Electronic Document Retention and Destruction: The Impact of Global Regulations

Size: px
Start display at page:

Download "Electronic Document Retention and Destruction: The Impact of Global Regulations"

Transcription

1 An IT Briefing produced by

2 By Mark Diamond and Galina Datskovsky 2007 TechTarget BIOS Mark Diamond, President and CEO, Contoural Inc., is an industry thought leader in archiving, compliance, storage, data protection, and ILM strategies and practices. As CEO of Contoural, he helps Fortune 500 companies reduce risk, ensure compliance, and lower costs. A frequent industry speaker, Diamond addresses how organizations can better align business requirements with IT and storage spending. Galina Datskovsky, Ph.D., CRM, Senior Vice President of Development at CA, is an internationally known expert in the field of records management and associated technologies. She has over 20 years experience in computer sciences, and is Past President of the New York City Chapter of the Association of Records Management Administrators (ARMA). She received her CRM certification in In 2006, Dr. Datskovsky received the Honored Member of the Year Award from the ARMA Metro New York City Chapter. Dr. Datskovsky has published articles in prestigious academic journals and computer science conference proceedings and is a sought-after speaker to organizations worldwide on computer and records management systems. Speaking engagements include: ARMA chapters in California, Connecticut, Florida, Massachusetts, and New York; AIIM, ALA, ARMA, Gilbane Conferences, LawNet, and MER. In 2003, Dr. Datskovsky gave a nationwide web presentation to NARA on the topic of electronic records administration. Dr. Datskovsky is Senior Vice President of Development at CA, Inc. She was founder and CEO of MDY and one of the creators of MDY FileSurf, leading the company to become one of the leaders of records technology for the past 18 years. Dr. Datskovsky oversees technology operations for a variety of clients in the Fortune 100, legal, medical, government, and civil-service arenas. She consults with companies to evaluate their records and document management strategies. Prior to joining MDY, Dr. Datskovsky consulted for IBM and Bell Labs and taught at the Business School of Fordham University and the Graduate School of Columbia University. Dr. Datskovsky received her Ph.D. and Masters in Computer Science from Columbia University. This IT Briefing is based on a CA/TechTarget Webcast, Electronic Document Retention and Destruction:. This TechTarget IT Briefing covers the following topics: International Regulations and Electronic Documents Different Drivers International Regulatory Landscape Privacy Information Litigation Discovery User Behaviors Global Retention Policies: Best Practices Automate Records Retention Information Governance Litigation Discovery Content, Not Format Getting Started Collaborate On Policy CA s Solution Copyright 2007 CA. All Rights Reserved. Reproduction, adaptation, or translation without prior written permission is prohibited, except as allowed under the copyright laws. About TechTarget IT Briefings TechTarget IT Briefings provide the pertinent information that senior-level IT executives and managers need to make educated purchasing decisions. Originating from our industry-leading Vendor Connection and Expert Webcasts, TechTarget-produced IT Briefings turn Webcasts into easy-to-follow technical briefs, similar to white papers. Design Copyright TechTarget. All Rights Reserved. For inquiries and additional information, contact: Dennis Shiao Director of Product Management Webcasts, TechTarget dshiao@techtarget.com

3 Electronic Document Retention and Destruction: The Impact of Global Regulations International Regulations and Electronic Documents This document describes the impact of international regulations on electronic documents, one of the most interesting, most complicated, and most emotional areas within all of IT, and possibly within all business. There has been a huge surge of electronic documents, a huge surge of globalization, which many people are struggling to understand. It is difficult enough to lay out best practices for a single organization, but how do you determine the best practices for electronic document retention and destruction all across the world? Companies that have operations all over the world are typically surprised by the number of documents they have in different locations. International records include corporate, finance, and tax documents. Different countries have different regulations in terms of human resources, employee documents, and intellectual property. A slightly larger proportion of documents internationally are paper, in contrast to those in the US, but as companies begin to look at this, they sometimes get overwhelmed as they look at all the different countries, all the different document types, and all the different media. Local regulators and local courts in many different jurisdictions generally recognize that electronic documents have a lot of merit, but just because something is electronic does not mean it is a real document; quite the opposite. Electronic documents today are playing a more significant role than ever in global record keeping. Different Drivers As reflected in Figure 1, many organizations initially approach this topic from a compliance perspective, typically because either global standards or local regulations require some retention of electronic documents. The next driver, which is especially important internationally, is privacy. Privacy is not a driver itself that requires organizations to retain documents, but it has a real impact. Many documents contain personally identifiable information, about either employees or customers or patients, and organizations need to know what they have and be able to keep it secure. Privacy almost has a bigger impact on document retention and destruction than compliance. One of the largest drivers tends to be litigation and discovery in different jurisdictions. Companies need to have documents to support their positions in court, or they find themselves continually in a position to be discovered, and rules are changing in this area very quickly. Storage costs and business productivity also tend to be big drivers. Employees in remote locations have a tendency to save all their own documents and all their own , mainly for personal productivity reasons. It is worse to have a policy that is not followed than to have no policy whatsoever, so whatever policy is put in place for electronic document retention and destruction must be consistent with how employees actually do their work. Storage costs, operational costs, archival costs, destruction costs, and discovery costs all weigh into this. Many organizations are reluctant to adopt enterprise documents retention and destruction policies unless they have a good idea of the different cost issues associated with it. International Regulatory Landscape Most regulations are country-specific, so there is a tremendous amount of variability. Some of the regulations tend to follow Commonwealth organizations. Sometimes companies fall under international regulations such as Sarbanes-Oxley if they are traded on stock exchanges. Thus, there is a mismatch of different regulations: many of the regulations are based on paper records, and the electronic records are slow to catch up. Time and again, one of the big challenges is getting prescriptions from the regulations. Some of these regulations tend to be fairly prescriptive: they tell you exactly what you need to say or, in some cases, exactly what you need to secure. However, in most cases, international regulations tend to be very 1

