The Inventory Maturity Model for Information Governance
|
|
|
- Emmeline Butler
- 10 years ago
- Views:
Transcription
1 The Inventory Maturity Model for Information Governance Challenges Information Governance has a significant impact on business The absence of solid Information Governance is told in fines, lawsuits, and missed opportunities The ad hoc approach is too costly Takeaways In This White Paper Overview Maturity Model Defined The Maturity Model: A Closer Look at Process, Management and Resources Inventory Redux About IG Mapware and the Authors The 5 levels of inventory maturity The definitions of each level The significance of each level to a business, looking at the key areas of: Responsibility Process Formats Stewardship Duplication Overall Information Governance
2 Information Governance: The Activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs. Source: Information Governance Initiative Annual Report, Overview and costs. 1 Information governance practice has a huge impact on businesses the absence of good costs. information 1 governance practice is told in fines, lawsuits and missed opportunities for efficiency and profit. Today s business environments and big bucket retention systems have created a false sense of confidence and the mistaken impression that the establishment of company-wide information governance inventories is too old school in this age of databases and hosted applications. Yet, the process of memorializing the information inventory is more important than ever. Up-to-date tools for storing and sharing information are only part of the equation what remains is to systematically assess where all the information is, how it is managed, and by whom. This creates the need for assessment tools such as the Information Governance Inventory Maturity Model. The ad hoc approach is simply too costly. Maturity Model Overview The foundation for effective information governance, which provides for the appropriate management of information, is the identification of all information assets: documents, records, content, data, etc. This inventory provides the framework for implementing information governance. The inventory process has many levels, from human resources to technology systems to management processes. The inventory maturity model addresses the maturity levels in six areas, and details how criteria are defined for each maturity level from chaotic to completely optimized. The maturity levels are:
3 Maturity Level 1 Chaotic The lowest maturity level is uncontrolled chaos, at which the organization is vulnerable to risks such as regulatory fines, negative audit outcomes and other costly inefficiencies. Maturity Level 2 Repeatable This maturity level contains some repeatable processes and functions, although the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The resulting inefficiencies are costly, but moderately less than in the chaotic maturity level. Maturity Level 3 Repeatable In this maturity level we find much more definition of both processes and functions. This is where the majority of organizations are today, having moved from a hardcopy information governance model to one that includes electronic information. This move is often driven by risk and usually pertains to only portions of the organization s electronic information. This level of maturity indicates that the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The inefficiencies at this level can be costly, but much less so than in previous levels. Maturity Level 4 Managed In this maturity level we move from a defined to a managed process, which brings oversight including audits. This is where more tightly regulated and forwardthinking organizations are today. A distinguishing factor of organizations at this maturity level is the presence of a comprehensive inventory of all electronic information in the organization. These organizations minimize the risks related to producing information and achieve significant cost savings by eliminating inefficiencies and redundancies.
4 Maturity Level 5 Optimized The highest level of maturity is totally sustainable, integrated and transparent. Organizations that have achieved this level of maturity are able to implement their information governance programs effectively for all information formats and locations. This level of maturity ensures that there are minimal risks related to producing information. Significant ROI is realized through business process improvement and technology deployments that are based on the inventory data.
5 The Maturity Model: A Closer Look at Process, Management and Resources Each level of the Maturity Model is characterized by distinct criteria regarding an organization s management processes and resources. In the following section, these criteria in six areas Responsibility, Process, Format, Stewardship, Duplication and Information Governance will be detailed for each level of organizational maturity.
6 Maturity Level 1 Chaotic The lowest maturity level is uncontrolled chaos, at which the organization is vulnerable to risks such as regulatory fines, negative audit outcomes and other costly inefficiencies. Responsibility: Responsibility levels for the identification of the organization s information assets are not defined. If they exist at all, they are both need-based and reactive. Example: Assigning responsibility to know where particular assets are for a divestiture or lawsuit. Process: The process of identifying information assets is uncontrolled, varying from one area to another based on need. The privacy officer might have a spreadsheet of the locations for private information, but these are isolated and inconsistent. Formats: The lowest level of maturity will generally focus on inactive records stored off-site, at a commercial records center or company-owned facility. There is no identification of records that exist in electronic formats, regardless of their location. Stewardship: The importance of knowing the stewards of information is not recognized, and if there are stewards identified, it is a by-product of any process for sending hardcopy records off-site. Identifying the steward for a particular type of electronic record would not be possible at this stage. Duplication: Categories of information are identified with isolated instances of deduplicating as part of sending records off-site. Duplication between the electronic and hardcopy versions of records would not be available. Information Governance: There is no identification of the organization s assets the foundational process for information governance. Any information governance would be executed without identifying resources for the organization s categories of information. Maturity Level 2 Repeatable This maturity level contains some repeatable processes and functions, although the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The resulting inefficiencies are costly, but moderately less than in the chaotic maturity level. Responsibility: Responsibility levels for the identification of the organization s information assets are done departmentally, or in silos. Example: An attorney insuring that the legal department knows what their categories of information are, but with no other groups in the organization having the same level of identification for their information assets.
