<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Detecting email sent to personal email accounts in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41300#M203</link>
    <description>&lt;P&gt;Yeah, that's a tough issue. It's a combination of culture and technical capabilities of our systems. Like I said previously, I'd first try to find out the 'Why' and try to prevent it that way rather than beating them with the proverbial stick. Beat them with the stick later if it's not possible to come up with a secure printing solution or make everything electronic so it doesn't need to be printed. Hopefully, someone else in the Community that's in a regulated industry has figured this out.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any way to restrict sending PII to only registered customers or business partners through the secure message center? All other emails that are not registered and have PII in them would fail sending.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Dec 2020 18:36:28 GMT</pubDate>
    <dc:creator>tmekelburg1</dc:creator>
    <dc:date>2020-12-04T18:36:28Z</dc:date>
    <item>
      <title>Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41279#M194</link>
      <description>&lt;P&gt;I am interested in hearing how other organizations are handling the issue of detecting if an employee is sending sensitive data to their personal email addresses.&amp;nbsp; We of course have a policy against this, but have a challenge enforcing it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have DLP rules that will automatically send outbound email through our secure messaging platform if PII is detected.&amp;nbsp; These are logged and reviewed.&amp;nbsp; We are a bank, so sending documents with PII is common.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With a large percent of our team working from home, we have detected a few cases of employees emailing files to their personal email account with the intent to be able to print them on their home printer.&amp;nbsp; This is against policy.&amp;nbsp; We were able to detect these because their personal email addresses were obvious.&amp;nbsp; If we see an email from Joe User going to &lt;A href="mailto:juser@yahoo.com" target="_blank"&gt;juser@yahoo.com&lt;/A&gt;, it’s pretty each to catch.&amp;nbsp; Our concern is the not so obvious email addresses.&amp;nbsp; If Joe User emails a document to &lt;A href="mailto:snowleopard23@yahoo.com" target="_blank"&gt;snowleopard23@yahoo.com&lt;/A&gt;, we have no way to know if that is a legitimate email to a client or if that his own personal email account. Any recommendations?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Part 2 of this is how to handle the violators.&amp;nbsp; We are looking into a progressive penalty system, possibly starting with a suspension without pay and escalating to termination.&amp;nbsp; Something with more teeth than a sit down with senior management since they already know it is prohibited.&amp;nbsp; Any suggestions along those lines are appreciated as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: I just made up &lt;A href="mailto:snowleopard23@yahoo.com" target="_blank"&gt;snowleopard23@yahoo.com&lt;/A&gt; on the fly.&amp;nbsp; My apologies if this is someone’s actual email address.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 14:10:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41279#M194</guid>
      <dc:creator>chogan</dc:creator>
      <dc:date>2020-12-04T14:10:23Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41282#M195</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/246249627"&gt;@chogan&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With a large percent of our team working from home, we have detected a few cases of employees emailing files to their personal email account with the intent to be able to print them on their home printer.&amp;nbsp; This is against policy.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;I know you didn't ask for this advice but I'd initially start with why they are trying to print at home and if it's necessary or extremely helpful for their positions, I'd look into ways for printing securely. Or setting up the environment so everything can be done electronically. I see this as a communication failure between IT and Operations.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/246249627"&gt;@chogan&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I am interested in hearing how other organizations are handling the issue of detecting if an employee is sending sensitive data to their personal email addresses.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have DLP rules that will automatically send outbound email through our secure messaging platform if PII is detected.&amp;nbsp; These are logged and reviewed.&amp;nbsp; We are a bank, so sending documents with PII is common.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We do the same thing as you but also DLP rules for PHI data as well. Does your messaging system have an encryption feature? You might be able to set it up to auto encrypt if it detects PII data. With ours we can either prevent the email flow or choose to encrypt the message. The receiver would then log into the encryption portal to retrieve the email. I know this doesn't fix the user's behavior but at least you would know it's encrypted.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For your part 2. Personally, our IT/Security department has enough to worry about. I'd recommend punting to HR for coming up with creative solutions for violators.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm definitely interested in how others in the Community handle these scenarios.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 15:05:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41282#M195</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-04T15:05:02Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41283#M196</link>
