker and Author at Create Awesome Meetings who can help you create more productive and profitable meetings. During his 25 years of work experience Gord has facilitated, run and participated in more than 2000 meetings and he has lived to tell the tale!

Gord's formal training includes a Masters in Business Administration from the University of Alberta, a Bachelor's Degree in Drama from Queen's and Prosci Change Management Certification. With his combined skill set Gord offers a people-centred facilitation approach that can help you make your next meeting awesome!

create awesome meetings, effective meeting, effective meetings, facilitation, facilitator, Gord Sheppard, meeting, Meetings, Practice Management Mentor, Practice Management Nugget

Would You Know if There Were Two of You?

Posted on January 24, 2016 by Jean Eaton in Blog

Identity theft is a growing problem but there are things that you can do to protect yourself.

Identity theft happens when someone steals your personal information and uses it without your permission – to make purchases, take out loans, get medical services – and more! Victims can end up with drained bank accounts, destroyed credit, and the enormous task of fixing the problem. The pieces of personal information that can be used to commit identity theft include:your name, Social Insurance Number, birth date, mother's maiden name, credit report, driver's license, and credit card and bank account numbers. It doesn’t take much to create a new identity – often just 3 pieces of information.


Tip: Answer 10 questions about your online activities to calculate your personal identity risk score. (EMC
2/RSA). Discover how your online activities – from banking and shopping to the types of social networking sites you visit – may potentially make you more vulnerable to identity theft and fraud. Try the Online Identity Risk Calculator.

Identity Theft and Identity Fraud – RCMP YouTube Channel

The RCMP recommends these steps if you think you are a victim of identity theft or fraud:

  • Step 1 – Contact your local police force and file a report.
  • Step 2 – Contact your bank/financial institution and credit card company
  • Step 3 – Contact the two national credit bureaus and place a fraud alert on your credit reports.
    • Equifax Canada
      Toll free: 1-800-465-7166
    • TransUnion Canada
      Toll free: 1-877-525-3823
  • Step 4 – Always report identity theft and fraud. Contact the Canadian Anti-Fraud Centre

Tip – Be aware and be secure with your personally identifying information.

Illustration from Privacy Commissioner of Canada, www.priv.gc.ca

Illustration from Privacy Commissioner of Canada, www.priv.gc.ca

Instructions

  • Set up a schedule to review your credit card and bank statements – monthly, quarterly – and always have a ballpark in mind of your spending history
  • Once you've reviewed your statements, make sure that you've shredded the paper documents that you no longer need (and keep them in a secure place while you do need them!) By shredding your bank and credit card statements, you can prevent thieves from “dumpster-diving” for the easy information.
  • Set up a Google Alert for your name, business name, and other key identifiers.  You will receive a listing of whenever your name appears in the internet.
  • Limit the amount of personal information that you share on-line, in stores, and on the forms that you fill out.  Ask why they need your information.
  • Install and update anti-virus and malware protection software on your smartphone. Malware and viruses can access and steal personal information, which can lead to identity theft. ‪

Identity theft can happen at work, too.

Waël Hassan notes in his LinkedIn Post, ‘Hacking LinkedIn: The Risk Every HR Department Should Be Talking About’ is the risk of social engineering or spear phishing hacking threats. To prevent this, Hassan recommends three steps that HR departments or managers can do to reduce the risk of spear phishing.

Establish a social media policy, or even a specific policy for business networking and job search sites. Your social media policy should establish that corporate email accounts are not to be used to create or validate social media accounts. It should also specify types of corporate information that should not be published on social media, such as project details, budgets, team members, and technologies used on the job.

Provide employees with instructions on what to do and who to consult if they suspect they have been victims of identity theft. Employees need to know that they will be met with empathy and support if this happens to them.

Review processes for documenting, reporting, and investigating cases of identity theft.

These recommendations make good business sense, too! After all, privacy is good for business.

Resources

EMC2/RSA, Online Identity Risk Calculator 

RCMP  Identity Theft and Identity Fraud, 2015-12-04

Waël Hassan. “Phishing Hacking LinkedIn The Risk Every HR Department Should be Talking About“, LinkedIn, Jan 6 2016.

 

DPD Champ badgeWe are proud to be a Data Privacy Day Champ!
You can be one too! #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

 

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

 

#PrivacyAware, Data Privacy Day, identity theft, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Computer Cookies and Privacy

Posted on January 22, 2016 by Jean Eaton in Blog

Hungry?

Cookies may sound good when they're filled with chocolate chips, but when cookies are used to track your online activity, they can result in behavioural tracking (OIPC) that advertisers use to target products to you.

You may be okay with this when it leads you to your next great shoe sale, but if you use a shared computer and search for something more private, the next person to browse the web may get bombarded with ads for the next best fungus cream – something you didn't want them to know.

A silly example, but if you use the internet for activities that require more personal information – such as online banking or shopping – cookies can save and remember your account number, credit card number, mailing address, phone number and more.

To learn more about cookies watch this video.

Cookies can create privacy challenges, but there are steps that you can do to try to control your personal behaviour tracking when you are on the internet. See Cookies: Following the Crumbs.(OIPC).

