Enterprise Information Management & Governance in Statoil

Size: px
Start display at page:

Download "Enterprise Information Management & Governance in Statoil"

Transcription

1 Enterprise Information Management & Governance in Statoil Liv Stordahl Borud, Senior Analyst IT Solutions

2 Content About Statoil Enterprise Information Management Definition and framework Our approach Strategy Organization and roles Policy and process Monitoring and follow up Summary 2

3 About Statoil employees in 35 countries Operates 80% of all oil and gas production in Norway World leader in crude oil sales World s largest operator in waters deeper than 100 meters World leader carbon storage and CO 2 efficiency in oil and gas production 3

4 Enterprise Information Management Definition: A structured program for managing information as a strategic asset (DAMA 2011) In Statoil: Information Management shall be an integrated part of the businesses and processes across our company. To ensure coordination and benefits, a common approach to Information Management is established. 4

5 Enterprise Information Management Frameworks DAMA Framework (Data Management Association, 2009) February 2011 Forrester s Data Management Reference Architecture The Data Management Functional View 5 IBM s Information Governance model

6 IM Strategy Focus on business critical information with necessary quality Ensure that our valuables are not compromised or that the information is misused Appropriate access to information for collaboration 6

7 IM Organisation and roles Corporate IT: IM Strategy, policy, requirements and best practice Process owners: Supporting tools and IM requirements in their process Business areas: Ensure that requirements are implemented and monitored Service provider (GBS): Deliver and support CEO Processes: COA CFO Legal CSO CCOM DPN DPI DPNA MPR TPD EXP GSB

8 IM Professionals in Statoil Subsurface data management Document management in projects LCI network Master data management Collaborative information 8

9 Enterprise Information Model Enterprise architecture An enterprise architecture is a set of views that describe the enterprise 9

10 IM Policy and requirements

11 Purpose Simplify and clarify existing requirements Requirements relevant for information in all phases and process areas Strengthen risk based approach Increase value focus 11

12 IM Policy Our approach We manage information as a key corporate asset We are committed to Prioritizing management of business critical information Managing information according to risk exposure Sharing information to ensure efficient use and experience transfer Making information available for future needs Ensuring information quality How we work We understand requirements and responsibilities for managing information We use, store and archive information in accordance with legal requirements, operational, financial and historical needs We manage and share information according to security classification We ensure that information ownership is clearly defined We use verified sources and approved storage systems 12

13 IM Requirements Governing documentation for Information Management in all processes Relevant to end user Plan information handling Perform and complete information handling Relevant to information owner Maintain information Relevant to process owner and line manager Identify business critical information 13

14 Identification of business critical information Business critical information shall be identified to be able to: Prioritize information types Monitor the right information A supporting tool has been developed for identification of business critical information 14

15 Information criticality analysis How Information must be grouped into information types (at a high enough level) Follow the business process and identify information types used as input or created on sub-process level For each information type the degree of criticality must be set for six different categories/effects In addition information security classification and IT system where information resides should be assessed If necessary several iterations can be done, breaking down information types to a more detailed level 15

16 Effects considered in the analysis Support decision making and management control Information critical input to decision making and used as basis for performance, monitoring and control activities at different levels in the organisation Comply with legal, regulatory and contractual obligations Information critical to comply with legal, regulatory, contractual obligations and operating. Information critical to keep evidence of business transactions to ensure legislative preparedness Meet financial targets Information critical to manage transactions, contracts and customers and other assets, to prevent unforeseen costs, fraud, theft and lost interest Prohibit harm to staff, society or environment Information critical to prohibit harm to environment, society and staff, to ensure sustainability and company reputation Maintain operational efficiency Information critical for operational activities and to avoid loss of competitiveness e.g. delays in the introduction of new production capabilities, products or services Ensure essential learning and experience transfer Information critical to support essential learning and experience transfer and to drive innovation and new ideas 16