      <description>&lt;P&gt;Depending on the mail platform there a number of things that can be accomplished.&amp;nbsp; DLP is only one of them.&amp;nbsp; Preventing SMTP relay, mail flow rules, and constant reminders on the policy are just a few.&amp;nbsp; Violations in the&amp;nbsp; banking sector should be extreme for the employee.&amp;nbsp; This is a potential violation of client confidentiality regardless of whether you are a commercial bank or credit union.&amp;nbsp; Regulator agencies could fine the bank heavily if discovered in a risk assessment or regulatory audit.&amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 15:08:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41283#M196</guid>
      <dc:creator>PuettK</dc:creator>
      <dc:date>2020-12-04T15:08:07Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41285#M197</link>
      <description>&lt;P&gt;Part of this comes down to policy.&amp;nbsp; Are staff allowed limited personal use for example.&amp;nbsp; So staff they were to decide to use an employee assistance line, need to email an external pensions administrator or their doctor, what would the stance be?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your looking to prevent staff leaking data then you also have to look at uploads to file sharing sites, locking down copy and paste, connectivity, removable media, banning smartphones etc.&amp;nbsp; The worst email breaches I've encountered involved emailing the wrong recipient.&amp;nbsp; Esp. problematic if your company lawyers do it!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 15:30:56 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41285#M197</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-12-04T15:30:56Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41290#M198</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your looking to prevent staff leaking data then you also have to look at uploads to file sharing sites, locking down copy and paste, connectivity, removable media, banning smartphones etc.&amp;nbsp; The worst email breaches I've encountered involved emailing the wrong recipient.&amp;nbsp; Esp. problematic if your company lawyers do it!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;That's a good point. If he were to setup a full tunnel to a web filtering device, i.e. Cloud or on-prem, that would lock down access to file share sites and personal email on the work mobile device. I haven't looked but I'm sure there are some GPOs that would restrict access to installing or adding additional printers on the mobile devices.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 16:17:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41290#M198</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-04T16:17:46Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41294#M199</link>
      <description>&lt;P&gt;Gotta say,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;, I like what you said.&amp;nbsp; If they're on a work computer, and they have access to non-work-related or personal resources (social media, dropbox, ANYTHING OTHER THAN BANKING OR FINANCE), then the machine may not be locked down enough. No Gmail, no Yahoo mail, no FB, life sucks, get a helmet, scroll on your phone.&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 17:52:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41294#M199</guid>
      <dc:creator>ericgeater</dc:creator>
      <dc:date>2020-12-04T17:52:43Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41295#M200</link>
      <description>&lt;P&gt;Thank you all for the replies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Printing at home is prohibited, and the very few exceptions have been issued printers and shredders.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unauthorized file sharing sites and cloud drives are blocked on the web filter.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Our DLP rules are sending these files through our secure messaging platform.&amp;nbsp; It is normal course of business to for users to send customers and/or third parties documents through this platform.&amp;nbsp; Our issue is that the recipient could be anyone from the public at large who is doing business with us, so how can we identify employees personal email accounts vs. legitimate customer?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My answer so far has been that we can't, but, I am sure we are not the only ones needing to address this and wanted to see what others are doing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HR, executive committee, and legal are working on formalizing the punitive aspect.&amp;nbsp; I am looking for better detection methods.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 17:52:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41295#M200</guid>
      <dc:creator>chogan</dc:creator>
      <dc:date>2020-12-04T17:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41296#M201</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/136236425"&gt;@ericgeater&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Gotta say,&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/783051913"&gt;@Steve-Wilme&lt;/a&gt;, I like what you said.&amp;nbsp; If they're on a work computer, and they have access to non-work-related or personal resources (social media, dropbox, ANYTHING OTHER THAN BANKING OR FINANCE), then the machine may not be locked down enough. No Gmail, no Yahoo mail, no FB, life sucks, get a helmet, scroll on your phone.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Those are blocked.&amp;nbsp; My issue is &lt;STRONG&gt;NOT&lt;/STRONG&gt; that that they are accessing their email from their work computer, it is they are able to send email to their personal email accounts from their work email.&amp;nbsp; Yes, if it has PII it will go through our secure messaging system, but they will still receive it on their personal devices, just as any legitimate bank customer would.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;(edited to correct omitted NOT)&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 18:06:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41296#M201</guid>