4 Figure 1 nonprescriptive and not terribly clear. Sometimes they are based on the idea that everything is recorded on paper records; it is not, and that produces many gray areas. Regulatory discovery from one country can impact records kept in other countries. If a company s operations are based out of Australia, for example, and the company gets sued in Australia and they have operations in Indonesia, their Indonesian records are fair game for the Australian regulators. Regulation tends to be company-specific and not necessarily locationspecific. One overall trend is that regulators want organizations to save more records and to retrieve records quickly. When, for example, Japanese regulators request, I want to see these records, they must be produced very quickly. Vague or indefinite regulations may require indefinite retention. Many more companies have many more operations in many more countries. Globalization is spreading much, much faster than local laws are adopting, and so the regulations will probably take at least five years to catch up in all the different locations. However, just because regulations are not in place yet does not mean you should not follow them. Figure 2 shows a high-level view of the different electronic regulatory prescriptions in different countries. As you would expect, some of the more advanced economies tend to have more prescription, although not in all cases. Other economies are just emerging, and so different rules are coming up. You see more of a move toward corporate governance. Corporate governance is a trend that started in the US, and from country to country, more and more regulators are looking for their own version of Sarbanes-Oxley for corporate governance, which has some impact on records management. The idea here is to try to simplify your records to make retention and destruction for regulatory purposes easier. One of the best approaches is having one master policy with very limited country-by-country exceptions. That tends to be less complicated than having different records policies for each country in which you operate. We are now seeing the opposite with data privacy, which really started in Europe. Most of the data privacy regulations were a reaction to World War II and the wartime misuse of personal data. Germany was the leader in the privacy regulations post World War II. This trend migrated to France, and now it is in the EU, and then it spread to Japan and Australia and 2

5 Figure 2 South America. The United States has a patchwork level of data privacy. This is a wave that is spreading all across the world, as shown in Figure 3, and most countries are expected to have some level of best practice around privacy regulations within the next two or three years, probably spreading faster than corporate governance. Privacy Information What is privacy information? This is personally identifiable information: any records, any , any documents, any files that contain names or addresses or government identification numbers, phone numbers, credit card numbers, driver s license information, criminal information, school information, academic information, or genetic information about individuals. These can be employees, patients, or customers. The regulations state that information needs to be kept securely. In some cases, for example in the UK, if an individual consumer wants to have that information expunged, they can go to an organization and say, Tell me what information you have about me, and expunge that information. The trick with privacy is to know what you have: know where you have information about individuals; have a way of finding specific information about individuals; and keep it secure. Companies want to avoid privacy breaches and to keep privacy data more secure than other information. Companies must do those two things: know what they have and keep it secure. Companies do not want their records retention policy to make them liable for some type of privacy breach. The data privacy policy needs to be consistent with the records retention policy. Litigation Discovery Litigation discovery is the next driver. Employees create records, and tax laws and reporting regulations have additional record-keeping requirements. Once records exist, they may be sought as evidence in government inquiries, civil litigation, or criminal prosecution. This tends to vary significantly by country. In some countries for example, in the US, which is the leader in this area the idea of e-discovery or discovery of records, particularly electronic records, tends to be a very strong driver. In parts of Europe, it is much less of a driver because they do not have quite the same discovery requirements. Other parts of the world, like Australia, are catching up very quickly. Note again that actions in one country can be discovered by courts in another country. If a company has business 3

6 Figure 3 across the world, it needs to manage all pertinent records. It cannot say, Well, those records are sitting in China. We do not have to get those records. Chinese law may not require the company to do that but, certainly in the US, litigation for a company that has an office in China can discover those records. Geographies do not necessarily protect you from e-discovery actions, and many companies are putting the whole idea of e-discovery and the whole idea of litigation readiness on the same page in order to be better prepared. McCabe Versus British American Tobacco One case study concerned an Australian company, McCabe versus British American Tobacco (BAT). BAT was anticipating litigation. They updated their policies, and they had a previous litigation hold that expired, and because this litigation hold expired they said, Okay, this is a good chance for us to go delete all those records because we do not need them. The judge in the case found the deletions outrageous, saying, You do not have a right to delete these records, and he refused to let them present their defense. The Appellate court reversed that decision, but public outrage led to a crime bill, the Document Destruction Act, in This is a trend across the world, in which business has a responsibility to produce records when in litigation, and any attempt to delete those records will be viewed in many cases as spoliation, which is a legal term meaning purposeful deletion of records. User Behaviors Next is the issue of end-user behaviors. No matter what country they are in or what company they work for, users will save information. They want that information, and if the company policy is to delete all , for example, after 30 days, people individually save it on PST files. They save it on USB drives. They save it in part because this is an important productivity tool for getting their jobs done. They are not necessarily trying to be bad people, going against the policy, but very aggressive deletion policies tend to drive underground archival. This is true in Europe, Asia, and in the US and South America. Whatever a firm s record retention policy is, it must be consistent with how end users actually do their jobs. Firms should avoid the 30- to 60-day deletion policy, because it drives underground record archival. 4