17 Example from Supply Chain Management Information type 1 Information type 2 Information type 3 17

18 18

19 How to apply analysis results examples Monitoring Give scope and directions for information monitoring and compliance activities Information systems projects Provide basis for how to prioritize need for system tailoring and configuration Retention and archiving Include retention requirements and used as basis for archiving of information types and retention policies Availability Include availability requirements to information types and provide basis for Service Level Agreements Information asset repository Output of analysis listed in a common repository providing overview of the companies most important information assets 19

20 Summary Management of information as a key strategic asset, - basis for the enterprise approach to Information Management Ensure that we prioritize and target our information management efforts where they are needed according to our business strategy and ambition Tool for identification of business critical information developed to operationalize and support the overall direction 20

21 Comments or questions? 21

22 Enterprise Information Management and Governance in Statoil Liv Stordahl Borud Senior Analyst IT Solutions 22

The oil fields in the NCS are located in the North Sea, Norwegian Sea, and Barents Sea.

The oil fields in the NCS are located in the North Sea, Norwegian Sea, and Barents Sea. A.2 Norway Volumes of Associated Gas Flared on Norwegian Continental Shelf Norway is a major oil producer, and its oil fields are located offshore in the Norwegian Continental Shelf (NCS). 81 In 2002,

More information

Governance and Management of Information Security

Governance and Management of Information Security Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information

More information

Individuals affected by the breach How many individuals are affected by the breach? Who was affected by the breach: employees, public, contractors, clients, service providers, other organizations? Foreseeable

More information

Digital Continuity in ICT Services Procurement and Contract Management

Digital Continuity in ICT Services Procurement and Contract Management Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage

More information

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 5/07. NHSCR s quality assurance procedures

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 5/07. NHSCR s quality assurance procedures General Register Office for Scotland information about Scotland s people Paper NHSCR GB 5/07 NHSCR s quality assurance procedures November 2007 NHSCR SCOTLAND INFORMATION GOVERNANCE STANDARDS Author: Muriel

More information

Natural Capital what do accountants think?

Natural Capital what do accountants think? Natural Capital what do accountants think? ACCA_Natural Capital_ExecSumm.indd 1 5/11/12 15:05:12 Introduction During 2012 ACCA, in partnership with KPMG and Fauna and Flora International (FFI), published

More information

Outsourcing and third party access

Outsourcing and third party access Outsourcing and third party access This document is part of the UCISA Information Security Toolkit providing guidance on the policies and processes needed to implement an organisational information security

More information

University of Sunderland Business Assurance. Over-arching Information Governance Policy. Document Classification: Public

University of Sunderland Business Assurance. Over-arching Information Governance Policy. Document Classification: Public University of Sunderland Business Assurance Over-arching Information Governance Policy Document Classification: Public Policy Reference Central Register IG001 Policy Reference Faculty / Service IG 001

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

Health, Security, Safety and Environment (HSE)

Health, Security, Safety and Environment (HSE) Health, Security, Safety and Environment (HSE) Content: 1 Objective 2 Application and Scope 21 Application of HSE Directive with underlying documents 22 Scope of HSE Management system 3 Framework for our

More information

Cloud Storage Policy (Draft for consultation)

Cloud Storage Policy (Draft for consultation) (Draft for consultation) Please note that this draft is under consultation with stakeholders in colleges and university services, before refinement and approval by the appropriate University Committee.

More information

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

REGULATIONS FOR THE SECURITY OF INTERNET BANKING REGULATIONS FOR THE SECURITY OF INTERNET BANKING PAYMENT SYSTEMS DEPARTMENT STATE BANK OF PAKISTAN Table of Contents PREFACE... 3 DEFINITIONS... 4 1. SCOPE OF THE REGULATIONS... 6 2. INTERNET BANKING SECURITY

More information

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager

Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security

More information

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks; Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document

More information

Data Governance Primer. A PPDM Workshop. March 2015

Data Governance Primer. A PPDM Workshop. March 2015 Data Governance Primer A PPDM Workshop March 2015 Agenda - SETTING THE STAGE - DATA GOVERNANCE BASICS - METHODOLOGY - KEYS TO SUCCESS Copyright 2015 Noah Consulting LLC. All Rights Reserved. Industry Drivers