7 Process: The process of identifying information assets is standardized, but the execution of this standardization is inconsistent. The group in charge of physical security might know, using a standard format, where the company s hardcopy proprietary information is located. However, the organization s electronic proprietary information is unidentified. Formats: In Maturity Level 2, both the active and inactive hardcopy information assets are identified for organized departmental centralized files and off-site storage. The hardcopy in individual offices is not identified. For example, there would be organizational knowledge of all HR personnel files that are both active and inactive; however, there would be no identification of electronic data about employees that is tracked in the payroll system. Stewardship: The stewards of hardcopy information assets are identified for departments, but this does not extend to electronic information. Example: the company has access to the names of all stewards responsible for hardcopies of executed contracts. Duplication: There is more content identified at the second level of maturity; however, this identification is isolated and does not seek to identify duplication. Information Governance: There is no comprehensive identification of the organization s assets. Information governance is ad hoc. For example, certain hardcopy records are kept locked because there is identification of all proprietary and confidential hardcopy records. Maturity Level 3 Defined In this maturity level we find much more definition of processes and functions. This is where the majority of organizations are today, having moved from a hardcopy information governance model to one that includes electronic information. This move is often driven by risk and usually pertains to only portions of the organization s electronic information. This level of maturity indicates that the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The inefficiencies at this level can be costly, but much less so than in previous levels. Responsibility: There is recognition of the need for central coordination, and responsibility is assigned and staffed. Often the centralized responsibility is not staffed at the level necessary for the proper identification of the organization s information assets, and the process is never completed and rarely updated. Process: The process for inventorying is standardized and consistent. This might involve using an enterprise-wide spreadsheet or database to memorialize the
8 information. The process does not include provisions for periodic updates. If there was a divestiture, the information that was divested might not be memorialized. Formats: The vast majority of information in today s organizations is electronic. At this maturity level, there is an attempt to address electronic information based on its level of risk. For some, this could be ; for others, their electronic accounting/financial information. A significant percentage of the electronic information would not be addressed. Stewardship: During the inventory, the stewards of each information asset would be identified. This would relate to both hardcopy and high-risk electronic records. Because a large volume of electronic information would not be identified, neither would the stewards be identified. The stewards of financial and accounting electronic information would be identified, but the lower-risk electronic information related to human resources would not be identified. Duplication: At this maturity level there is a deliberate effort to identify the information assets and areas of duplication. This includes duplicates throughout the enterprise and media duplicates that could exist within departments. If the records related to a project exist in both electronically and in hardcopy, this is identified. Information Governance: The identification of the organization s assets establishes the framework for information governance. Information governance is applied to various silos based on risk. For example, an organization may audit the protection of both private information and confidential information against the data contained in the inventory. Maturity Level 4 Managed At this maturity level we move from a defined to a managed process, which brings oversight including audits. This is where more tightly regulated and forwardthinking organizations are today. A distinguishing factor of organizations at this maturity level is the presence of a comprehensive inventory of all electronic information in the organization. These organizations minimize the risks related to producing information and achieve significant cost savings by eliminating inefficiencies and redundancies. Responsibility: There is central management, with responsibility assigned and staffed. Departments are responsible for participating in the inventory process and maintaining the inventory with management oversight. The maintenance activity is done both on a scheduled and an as needed basis. Process: The process for inventorying is standardized and consistent; it is sustainable, supported by a centralized database that tracks the initial data and any changes to