Google Chrome internet browser now allows you to use ‘incognito’ access to webpages. Pages that you view in incognito tabs won’t stick around in your browser’s history, cookie store or search history after you’ve closed all of your incognito tabs. It won't stop other sources from seeing your browsing activity, including:

  • Your internet service provider
  • Your employer (if you're using a work computer)
  • The websites you visit themselves

 

Tip: Delete your cookies! Especially if you use a shared computer or if you are doing activities that require your personal information. This may be more difficult than it sounds – third-party cookies, flash cookies, and super cookies all exist and are hard to find and remove. However, you can still set settings on your browser to clear cookies after use. Visit the settings on your internet browser to see what it does with cookies.

Resources and References

Office of the Privacy Commissioner of Canada. “Every Move You Make…Advertisers are tracking your online behaviour”.October 2011

Ibid. Cookies – Following the crumbs. May 2011

Wall Street Journal. How Advertisers Use Internet Cookies to Track You. July 2010

 

DPD Champ badge

We are proud to be a Data Privacy Day Champ!
You can be one too!  #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

 

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, cookies, Data Privacy Day, Practical Privacy Coach, Practice Management Mentor, privacy awareness, security

Why Does Privacy Matter?

Posted on January 21, 2016 by Jean Eaton in Blog

“Email me with all of your bank accounts, subscriptions, email accounts,

mobile device logins and all your passwords.”

That’s how Glenn Greenwald responds when someone tells him that they are not really worried about invasion of their privacy because they don’t have anything to hide. But they do put passwords on their email accounts and locks on their bathroom door. Greenwald says that no one has ever sent the logins and passwords to him. Those people’s actions don’t match their words.

So why does privacy matter, even if you’re “not doing anything you need to hide?”

Christena Nippert-Eng suggests in her presentation “Why Privacy Matters”, that Privacy seems to equate with quite a few things that matter deeply to individuals. For instance:

  • Privacy = the chance to dream, explore, create and understand without anyone commenting on it.
  • Privacy = the chance to make happy surprises for others and for others to make happy surprises for you.
  • Privacy = the ability to do and say stupid/thoughtless/mean/embarrassing/shameful things and get over it.
  • The Gift of Privacy = a sign of respect.

Are you your child's biggest source of privacy breaches? Lorraine Akemann thought that she had safely shared pictures of her child on Facebook. But, when her daughter Googled her own name, she found all the childhood photos had her name attached to them! Read the article for tips on how to prevent this from happening to you.

Data privacy matters because data is permanent. Much like a tattoo, unless you think before you post, you could spend a lot of time and money in trying to remove something off the internet that may never fully be removed. This could affect your reputation, job opportunities and advancements, and university admissions. See the video Stop TMI: Think Before You Post

Tip: STOP.THINK.CONNECT.

Instructions: Since most of us use the internet at least once a day (email, Facebook, Twitter, G+, Tumblr, Instragram, etc.), use the slogan STOP.THINK.CONNECT. before going online

  • STOP: before using the internet, understand the risks and learn how to spot potential problems.
  • THINK: be certain the path ahead is clear. Watch for warning signs and consider how your actions online could impact your safety.
  • CONNECT:enjoy the internet with confidence, knowing you've taken steps to safeguard you and your computer.

Resources:

Lorraine Akemann, “3 Lessons I Learned About Online Privacy When My Teen Googled Her Name”, January 08, 2016.

Christena Nippert-Eng, Ph.D, “Why Privacy Matters” commissioned by the Office of the Privacy Commissioner of Canada as part of the Insights on Privacy Speaker Series, June 2011.

Visit stopthinkconnect.org for videos and more information about how small steps can help keep the web a safer place for everyone.

See TED Talk with Glenn Greenwald: Why privacy matters .

 

DPD Champ badge
We are proud to be a Data Privacy Day Champ!
You can be one too!  #PrivacyAware

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

 

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

 

Register Here – Don’t miss out on this free E-course!

#PrivacyAware, Data Privacy Day, privacy awareness

Module 2: Replay and Additional Resources

Posted on January 19, 2016 by Jean Eaton in PIA E-Course 3

Information Flows – the Foundation of Your PIA

Replay Module 2 Recorded Live January 19, 2016

Read More

Are You a Vendor That Supports Healthcare Practices?

Posted on January 14, 2016 by Jean Eaton in Blog

New healthcare business needs IT solutions and asking if you have a PIA

(what will you do about it?)

Healthcare practices throughout Canada and the US need IT services and have money to buy new hardware, software and service contracts. They also need a Privacy Impact Assessment (PIA) and want to work with a vendor who is PIA prepared.

Vendors are required to comply with the healthcare providers ‘PIA's and their privacy, confidentiality, and security best practices.

“A PIA should be as commonplace to a healthcare practice as a business plan is to a business.”