7 Global Retention Policies: Best Practices International locations tend to have more paper documents, or at least the regulators there tend to take a more paper-centric view versus an electronic-centric view, although that is changing. In this case, management and exploration of those paper documents is very important. It is best to develop standard global retention policies with country-specific exceptions. The global policy should be as simple and as straightforward as possible, and you should apply any country-specific exceptions only to that one country. The policy should contain a component of data privacy or e-commerce regulations. Sometimes, countries lack specific electronic record retention regulations. In that case, it is acceptable to fall back on a country s code of civil procedure, because that tends to be more firm than other regulatory requirements. If you are looking for where the world is heading in the future, US law in terms of electronic record retention will probably be one of the standards, as well as some of the regulations coming out of the EU data privacy laws. Put together the EU data privacy laws and the US corporate governance and record retention practices, and that is where the world will be 10 years from now. If a firm is going to base its policy on something, it is good to base it on the US and the EU data privacy laws. One of the big issues on which companies continue to be challenged is retention of records, and litigation and litigation holds. If a firm has a trial happening in one place and has to go around the world and find all pertinent records, how are they going to find them? Organizations should not take a bottom-up approach based on regulations. It would become insuperably complicated to look at every document and every regulation in every country in which the firm operates. It is much better to create a simpler policy that is easier to execute. Automate Records Retention Put time and effort into getting the right tools and the right technology. Good records require using technology effectively, which means creating automated collection and avoiding manual processes. The companies that are best at this have put some effort into the policies, which is important, but they have also put effort into making the policy simple. They are really good at having the right tools and technologies. The sheer quantity of these records makes a manual process impractical. The best-practices approach for international records is to develop a record retention policy based on the five drivers. First, address the privacy component. Start out with the more prescriptive countries, because the less prescriptive countries will tend to follow the more prescriptive ones. Good policies tend to be media-agnostic. You can start out creating an e- mail retention policy, but that will be very similar to the file retention or paper document retention policy, because it does not make a difference what the underlying media is. Develop country-specific exceptions in order to make this easier. If you start with the business drivers and simplify from there, if you take the approach discussed above, and if you have the right technology, it tends to work. It begins as something that feels very difficult, but gets easier as you proceed. It is actually a very manageable and achievable project that will make an organization much more compliant and litigation-ready, and much better prepared to manage electronic records. Information Governance Information governance is critical in today s business climate for many reasons. As Mark Twain said, It is no use to keep private information which you can t show off, and unfortunately sometimes we show off that information in court. So it is very important to know what we are keeping and to keep it for just the right amount of time. Litigation Discovery Why information governance? One answer is litigation. If you are required to produce information during a particular request for a discovery motion, it is very important to have that information easily retrievable. It is very important not to have extraneous information, and to have just the right information that you need to actually go through, particularly with electronic records, although most of us use paper records. Firms go through massive amounts of information that they just happen to store because they have no policy, and during the litigation that can be an extraordinary request to process. There are privacy issues, and those are very important. Content, Not Format It is important to look at electronic records, regardless of the form in which they are created, in a uniform, policy-driven way. What does that mean? As one example, is not a record site in its own right. The content of the is what drives the kind of 5

8 record it is. If someone sends an to the HR Department and the HR person properly files it as an HR record, that is great. However, if that person is transferred out of the HR Department, but still has the right to that , then in fact we are in violation of privacy. So, good information governance takes into account who can see information and when. The business impact in itself is the message. We need to be able to store the information because we have to do our work. However, we are often unable to retrieve the correct information. If the wrong record is in fact retrieved as the correct one and there is no way to ascertain what is right, we could make serious mistakes. It is very important to keep information and to share information appropriately, to be able to quickly retrieve only that information that is indeed correct and needed. You need a good record policy with an appropriate retention schedule according to which, if there is no reason to hold information like a litigation-readiness reason it is deleted on a normal course-of-business basis. Firms then also benefit from reduced storage and search costs. Getting Started Some tasks need to be done before you start. For example, map out your data storage. Where is the information stored? For electronic records in particular, where are the electronic records created? If you have 200 or 300 different IT systems creating data, what is that in terms of volume of records? What kinds of records are being generated by each system? Can you determine the ownership? Who is actually the custodian of this record? What is the business alignment? What are the regulatory requirements that govern the record series being produced by these applications? Determine the information retention policies for all these questions. We need to look at information as records regardless of how they were created. For example, an HR record, an HR record, and an electronic document data record are one and the same series. Just because it is an , it does not belong in a different record. It is very important to have a policy and to simplify this policy as a particular set of rules and regulations. Note that, even if you have no policy, you still have a policy. That policy is, We are opting to keep everything forever because, if we have no policy, we had better not be deleting any records or we are in violation. Collaborate On Policy When creating a policy, it is critical that multiple departments custodian, IT, information management, records management or compliance, and legal all collaborate on that policy. It is also critical to determine your legal obligations in the various countries where you do business, and in the various states where you do business. For example, if you do business in 30 states, you might choose the longest retention period of those 30 states as the one and only period. You should not complicate the process by having 30 different periods, one for each state, because then even interstate transfer becomes an issue. So, developing a retention policy requires thinking about interjurisdictional transfer country-tocountry and state-to-state in the US. And of course, you need to evaluate the technology in use. Is it going to support the retention policy? If you have a particularly old application that cannot apply the retention policy, you might want to leave it as an exception. Maybe your business cannot replace it right now because you may have to explain this in court. You need to know that you could not comply for these reasons, and you need to have a remediation plan. Successful planning is key to tackling this challenge. It is impossible to tackle this all at once. You might want to have a two- or three-year plan that will bring you into compliance, and that tends to develop the policy. In that case, if you do have a litigation, that plan could be very helpful in a legal proceeding. Understanding compliance regulations that govern your business is key. Discuss the plan with your legal department and with the business owners. That means understanding regulations that govern the particular business you are in; each country where you do business might have a different view of those regulations, so having a general knowledge of them is important. It is also important to have an appropriate team or task force work on this. Generally, it would consist of the IT department, the records management group, legal compliance if that is appropriate, and it certainly should have executive backing, because nothing is going to change the culture of a company if it is not management-backed. Identify clearly all the IT challenges around and other applications. It is very important to identify where difficulties may arise. For example, are particular systems going to have problems with the system? Will there be certain phases during which you cannot connect with the records management application, or an archive application, or other systems? Try to avoid tactical silo solutions, because retention schedules should be global across all information. It is very important to be able to do it across the enterprise, across all the applications. Do not forget physical records: you 6