9 the data. The process is sustainable because it supports both ad hoc changes as well as data validation done on a prescribed schedule. Formats: The vast majority of information in today s organizations is electronic. At this maturity level, all electronic information in the enterprise is inventoried, including databases, Internet/intranet, desktop, , social media, etc. Stewardship: During the inventory, the stewards of each information asset are identified. This includes all electronic information assets. The stewardship differentiates between electronic information that is controlled by the IT department, e.g., ERP systems data, and electronic information that is controlled by departments, e.g., Access/Lotus databases. The stewardship role is defined to include responsibilities applicable to information governance at the department level. Duplication: At Maturity Level 4, there is a deliberate effort to identify all information assets and areas of duplication. This includes duplicates throughout the enterprise and media duplicates within a department, including all electronic information. There is a deliberate effort to analyze this data and to de-duplicate it. Information Governance: Information governance is applied enterprise-wide and is not based on risk. Information governance compliance is audited on a regular schedule against the data contained in the inventory. Maturity Level 5 Optimized The highest level of maturity is totally sustainable, integrated and transparent. Organizations that have achieved this level of maturity are able to implement their information governance programs effectively for all information formats and locations. This level of maturity ensures that there are minimal risks related to producing information. Significant ROI is realized through business process. Responsibility: There is central management with responsibility that is assigned and staffed. Departments are responsible for participating in the inventory process and maintaining the inventory with management oversight, with maintenance activity being done both when there are changes and on a prescribed schedule. There is enterprise oversight of the activity, and it is budgeted and supported at the highest levels of the organization. Process: The process for inventorying is standardized and consistent; it is also sustainable. The process is supported by a centralized database that tracks the initial data and any changes to the data. The optimized maturity level includes inventory integration with other systems to insure information governance consistency. Example: The integration of privacy and security classifications into ECM and RMS solutions.
10 Formats: At this maturity level, all electronic and hardcopy information in the enterprise is inventoried, including databases, Internet/intranet, desktop, , social media, etc. In addition to inventorying information in the enterprise, all information assets related to core business functions that are in the custody of third parties are inventoried. This could include worker compensation claims handled by outside third parties, specialized safety training tracked by third parties, etc. Stewardship: During the inventory, the stewards of each information asset are identified. This includes all electronic information assets. In addition to the stewards within the enterprise, the stewards for information in the custody of third parties are identified. The stewardship role is defined to include responsibilities applicable to information governance at the department level. Additionally, any information stewardship roles and responsibilities for third party stewards are memorialized contractually. Duplication: At this maturity level there is a deliberate effort to identify the information assets and instances of duplication, throughout the enterprise and within departments. It includes all electronic information and information in the custody of third parties. All data is systematically analyzed and de-duplicated. Governance: The identification of the organization s assets establishes the framework for information governance. Information governance is applied enterprise-wide, and is not based on risk. The inventory is a totally transparent process throughout the enterprise. Information governance compliance is audited on a regular schedule against the data contained in the inventory. Inventory Redux Although some consider the information inventory to be old school, it remains absolutely essential in today s information environment. As organizations focus on information governance, they realize that it requires a knowledge base of the organization s information assets, and that the information inventory is the cornerstone for building an effective information governance practice that defuses liabilities and increases cost efficiency. Once this centralized asset is created, only then can an organization attack the systematized layers of better information governance and reap the rewards. About IG Mapware IG Mapware is a comprehensive, easy-to-use database for information asset inventory and data mapping. Designed by industry experts, IG Mapware offers multiple views of all your information assets in one place (electronic documents, s, hard copies,
11 information at third parties, etc.), so you can quickly identify the value and risks associated with your information. As a cloud-based service, you can easily scale IG Mapware to your unique needs without internal technical support. IG Mapware is affordable, comprehensive and evergreen, making it a smart foundation for your information governance programs. Professional services are also available. IG Mapware s clients range from Fortune 500 companies to public agencies with 200 employees. Learn more at About Jeanne Caldwell Jeanne Caldwell is the chief executive officer of IG Mapware. She s spent her career helping organizations establish a smart foundation for their information governance, strengthen their compliance and records programs, and make better use of their time. Jeanne is a proven innovator in software for the records and information management field. Her firm pioneered the functional big bucket approach to retention schedules, along with one of the first barcode-enabled, file tracking software applications. Jeanne brings more than 20 years of information governance experience to each IG Mapware implementation. Her deep expertise ensures that IG Mapware can be adapted to and meet the strategic needs of your legal, IT and compliance departments. Jeanne is a national speaker and a program coordinator for the local chapter of ARMA, the international professional association for information governance and records management. She regularly gives back to the community. She can be reached at [email protected].