-Jean L. Eaton, Your Practical Privacy Coach

BUT most healthcare practices don't know this and often don't know that a PIA is usually part of their professional college requirements and often even a legislated requirement! Developing a PIA and the supporting policies and procedures will help a healthcare practice to prevent gross errors, omissions or attacks that could result in fines and even jail time for the business, healthcare provider, employee, or vendor. A vendor that supports healthcare practices must:

  • Understand the PIA process and the healthcare customer needs
  • Understand the requirements of legislation (for example, Health Information Act Regulations, Electronic Health Records Regulations, HIPAA, etc.) that the clinic must follow, it includes technical safeguards to protect privacy and confidentiality and security of patients' health information.
  • Makes sure that vendor's business practices meet privacy and safety legislation. This is an excellent opportunity for the seller to lead by example and demonstrate how to implement and follow best practices. This includes:
  • Having a named Privacy Officer
  • Implementing an internal privacy and security incident management program
  • Implementing a privacy awareness program for all of your employees
  • Providing an Information Management Agreement (IMA) or Business Agreement (BA) to the healthcare provider that meets regulations.

Vendor_largeNot every healthcare practice knows all of the technical, physical, and administrative safeguards that should be in place to prevent the risks of unauthorized access, use, or disclosure of sensitive health information. A vendor that understands the requirements can make better recommendations for the healthcare practice. In fact, the experienced vendor can:

  • Create a premium value-added service to guide all new clinics with step by step instructions about the regulations and requirements of the service and
  • Profile how the vendor can best support the healthcare practice
  • Create more sales and help more customers by providing the services they need (even if they don't know it, yet!).
  • Coach the healthcare practice early in the sales process about how the vendor's services can support the healthcare practice. This results in less work and headache for both the practice and the provider.

Do you want to become the preferred vendor in this large customer niche?

You need to learn what the healthcare business needs to successfully complete their Privacy Impact Assessment. Then you can develop branded PIA Readiness Plan for your business that you can give to the healthcare provider to support them to create their PIA.

 

Have you seen this?

IT vendor Privacy Impact Assessment Readiness Plan

 

Brought to you by Jean L. Eaton, Your Practical Privacy Coach

Join Privacy Nuggets and get some more tips, tools, and templates that you can use right away to improve your privacy management program.

 

BA, health care, healthcare, IMA, IT vendor, PIA, Practical Privacy Coach, Privacy Impact Assessment, Privacy Impact Assessment Readiness Plan, vendor

Protected: Module 1: Replay and Additional Resources

Posted on January 12, 2016 by Jean Eaton in PIA E-Course 3

This content is password protected. To view it please enter your password below:

How to Protect Your Privacy at Home and at Work

Posted on January 11, 2016 by Jean Eaton in Blog

60% of small and medium business owners go out of business within 6 months after a privacy and security breach. (Experian)

81% of hospitals and health insurance companies have suffered a data breach (KPMG)

125% increase in data breaches caused by criminals (now outnumber accidental breaches!) (Ponemon)

Free! Data Privacy Day E-course

There are a lot of statics about the cost of a privacy breach. Anyway that you look at it, preventing a privacy breach is your best investment.

Privacy awareness training for your staff is an effective way to prevent privacy breach.

  • Need easy-to-implement privacy awareness training for your office?
  • No cost, on-line privacy awareness training?
  • Need short, simple training messages on your schedule?

Here is your opportunity to receive useful privacy and security tips, tools and templates that you can use right away.

Did you know that Data Privacy Day is on January 28th, 2016?

Data Privacy Day highlights the impact that technology is having on our privacy rights and underlines the importance of valuing and protecting personal information.

As a Data Privacy Day Champion, Information Managers Ltd. recognizes and supports the principle that organizations, businesses and government all share the responsibility of being conscientious stewards of personal information by respecting privacy, safeguarding data and enabling trust.

To celebrate Data Privacy Day, Information Managers is offering a free Data Privacy Day Privacy Awareness E-Course.

When you register, you will receive one email a day from January 21 – 29 with a privacy tip, easy to follow instructions, and links to additional resources that can be applied at home or in the office.

You can share this information with your friends, family, and co-workers.

Data Privacy Day E-course might qualify for CPE credits, too!

Use this Data Privacy Day E-course as part of your privacy awareness training program.

Tweet This!

Tweet This!

Celebrate Data Privacy Day with Information Managers Ltd!

What to do next: Sign up for the Data Privacy Day E-Course!

Register Here – Don't miss out on this free E-course!

E-course ends Jan 29.

* indicates required


Email Format

 

#PrivacyAware, Data Privacy Day, Data Privacy Day Edmonton, Practical Privacy Coach, privacy, privacy awareness, security
«‹222324

What is the elephant in the room?

The Elephant in the Room Find out here...

 

Privacy Policy

 

I have used Jean Eaton’s Privacy Impact Assessment consulting services on multiple projects at a very reasonable cost. Information Managers also provides a plethora of privacy information, education and training tools for minimal costs. One thing that has helped satisfy the training needs of staff for the PIA is paying for her in service program that is online and staff go through at their own pace while we monitor to ensure completion.

- Luke Brimmage, Executive Director, Aspen Primary Care Network

Register for Free On-line Privacy Breach Awareness Training!

Privacy Policy

Copyright 2023 Information Managers Ltd.

Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}