9 want to be able to say you applied the same policy for physical records and electronic records, across the board. CA's Solution Figure 4 shows CA s vision for its information governance, and particularly for this regulated record management component of its information governance solution. Policies must be applied across the platform, and records management is the foundation. The records management application is the foundation that applies appropriate retention policies and guidelines across the enterprise, and it should apply those across the enterprise groups, from physical records to all electronic documents, to , and so on, in a uniform fashion. An enterprise might have multiple repositories within the document management system, but all of them should be controlled by the stated policy entity. So, all records management provides a uniform way of viewing retention, dispositions, holds, and so forth, as well as discovery, and interacts with them all in a regulated manner with all the various applications in an enterprise. In order to drive the appropriate policy, it also interacts with the archiving systems. This suite has the CA Message Manager archive system, and the two are in close interaction so that you can consult not just the record, but the nonrecord. Retention management applies to both records and nonrecords for example, the copies we send in might have a much shorter life span and those are also controlled appropriately. Records management is the application of uniformity, and the audit trails that demonstrate an enterprise in fact complied with it. Figure 4 7

10 About TechTarget We deliver the information IT pros need to be successful. TechTarget publishes targeted media that address your need for information and resources. Our network of technology-specific Web sites gives enterprise IT professionals access to experts and peers, original content, and links to relevant information from across the Internet. Our conferences give you access to vendor-neutral, expert commentary and advice on the issues and challenges you face daily. Our magazines CIO Decisions, Information Security, Storage, and WinStorage give you in-depth analysis and guidance on the critical IT decisions you face. Practical technical advice and expert insights are distributed via more than 80 specialized e-newsletters, and our Webcasts allow IT pros to ask questions of technical experts. What makes us unique TechTarget is squarely focused on the enterprise IT space. Our team of editors and network of industry experts provide the richest, most relevant content to IT professionals. We leverage the immediacy of the Web, the networking and face-to-face opportunities of conferences, the expert interaction of Webcasts and Web radio, the laser-targeting of newsletters and the richness and depth of our print media to create compelling and actionable information for enterprise IT professionals. For more information, visit CA_05_2007_0001 8

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends

Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends A Podcast Briefing produced by Key Trends in the Identity and Access Management Market and How CA IAM R12 Suite Addresses These Trends Sponsored By: Key Trends in the Identity and Access Management Market

More information

Getting Started With E-mail Archiving for Exchange

Getting Started With E-mail Archiving for Exchange An IT Briefing produced by By Brien Posey 2008 TechTarget BIO Brien Posey is a Microsoft Certified Systems Engineer and a technical author, who has produced thousands of articles, tips, and white papers

More information

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009 State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers

More information

Green Computing Beyond the Data Center

Green Computing Beyond the Data Center An IT Briefing produced by By Helen Cademartori 2007 TechTarget BIO Author: Helen Cademartori Sr. IT Business Manager, Board Member CTB Helen Cademartori is a member of the board of CTB. She has worked

More information

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents WhitePaper Concise Guide to E-discovery Contents i. Overview ii. Importance of e-discovery iii. How to prepare for e-discovery? iv. Key processes & issues v. The next step vi. Conclusion Overview E-discovery

More information

IT Governance in an IBM Lotus Software Environment

IT Governance in an IBM Lotus Software Environment An IT Briefing produced by IT Governance in an IBM Lotus Software Environment 2009 TechTarget This IT Briefing is based on a Sherpa Software/TechTarget Webcast, IT Governance in an IBM Lotus Software Environment.

More information

5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE

5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE 5 WAYS STRUCTURED ARCHIVING DELIVERS ENTERPRISE ADVANTAGE Decommission Applications, Manage Data Growth & Ensure Compliance with Enterprise IT Infrastructure 1 5 Ways Structured Archiving Delivers Enterprise

More information

COMPLIANCE BENEFITS OF SAP ARCHIVING

COMPLIANCE BENEFITS OF SAP ARCHIVING O P E R AT I O NA L A N D COMPLIANCE BENEFITS OF SAP ARCHIVING A article sponsored by EMC Author: Jarad Carleton, Senior Consultant ICT Practice Partnering with clients to create innovative growth strategies

More information

Optimizing Data Efficiency with Windows File Server and Storage Consolidation

Optimizing Data Efficiency with Windows File Server and Storage Consolidation An IT Briefing produced by Optimizing Data Efficiency with Windows File Server and Storage Consolidation By Pete Brey 2008 TechTarget BIO Pete Brey is the Technical Marketing Director for HP s Enterprise

More information

E-mail Archiving Strategies: When Deleting is Not an Option

E-mail Archiving Strategies: When Deleting is Not an Option An IT Briefing produced by E-mail Archiving Strategies: When Deleting is Not an Option By Mark Diamond and Bill Tolson 2005 TechTarget BIOS Mark Diamond Mr. Diamond is founder, President & CEO of Contoural,

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

How To Write An Email Management Strategy

How To Write An Email Management Strategy WHITE PAPER The Road To Email Management Compliance: Balancing Strategy, Process And Technology EXECUTIVE SUMMARY One of life s more frustrating experiences is being lost and unable to see the path to

More information

Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER

Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER How do you purge your data? Are your data management practices in compliance with recordkeeping conventions and with legal standards?