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Leveraging a Maturity Model to Achieve Proactive Compliance
Leveraging a Maturity Model to Achieve Proactive Compliance White Paper: Proactive Compliance Leveraging a Maturity Model to Achieve Proactive Compliance Contents Introduction............................................................................................
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
Information Governance Challenges and Solutions
Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information
GOVERNANCE DEFINED. Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts
GOVERNANCE DEFINED Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts Governance over the use of technology assets can be seen
September 28 2011. Tsawwassen First Nation Policy for Records and Information Management
Tsawwassen First Nation Policy for Records and Information Management September 28 2011 Tsawwassen First Nation Policy for Records and Information Management Table of Contents 1. RECORDS AND INFORMATION
Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO
Information Governance Workshop David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO Recognition of Information Governance in Industry Research firms have begun to recognize the
Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL
AU7087_C013.fm Page 173 Friday, April 28, 2006 9:45 AM 13 Access Control The Access Control clause is the second largest clause, containing 25 controls and 7 control objectives. This clause contains critical
Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group
SAP Services Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group A Journey Toward Optimum Results The Three Layers of HR Transformation
Mobilize SharePoint Securely: Top 5 Enterprise Requirements
AN ACCELLION WHITE PAPER Mobilize SharePoint Securely: Top 5 Enterprise Requirements Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto,
How To Manage E-Discovery
The E-Discovery Maturity Model ADAM HURWITZ, CISSP September 2010 Tel. (888) 338-4242 www.biaprotect.com E-Discovery has evolved and grown over the last ten years to become a necessary part of doing business.
Project Management Office: Seeing the Whole Picture
Cloud Solutions for IT Management WHITE PAPER Project Management Office: Seeing the Whole Picture Project Portfolio Management gives PMOs the tools and techniques to get lean in lean times. Executive Summary
Successful Implementation of Enterprise-Wide Information Governance
Successful Implementation of Enterprise-Wide Information Governance ARMA Austin Monthly Meeting November 13, 2014 TAD C. HOWINGTON, CRM, FAI Manager, E- Records and Information Governance Kinder- Morgan
Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks
Understanding Today s Economics of Information Get Your Act Together Now! Sylvan Sibito H Morley III IBM Worldwide Director Information Lifecycle Governance Information Economics: The discipline of analyzing
GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011
APPENDIX 1 GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT January 7, 2011 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto TABLE OF CONTENTS
The Business Case for Enterprise Content Management. A Collection of Enterprise Content Management (ECM) and Document Management Research Data
The Business Case for Enterprise Content Management A Collection of Enterprise Content Management (ECM) and Document Management Research Data Table of Contents Introduction... 3 Factors Driving the Proliferation
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
Mergers and Acquisitions: The Data Dimension
Global Excellence Mergers and Acquisitions: The Dimension A White Paper by Dr Walid el Abed CEO Trusted Intelligence Contents Preamble...............................................................3 The
ANALYTICS PAYS BACK $13.01 FOR EVERY DOLLAR SPENT
RESEARCH NOTE September 2014 ANALYTICS PAYS BACK $13.01 FOR EVERY DOLLAR SPENT THE BOTTOM LINE Organizations are continuing to make investments in analytics to meet the growing demands of the user community
Internal Audit. Audit of HRIS: A Human Resources Management Enabler
Internal Audit Audit of HRIS: A Human Resources Management Enabler November 2010 Table of Contents EXECUTIVE SUMMARY... 5 1. INTRODUCTION... 8 1.1 BACKGROUND... 8 1.2 OBJECTIVES... 9 1.3 SCOPE... 9 1.4
Symantec NetBackup 7.5 for VMware
V-Ray visibility into virtual machine protection Solution Overview: Data Protection Overview There is little question that server virtualization is the single biggest game-changing trend in IT today. Budget-strapped
Private Cloud: Key considerations for an insurance agency
white paper private cloud Private Cloud: Key considerations for an insurance agency in the insurance industry, there are many options for meeting insurance agency information technology requirements. An
Developing a Records Retention Program
Developing a Records Retention Program This site is intended to help you design and implement a records retention program for your organization. Here you will find a basic explanation of a records retention
Organizational Restructuring Toolkit
Organizational Restructuring Toolkit Driving Effective Enterprise Change CEB Applications Leadership Council CEB Infrastructure Leadership Council A Framework for Member Conversations The mission of The