      <dc:creator>chogan</dc:creator>
      <dc:date>2020-12-04T18:06:11Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41297#M202</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;STRONG&gt;Correction&lt;/STRONG&gt;:&amp;nbsp;&amp;nbsp;My issue is &lt;STRONG&gt;NOT&lt;/STRONG&gt; that that they are accessing their email from their work computer, it is&lt;/BLOCKQUOTE&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 18:05:04 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41297#M202</guid>
      <dc:creator>chogan</dc:creator>
      <dc:date>2020-12-04T18:05:04Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41300#M203</link>
      <description>&lt;P&gt;Yeah, that's a tough issue. It's a combination of culture and technical capabilities of our systems. Like I said previously, I'd first try to find out the 'Why' and try to prevent it that way rather than beating them with the proverbial stick. Beat them with the stick later if it's not possible to come up with a secure printing solution or make everything electronic so it doesn't need to be printed. Hopefully, someone else in the Community that's in a regulated industry has figured this out.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any way to restrict sending PII to only registered customers or business partners through the secure message center? All other emails that are not registered and have PII in them would fail sending.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Dec 2020 18:36:28 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41300#M203</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-12-04T18:36:28Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41714#M218</link>
      <description>&lt;P&gt;Effectively, you are asking to black list employee email addresses.&amp;nbsp; The obvious first step is to ask employees for their addresses.&amp;nbsp; Either that or white list your customers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;However, I think your approach is flawed. Solely playing technical whac-a-mole to defend confidential information is doomed to failure.&amp;nbsp; To be successful, you &lt;EM&gt;&lt;STRONG&gt;need&lt;/STRONG&gt;&lt;/EM&gt; employees to become your advocates in protecting CI&lt;/SPAN&gt;&lt;SPAN&gt;.&amp;nbsp; The simple fact that you authorized them to see the CI in the first place means they can screenshot it, take a picture with their mobile phone, hand transcribe, memorize, etc.&amp;nbsp; &amp;nbsp;As you are discovering, enforcement of rules that make it hard for them to do their jobs fosters shadow-IT-like behavior and ultimately hurts your overall goal to protect CI.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Much more enlightened is to ask why they need to print, empathize with their concerns and to find that "middle ground" which all parties can accept. &amp;nbsp;Most likely, you will find that they are trying to copy stuff from one document to another, or they are being asked to review documents on a screen which is much too small.&amp;nbsp; Both of these scenarios can be solved by issuing second (or third) monitors.&amp;nbsp; Or, maybe you buy everyone a shredder for Christmas and encourage its use in your CI&amp;nbsp;training program.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You might also find that the documents being emailed/printed are those belonging to the employee.&amp;nbsp; For example, I duplicate my own CI (performance review, employment contract, benefits notices, tax forms, etc) into a location not under employer control.&amp;nbsp; In part, this is CYA, but mostly it is so that they remain accessible even beyond my employment.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P data-unlink="true"&gt;Also, with respect to the juser@yahoo.com&amp;nbsp;scenario, it is only necessary to read about &lt;A href="https://www.cbc.ca/news/canada/british-columbia/british-soccer-reporter-mistaken-for-fired-vancouver-canucks-anthem-singer-1.5830683" target="_blank" rel="noopener"&gt;Mark Donnelly&lt;/A&gt; (thanks, rlade for the link) to realize that false positives ought to be considered.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 03:18:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41714#M218</guid>
      <dc:creator>denbesten</dc:creator>
      <dc:date>2020-12-17T03:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: Detecting email sent to personal email accounts</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41725#M219</link>
      <description>&lt;P&gt;How do you propose to identify PII definitively?&amp;nbsp; If you examine the legal definitions of what constitutes personal information, then this is fiendishly difficult for unstructured information.&amp;nbsp; For example, in the UK, the regulator includes information that is obviously about someone, although they may not be named or have an obvious unique id in the info, as personal data.&amp;nbsp;&amp;nbsp;For example, say I was to draft a linkedin recommendation for someone and email it to them.&amp;nbsp; I may not mention them except by the first name, but everything else would fall under the 'definitely about them'.&amp;nbsp; You could of course argue this is not PII that the organisation is data controller for.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 11:55:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/Detecting-email-sent-to-personal-email-accounts/m-p/41725#M219</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-12-17T11:55:02Z</dc:date>
    </item>
  </channel>
</rss>