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

Real World Strategies for Migrating and Decommissioning Legacy Applications

Real World Strategies for Migrating and Decommissioning Legacy Applications Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of

More information

Strategies for Preparing for E-Discovery

Strategies for Preparing for E-Discovery Strategies for Preparing for E-Discovery The amendments to the U.S. Federal Rules of Civil Procedure regarding the discovery of electronically stored information make it imperative for organizations to

More information

Discovery Technology Group

Discovery Technology Group Discovery Technology Group E-mail Retention: Readiness Survey E-mail now represents the largest source of new documents and records generated within a company, and the most troublesome from a retention

More information

Information Retention and ediscovery Survey GLOBAL FINDINGS

Information Retention and ediscovery Survey GLOBAL FINDINGS 2011 Information Retention and ediscovery Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: There is more to ediscovery than email... 8 Finding 2: Wide variations in information

More information

Information Governance Challenges and Solutions

Information Governance Challenges and Solutions Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information

More information

CA Records Manager. Benefits. CA Advantage. Overview

CA Records Manager. Benefits. CA Advantage. Overview PRODUCT BRIEF: CA RECORDS MANAGER CA RECORDS MANAGER HELPS YOU CONTROL AND MANAGE PHYSICAL, ELECTRONIC AND EMAIL RECORDS ACROSS THE ENTERPRISE FOR PROACTIVE COMPLIANCE WITH REGULATORY, LEGISLATIVE AND

More information

A Blueprint for Tiered Storage

A Blueprint for Tiered Storage An IT Briefing produced by By Steve Duplessie 2004 TechTarget BIOS Steve Duplessie Steve is the Founder and Senior Analyst of the Enterprise Storage Group, recognized worldwide as the leading independent

More information

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management

More information

Bringing Together Data Integration and SOA

Bringing Together Data Integration and SOA An IT Briefing produced by By David Linthicum 2008 TechTarget BIO David Linthicum is the CEO of the Linthicum Group LLC, an SOA consultancy. He is the former CEO of Bridgewerx and former CTO of Mercator

More information

Why organizations need to archive email? The underlying reasons why corporate email archiving is important

Why organizations need to archive email? The underlying reasons why corporate email archiving is important Why organizations need to archive email? The underlying reasons why corporate email archiving is important Over the past few years, email has become an integral part of the business workflow. This document

More information

Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?

Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles

More information

6 Steps to Globalizing Your Records Retention Schedule

6 Steps to Globalizing Your Records Retention Schedule 6 Steps to Globalizing Your Records Retention Schedule Executive Summary As organizations grow globally, records management becomes increasingly complex. Multi-jurisdictional companies must remove the

More information

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES

E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES E-Guide GROWING CYBER THREATS CHALLENGING COST REDUCTION AS REASON TO USE MANAGED SERVICES M id-sized companies plan to use more managed services and many see it as improving security. Read on to find

More information

An IT Briefing produced by. Email Archiving. Sponsored By:

An IT Briefing produced by. Email Archiving. Sponsored By: An IT Briefing produced by By George Crump 2008 TechTarget BIO George Crump is President and founder of Storage Switzerland, an IT analyst firm focused on the storage and virtualization segments. With

More information

BUILDING DATA CENTERS: UNDERSTANDING THE RISKS. Managing Risk Maximising Opportunity. www.controlrisks.com

BUILDING DATA CENTERS: UNDERSTANDING THE RISKS. Managing Risk Maximising Opportunity. www.controlrisks.com BUILDING DATA CENTERS: UNDERSTANDING THE RISKS Managing Risk Maximising Opportunity www.controlrisks.com Building Data Centers: UNDERSTANDING THE RISKS The world is inundated in new information. Ninety

More information

and the world is built on information

and the world is built on information Let s Build a Smarter Planet Starting with a more dynamic and the world is built on information Guy England Storage sales manager CEEMEA englag@ae.ibm.com Tel: +971 50 55 77 614 IBM Building a Smarter

More information

Security in Fax: Minimizing Breaches and Compliance Risks

Security in Fax: Minimizing Breaches and Compliance Risks Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information

More information

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers

More information

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??

PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies?? 21st Century Best Practices for Information Governance & Policies Presented by: John Isaza, CEO- Information Governance Solutions, LLC Partner - Rimon PC ARMA NOVA Chapter Friday, February 28, 2014 12:30

More information

The Challenge of Securing and Managing Data While Meeting Compliance

The Challenge of Securing and Managing Data While Meeting Compliance ESG Brief Commvault: Integrating Enterprise File Sync and Share Capabilities with Data Protection and Backup Date: September 2015 Author: Terri McClure, Senior Analyst, and Leah Matuson, Research Analyst

More information

Defensible Disposition Strategies for Disposing of Structured Data - etrash

Defensible Disposition Strategies for Disposing of Structured Data - etrash Defensible Disposition Strategies for Disposing of Structured Data - etrash Presented by John Isaza, Esq., FAI Co-Founder & CEO, Information Governance Solutions, LLC Tom Reding, CRM Executive Consultant,

More information

How To Manage An Electronic Discovery Project

How To Manage An Electronic Discovery Project Optim The Rise of E-Discovery Presenter: Betsy J. Walker, MBA WW Product Marketing Manager What is E-Discovery? E-Discovery (also called Discovery) refers to any process in which electronic data is sought,

More information

How To Manage Records In A Cloud

How To Manage Records In A Cloud Retention & Disposition of Records Residing in a Public Cloud: A Risk Management Approach Patricia C. Franks, PhD, IGP, CA, CRM International Symposium October 17, 2014 to mitigate risk Not all information

More information

39C-1 Records Management Program 39C-3

39C-1 Records Management Program 39C-3 39C-1 Records Management Program 39C-3 Sec. 39C-1. Sec. 39C-2. Sec. 39C-3. Sec. 39C-4. Sec. 39C-5. Sec. 39C-6. Sec. 39C-7. Sec. 39C-8. Sec. 39C-9. Sec. 39C-10. Sec. 39C-11. Sec. 39C-12. Sec. 39C-13. Sec.