IT Governance Regulatory. P.K.Patel AGM, MoF
IT Governance Regulatory Perspective P.K.Patel AGM, MoF Agenda What is IT Governance? Aspects of IT Governance What banks should consider before implementing these aspects? What banks should do for implementation
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12)
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) I. Definition Data governance is the exercise of authority and control (planning, monitoring, and enforcement) over the management
Identify and Protect Your Vital Records
Identify and Protect Your Vital Records INTRODUCTION The Federal Emergency Management Agency s Federal Preparedness Circular 65 states The protection and ready availability of electronic and hardcopy documents,
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013
Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices April 10, 2013 Today's Agenda: Key Topics Defining IT Governance IT Governance Elements & Responsibilities
Governance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
Maximizing Your IT Value with Well-Aligned Governance August 3, 2012
Maximizing Your IT Value with Well-Aligned Governance August 3, 2012 6 th Annual SoCal Excellence in Service Management Conference Your Presenter: Jason Brucker Associate Director within Protiviti's IT
The Ultimate Guide to Buying HR Software for your Growing Business. Get your decision right with this step-by-step guide!
The Ultimate Guide to Buying HR Software for your Growing Business Get your decision right with this step-by-step guide! Ward Christman Chief Advisor, HR Tech Advisor Ward Christman s career in HR technology
Basic Records Management Practices for Saskatchewan Government*
Provincial Saskatchewan Archives R of Saskatchewan Basic Records Management Practices for Saskatchewan Government* Provincial Archives of Saskatchewan (306) 787-0734 [email protected] www.saskarchives.com
Administrative Procedures Memorandum A2005
Page 1 of 12 Date of Issue: June 2014 Original Date of Issue: Subject: References: Links: Contact: June 2014 RECORDS AND INFORMATION MANAGEMENT Policy 2196 Records and Information Management Policy 2197
Take the right steps 9 principles for building the Risk Intelligent Enterprise
Take the right steps 9 principles for building the Risk Intelligent Enterprise Contents 9 principles for building a Risk Intelligent Enterprise 2 The Risk Intelligent Framework 4 1. Is risk a threat or
Business Intelligence and Analytics: Leveraging Information for Value Creation and Competitive Advantage
PRACTICES REPORT BEST PRACTICES SURVEY: AGGREGATE FINDINGS REPORT Business Intelligence and Analytics: Leveraging Information for Value Creation and Competitive Advantage April 2007 Table of Contents Program
How To Get Rid Of A Collection Of Disparate Systems
WHITE PAPER The Strategic Value of an Integrated HCM Platform There are many sound reasons why HR departments implement point solutions. In most cases, it s because they want a best-of-breed solution with
Human Capital Management: Leveraging Your Human Assets
Human Capital Management: Leveraging Your Human Assets Executive Summary Managers have always intuitively believed that their employees generate value for the organization but today, intuition is no longer
The Business Case for Enterprise Content Management. A Collection of Enterprise Content Management (ECM) and Document Management Research Data
The Business Case for Enterprise Content Management A Collection of Enterprise Content Management (ECM) and Document Management Research Data Table of Contents Introduction... 3 Factors Driving the Proliferation
AV-20 Best Practices for Effective Document and Knowledge Management
Slide 1 AV-20 Best Practices for Effective Document and Knowledge Management Douglas J. Vargo Vice President, Information Management Practice 2013 Invensys. All Rights Reserved. The names, logos, and taglines
The Business Case for HP ControlPoint
The Business Case for HP ControlPoint White Paper Revision: 2 Date created: 13 November 2015 Principal author: Nigel Carruthers-Taylor icognition reference: 15/16495 Executive Summary Table of Contents
THE NEXT GENERATION OF HR SHARED SERVICES SUBHEADLINE RUNS HERE AND HERE AND HERE AND HERE
THE NEXT GENERATION OF HR SHARED SERVICES SUBHEADLINE RUNS HERE AND HERE AND HERE AND HERE SAP Executive Insight It s no secret that implementing HR shared services can help organizations generate significant
Information Governance 2.0 A DOCULABS WHITE PAPER
Information Governance 2.0 A DOCULABS WHITE PAPER Information governance is the control of an organization s information to meet its regulatory, litigation, and risk objectives. Effectively managing and
HR Field Guide: 5 Tips To Effective Succession Planning
HR Field Guide: 5 Tips To Effective Succession Planning May 2010 Succession planning systems identify, prepare, and track high potential employees for promotion and advancement. This fi eld guide will
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
Integrated email archiving: streamlining compliance and discovery through content and business process management
Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........
Webinar: Chart of Accounts Alignment through Information Governance
Webinar: Chart of Accounts Alignment through Information Governance Huron Presenters: Todd Weinstein Alex Vlaisavljevic August 28, 2014 Objectives & Agenda Webinar Objectives: Agenda Discuss the importance
PROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data.
Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act, RSA 2000, c.a-18; Electronic Transactions Act, SA 2001, c.e- 5.5; Freedom of
The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance
October 2007 The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance Page 2 Introduction It s been said that IT is the engine for growth and business innovation
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Enterprise IT Portfolio Governance and Management Model
STATE OF MICHIGAN Department of Information Technology Enterprise IT Portfolio Governance and Management Model NASCIO 2007 RECOGNITION AWARDS CATEGORY: IT PROJECT AND PORTFOLIO MANAGEMENT Enterprise IT
Enterprise Data Management
Enterprise Data Management - The Why/How/Who - The business leader s role in data management Maria Villar, Managing Partner Business Data Leadership Introduction Good Data is necessary for all business
fmswhitepaper Why community-based financial institutions should practice enterprise risk management.
fmswhitepaper Why community-based financial institutions should practice enterprise risk management. By Michael D. Cohn, CPA, CISA, CGEIT Director, WolfPAC Solutions Group Unique Insights Implementation
Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View
Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View David Jordan Data Management Product Specialist 1 2 A simple
Data Governance for Master Data Management and Beyond
Data Governance for Master Data Management and Beyond A White Paper by David Loshin WHITE PAPER Table of Contents Aligning Information Objectives with the Business Strategy.... 1 Clarifying the Information
SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE
Information is an organization s most important strategic asset the lifeblood of the organization s knowledge, processes, transactions, and decisions. With information continuing to grow exponentially,
building a business case for governance, risk and compliance
building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building
CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.
TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive
Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance
Best Practices for Long-Term Retention & Preservation Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance SNIA Legal Notice The material contained in this tutorial is copyrighted
An RCG White Paper The Data Governance Maturity Model
The Dataa Governance Maturity Model This document is the copyrighted and intellectual property of RCG Global Services (RCG). All rights of use and reproduction are reserved by RCG and any use in full requires
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
The Data Governance Maturity Model
A DataFlux White Paper Prepared by: DataFlux Corporation The Data Governance Maturity Model Establishing the People, Policies and Technology That Manage Enterprise Data Leader in Data Quality and Data
Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper
Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper Robert Maydoney Vice President Sales Pinkerton Government Services, Inc. 740 North Main Street Mansfield,
Fortune 500 Medical Devices Company Addresses Unique Device Identification
Fortune 500 Medical Devices Company Addresses Unique Device Identification New FDA regulation was driver for new data governance and technology strategies that could be leveraged for enterprise-wide benefit
Agenda. You are not in the business to manage records
Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
White Paper March 2009. Government performance management Set goals, drive accountability and improve outcomes
White Paper March 2009 Government performance management Set goals, drive accountability and improve outcomes 2 Contents 3 Business problems Why performance management? 4 Business drivers 6 The solution
1. The records have been created, sent or received in connection with the compilation.
Record Retention & Destruction Policy Bradley Kirschner PC recognizes that the firm s engagement and administrative files are critical assets. As such, the firm has established this formal written policy
Information Governance for Healthcare Executives. Lesley Kadlec, MA, RHIA Lydia Mays Washington, MS, RHIA, CPHIMS
Information Governance for Healthcare Executives Lesley Kadlec, MA, RHIA Lydia Mays Washington, MS, RHIA, CPHIMS Objectives Understand the opportunity to capitalize on Information through a solid governance
ARMA: Information Governance: A Revenue Source Potential
ARMA: Information Governance: A Revenue Source Potential Presenter: Martin Tuip Executive Director for IG Products ARMA International Agenda About ARMA International What is Information Governance? Generally