More information

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS

E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS E-Guide THE LATEST IN SAN AND NAS STORAGE TRENDS B lock-based SANs and file-based networkattached storage are traditional technologies, and new trends and innovations continue to emerge with these age

More information

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012

White. Paper. Extracting the Value of Big Data with HP StoreAll Storage and Autonomy. December 2012 White Paper Extracting the Value of Big Data with HP StoreAll Storage and Autonomy By Terri McClure, Senior Analyst and Katey Wood, Analyst December 2012 This ESG White Paper was commissioned by HP and

More information

Compliance in the Corporate World

Compliance in the Corporate World Compliance in the Corporate World How Fax Server Technology Minimizes Compliance Risks Fax and Document Distribution Group November 2009 Abstract Maintaining regulatory compliance is a major business issue

More information

SOA and BPM: Aligning Business Needs with Your Architecture

SOA and BPM: Aligning Business Needs with Your Architecture An IT Briefing produced by SOA and BPM: Aligning Business Needs with Your Architecture By Srinath Nagabhirava 2008 TechTarget BIO Srinath Nagabhirava is Exec. Vice President at Adaequare Inc, a firm specializing

More information

Solving Key Management Problems in Lotus Notes/Domino Environments

Solving Key Management Problems in Lotus Notes/Domino Environments Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Executive Report. Why Healthcare Providers Seek Out New Ways to Manage and Use Big Data

Executive Report. Why Healthcare Providers Seek Out New Ways to Manage and Use Big Data Executive Report Why Healthcare Providers Seek Out New Ways to Manage and Use Big Data Impact of Healthcare Regulations on the Data Center The HIPAA and HITECH acts, along with the Affordable Care Act,

More information

Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software

Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software Records-enable your applications, content, documents and e-mail IBM Information Management software Add the compliance and discovery benefits of records management to your business solutions. Records management

More information

White Paper. What is an Identity Provider, and Why Should My Organization Become One?

White Paper. What is an Identity Provider, and Why Should My Organization Become One? White Paper What is an Identity Provider, and Why Should My Organization Become One? May 2015 Executive Overview Tame Access Control Security Risks: Become an Identity Provider (IdP) Organizations today

More information

COST-EFFECTIVE SOLUTIONS TO MITIGATE RISK AND CONTROL LITIGATION COSTS

COST-EFFECTIVE SOLUTIONS TO MITIGATE RISK AND CONTROL LITIGATION COSTS Legal White Paper Series: The Real Costs & Risks of Email, Part2 COST-EFFECTIVE SOLUTIONS TO MITIGATE RISK AND CONTROL LITIGATION COSTS How in-house counsel can leverage Mid-Market Information Management

More information

SearchWinIT.com SearchExchange.com SearchSQLServer.com

SearchWinIT.com SearchExchange.com SearchSQLServer.com TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Pocket E-Guide Expert Guide: Selecting the

More information

The Smart Archive strategy from IBM

The Smart Archive strategy from IBM The Smart Archive strategy from IBM IBM s comprehensive, unified, integrated and information-aware archiving strategy Highlights: A smarter approach to archiving Today, almost all processes and information

More information

Best and worst practices for Exchange email archiving

Best and worst practices for Exchange email archiving practices for Exchange email archiving Managing an email system can be difficult and frustrating. Add to that the burden of email archiving and even the most experienced IT pro is challenged. In this expert

More information

Identifying Broken Business Processes

Identifying Broken Business Processes Identifying Broken Business Processes A data-centric approach to defining, identifying, and enforcing protection of sensitive documents at rest, in motion, and in use 6/07 I www.vericept.com Abstract The

More information

Five ways to reduce PowerPoint overload

Five ways to reduce PowerPoint overload Five ways to reduce PowerPoint overload by Cliff Atkinson and Richard E. Mayer Executive Summary Many people have had enough of PowerPoint. That s no surprise to many of us who have seen PowerPoint slides

More information

Integrated email archiving: streamlining compliance and discovery through content and business process management

Integrated email archiving: streamlining compliance and discovery through content and business process management Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........

More information

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015 Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information

More information

FIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER

FIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER FIVE TIPS FOR A SUCCESSFUL EMAIL ARCHIVE MIGRATION TO MICROSOFT OFFICE 365 WHITEPAPER Introduction Microsoft Office 365 is a new powerful office productivity solution that replaces multiple on premise

More information

Fighting Counterfeiting in Asia. Douglas Clark. Partner. Lovells, Shanghai

Fighting Counterfeiting in Asia. Douglas Clark. Partner. Lovells, Shanghai Fighting Counterfeiting in Asia Douglas Clark Partner Lovells, Shanghai Introduction "Counterfeiting in China has reached a crisis point" This is a common view heard from many western executives and government

More information

Become A Paperless Company In Less Than 90 Days

Become A Paperless Company In Less Than 90 Days Become A Paperless Company In Less Than 90 Days www.docuware.com Become A Paperless Company...... In Less Than 90 Days Organizations around the world feel the pressure to accomplish more and more with

More information

The Importance of Corporate Governance for an International Financial Centre

The Importance of Corporate Governance for an International Financial Centre The Importance of Corporate Governance for an International Financial Centre Eddy Fong Chairman 9 September 2008 Good morning ladies and gentlemen. I would like to start by congratulating the Chamber of

More information

E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation

E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation E-Discovery Roundtable: Buyers Perspectives on the Impact of Technology Innovation TABLE OF CONTENTS Introduction... 3 IMPACT OF CLOUD COMPUTING... 3 Enforcing data management policies... 3 Protecting

More information

July 2007. Management Practice & Productivity: Why they matter

July 2007. Management Practice & Productivity: Why they matter July 2007 Management Practice & Productivity: Why they matter Nick Bloom Stanford University Stephen Dorgan McKinsey & Company John Dowdy McKinsey & Company John Van Reenen Centre for Economic Performance,

More information

Fundamentals Explained

Fundamentals Explained Fundamentals Explained Purpose, values and method of Scouting Item Code FS140099 July 13 Edition no 2 (103297) 0845 300 1818 Fundamentals Explained This document contains detailed information on Fundamentals

More information

BPM 2015: Business Process Management Trends & Observations

BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations 1 I BPM 2015: Business Process Management Trends & Observations BPM 2015: Business Process Management Trends & Observations Executive Summary

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,

More information

Donna G. Rose, CRM Global Records Manager Apache Corp May 6, 2010

Donna G. Rose, CRM Global Records Manager Apache Corp May 6, 2010 Donna G. Rose, CRM Global Records Manager Apache Corp May 6, 2010 Starting on the journey Vision of what can be managed electronically Most information created today is electronic Most information is stored

More information

How to Define SIEM Strategy, Management and Success in the Enterprise

How to Define SIEM Strategy, Management and Success in the Enterprise How to Define SIEM Strategy, Management and Success in the Enterprise Security information and event management (SIEM) projects continue to challenge enterprises. The editors at SearchSecurity.com have

More information

Information Governance: How to Assess Your Status

Information Governance: How to Assess Your Status Information Governance: How to Assess Your Status Jay Yelton, III and Mark Oudersluys December 3, 2015 WNJ.com Agenda What is Information Governance? Why is IG Increasingly Important? Strategic Focus:

More information

Fundamentals of Information Governance:

Fundamentals of Information Governance: Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different

More information

Capstone Compliance Using Symantec Archiving and ediscovery Solutions

Capstone Compliance Using Symantec Archiving and ediscovery Solutions WHITE PAPER: CAPSTONE COMPLIANCE........................................ Capstone Compliance Using Symantec Archiving and ediscovery Solutions Who should read this paper IT decision-makers, architects,

More information

Managing Virtual Desktop Environments

Managing Virtual Desktop Environments Managing Virtual Desktop Environments Desktop virtualization can be extremely beneficial to a company's operating system environment. Yet while working through the virtualization planning process, IT professionals

More information

IBM Policy Assessment and Compliance

IBM Policy Assessment and Compliance IBM Policy Assessment and Compliance Powerful data governance based on deep data intelligence Highlights Manage data in-place according to information governance policy. Data topology map provides a clear

More information

ACCELERATE INTERNATIONAL EXPANSION WITH ERP. Building a Cost-Effective Foundation to Enable Growth

ACCELERATE INTERNATIONAL EXPANSION WITH ERP. Building a Cost-Effective Foundation to Enable Growth ACCELERATE INTERNATIONAL EXPANSION WITH ERP Building a Cost-Effective Foundation to Enable Growth EXECUTIVE SUMMARY Whether your business has, or plans to have multiple divisions or international operations,

More information

Driving the Business Forward with Human Capital Management. Five key points to consider before you invest

Driving the Business Forward with Human Capital Management. Five key points to consider before you invest Driving the Business Forward with Human Capital Management Five key points to consider before you invest For HR leaders to contribute to the business successfully, they need HR solutions with the right

More information

DOCSVAULT WhitePaper. A Guide to Document Management for Legal Industry. Contents

DOCSVAULT WhitePaper. A Guide to Document Management for Legal Industry. Contents WhitePaper A Guide to Document Management for Legal Industry Contents i. Overview ii. Key challenges in legal industry iii. The case for legal document management iv. The case against legal document management

More information

Retention & Disposition in the Cloud Do you really have control?

Retention & Disposition in the Cloud Do you really have control? InterPARES Trust Retention & Disposition in the Cloud Do you really have control? Franks Patricia, San Jose State University, San Jose, USA and Alan Doyle, University of British Columbia, Canada October

More information

Millions of Google Apps Users May be In Violation of Legal & Organizational Compliance Standards. Learn How To Avoid it.

Millions of Google Apps Users May be In Violation of Legal & Organizational Compliance Standards. Learn How To Avoid it. Millions of Google Apps Users May be In Violation of Legal & Organizational Compliance Standards. Learn How To Avoid it. The problem More than 30 million users within businesses, government agencies, schools

More information

Here are several tips to help you navigate Fairfax County s legal system.

Here are several tips to help you navigate Fairfax County s legal system. Since 2004, I ve been a daily presence in the Fairfax County Courthouse and have handled hundreds of drug cases as both a Prosecutor and a Defense Attorney. I have spent the last decade analyzing the legal

More information

Electronic Records Management

Electronic Records Management Electronic Records Management HOW TRANSIT AGENCIES CAN LEVERAGE THEIR USE What is Electronic Records Management Electronic Records Management (ERM) utilizes technology to enable the indexing, imaging,

More information

Private and Hybrid Custom Cloud Hosting of Microsoft Applications For Enterprises and Government Agencies

Private and Hybrid Custom Cloud Hosting of Microsoft Applications For Enterprises and Government Agencies ceocfointerviews.com All rights reserved! Issue: October 13, 2014 The Most Powerful Name in Corporate News Private and Hybrid Custom Cloud Hosting of Microsoft Applications For Enterprises and Government

More information

The Legal Advantages of Retaining Information

The Legal Advantages of Retaining Information WHITE PAPER: CUSTOMIZE WHITE PAPER: BEST PRACTICES FOR ARCHIVING Confidence in a connected world. Best Practices for Defining and Establishing Effective Archive Retention Policies Sponsored by Symantec

More information

A 15-Minute Guide to 15-MINUTE GUIDE

A 15-Minute Guide to 15-MINUTE GUIDE A 15-Minute Guide to Retention Management 15-MINUTE GUIDE Foreword For you as a business professional, time is a precious commodity. You spend much of your day distilling concepts, evaluating options,

More information

The Risk-Cost Retention Model: Randolph A. Kahn, Esq. At the Core

The Risk-Cost Retention Model: Randolph A. Kahn, Esq. At the Core The Risk-Cost Retention Model: A New Approach to Records Retention Bringing all stakeholders to the table to discuss the risk and cost involved in retention decisions allows a company to create the best

More information

2016 Firewall Management Trends Report

2016 Firewall Management Trends Report 2016 Firewall Management Trends Report A survey of trends in firewall use and satisfaction with firewall management JANUARY 2016 Copyright 2016 Skybox Security, Inc. All rights reserved. Skybox is a trademark

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

75% On the Record. Is Your Organization s Records Management Program Providing High Value or High Risk?

75% On the Record. Is Your Organization s Records Management Program Providing High Value or High Risk? Records Management SUrvey Report 75% of Most Respondents Said a Senior Executive Oversees the Records Program On the Record Is Your Organization s Records Management Program Providing High Value or High

More information

... ADDRESSING EMAIL CHAOS: THE EMAIL-MANAGER TM SOLUTION THE RADICATI GROUP, INC. A whitepaper by The Radicati Group, Inc.

... ADDRESSING EMAIL CHAOS: THE EMAIL-MANAGER TM SOLUTION THE RADICATI GROUP, INC. A whitepaper by The Radicati Group, Inc. . THE RADICATI GROUP, INC. The Radicati Group, Inc. 595 Lytton Avenue Palo Alto, CA 94301 Phone 650-322-8059 Fax 650-322-8061 http://www.radicati.com ADDRESSING EMAIL CHAOS: THE EMAIL-MANAGER TM SOLUTION

More information

Data Protection Policy

Data Protection Policy Data Protection Policy Document Ref: DPA20100608-001 Version: 1.3 Classification: UNCLASSIFIED (IL 0) Status: ISSUED Prepared By: Ian Mason Effective From: 4 th January 2011 Contact: Governance Team ICT

More information

3 Reasons to Archive Email

3 Reasons to Archive Email 3 Reasons to Archive Email Capacity & PSTs, Migration to Exchange 2010 & Compliance Executive Summary Last year, 725 million worldwide email accounts, each generated 110 messages a day*. Those numbers

More information

3 BENEFITS OF COMPLIANT EMAIL ARCHIVING.

3 BENEFITS OF COMPLIANT EMAIL ARCHIVING. 3 BENEFITS OF COMPLIANT EMAIL ARCHIVING. Assure compliance, speed ediscovery, and help protect your intellectual property. BY NED FASULLO Ned Fasullo is a life-long technologist, and data-driven marketing

More information

Agile enterprise content management and the IBM Information Agenda.

Agile enterprise content management and the IBM Information Agenda. Transforming your content into a trusted, strategic asset Agile enterprise content management and the IBM Information Agenda. Delivering a common information framework for uncommon business agility Highlights

More information

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward?

How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? SOLUTION BRIEF Content Aware Identity and Access Management May 2010 How can Content Aware Identity and Access Management give me the control I need to confidently move my business forward? we can CA Content

More information

White Paper of Criminal Background Checks

White Paper of Criminal Background Checks White Paper of Criminal Background Checks Criminal Background Checks For Employment Purposes In recent years, criminal background checks have become a vital part of the employment process, both as a means

More information

Document and Data Retention Compliance Understanding and Addressing the Costs, Risks, and Legal Pitfalls

Document and Data Retention Compliance Understanding and Addressing the Costs, Risks, and Legal Pitfalls SAP Thought Leadership Paper Human Capital Management Document and Data Retention Compliance Understanding and Addressing the Costs, Risks, and Legal Pitfalls Enterprise information continues to grow in

More information

Addressing the Abandoned Email Archive Risk

Addressing the Abandoned Email Archive Risk Addressing the Abandoned Email Archive Risk WHITE PAPER Table of Contents 3 Executive Summary 3 Introduction 4 What are Email Archives? 4 EOL, Obsolete, and Abandoned Email Archives 5 The Risks and Costs

More information

Optimizing the Application Testing of Your Siebel CRM Environment

Optimizing the Application Testing of Your Siebel CRM Environment An IT Briefing produced by Optimizing the Application Testing of Your Siebel CRM Environment By Yoav Eilat, Dennis Janecki, and Shashank Shukla 2008 TechTarget BIOS Yoav Eilat is the Senior Product Marketing

More information

CRM Buyer s Guide Volume I: What is CRM and How Can It Improve My Business?

CRM Buyer s Guide Volume I: What is CRM and How Can It Improve My Business? Volume I: What is CRM and How Can It Improve My Business? FrontRange Solutions White Paper i Table of Contents What is CRM?...1 A Brief History of CRM... 1 What are the advantages of having a Customer

More information

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst

Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst ESG Brief Varonis: Secure Enterprise Collaboration and File Sharing Date: June 2015 Author: Terri McClure, Senior Analyst; and Leah Matuson, Research Analyst Abstract: With the burgeoning workplace mobility

More information

Guide to Information Governance: A Holistic Approach

Guide to Information Governance: A Holistic Approach E-PAPER DECEMBER 2014 Guide to Information Governance: A Holistic Approach A comprehensive strategy allows agencies to create more reliable processes for ediscovery, increase stakeholder collaboration,

More information

Advanced analytics key component for decision management systems

Advanced analytics key component for decision management systems decision management In the last 20 to 30 years, companies have faced significant changes in how they perform their day-to-day operations, and so have the analytics used to make decisions. In this Q&A Tip

More information

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services.

Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Security solutions To support your IT objectives Adopt a unified, holistic approach to a broad range of data security challenges with IBM Data Security Services. Highlights Balance effective security with

More information