More information

Risk Management Policy and Framework

Risk Management Policy and Framework Risk Management Policy and Framework December 2014 phone 1300 360 605 08 89589500 email info@centraldesert.nt.gov.au location 1Bagot Street Alice Springs NT 0870 post PO Box 2257 Alice Springs NT 0871

More information

PRIVACY BREACH MANAGEMENT POLICY

PRIVACY BREACH MANAGEMENT POLICY PRIVACY BREACH MANAGEMENT POLICY DM Approval: Effective Date: October 1, 2014 GENERAL INFORMATION Under the Access to Information and Protection of Privacy Act (ATIPP Act) public bodies such as the Department

More information

IT Governance: Guidelines for Directors

IT Governance: Guidelines for Directors Brochure More information from http://www.researchandmarkets.com/reports/1530872/ IT Governance: Guidelines for Directors Description: IT is far too important to be left to the IT department! Your business

More information

Step to the future Life Cycle Information

Step to the future Life Cycle Information Step to the future Life Cycle Information LCI Leader Marianne Kalvenes/Mona Nøstvold Classification: Open STEP projects improving our efficiency End-to-end well delivery Standard well design, equipment

More information

Information Integrity & Data Management

Information Integrity & Data Management Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is

More information

Washington State s Use of the IBM Data Governance Unified Process Best Practices

Washington State s Use of the IBM Data Governance Unified Process Best Practices STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,

More information

Combining the power of content and process with the right content management solution. IBM Information Management software

Combining the power of content and process with the right content management solution. IBM Information Management software May 2008 IBM Information Management software Combining the power of content and process with the right content management solution 2 Choosing the right data warehouse One of your organization s most valuable

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

Email Management & Adoption

Email Management & Adoption Email Management & Adoption Peter Buck Managing Director pbuck@hbrconsulting.com 2014 HBR CONSULTING LLC. All rights reserved. Productivity Drivers I worry that I might misplace client materials, between

More information

IBM Software Four steps to a proactive big data security and privacy strategy

IBM Software Four steps to a proactive big data security and privacy strategy Four steps to a proactive big data security and privacy strategy Elevate data security to the boardroom agenda Contents 2 Introduction You ve probably heard the saying Data is the new oil. Just as raw

More information

ARMA Houston Chapter Spring Seminar April 25, 2012

ARMA Houston Chapter Spring Seminar April 25, 2012 Spring Seminar 2012 Spring Conference in Implementing Electronic Information Management Jim Coulson, Partner CCIM Consulting LLC Agenda The Gathering Opportunity 1. What is the Opportunity and are you

More information

Solutions and IT services for Oil-Gas & Energy markets

Solutions and IT services for Oil-Gas & Energy markets Solutions and IT services for The context Companies operating in the Oil-Gas & Energy sectors are facing radical changes that have a significant impact on their business processes. In this context, compliance

More information

Finansinspektionen s Regulatory Code

Finansinspektionen s Regulatory Code Finansinspektionen s Regulatory Code Publisher: Finansinspektionen, Sweden, www.fi.se ISSN 1102-7460 This translation is furnished for information purposes only and is not itself a legal document. Finansinspektionen's

More information

Quality & Safety Manual

Quality & Safety Manual Purpose: This Quality & Safety Manual is intended to clarify and document the Quality and Health & Safety policies of GGS Oil and Gas Systems and to describe how the organization organizes its activities

More information

Solvency II. PwC. *connected thinking. Solvency II GAP-analysis: practical experience (life and non-life business)

Solvency II. PwC. *connected thinking. Solvency II GAP-analysis: practical experience (life and non-life business) Solvency II Solvency II GAP-analysis: practical experience (life and non-life business) *connected thinking PwC Decide ambition level for Solvency II Business use Standard model, Total eller partiel Optimizing

More information

Sytorus Information Security Assessment Overview

Sytorus Information Security Assessment Overview Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)

More information

JOB DESCRIPTION. IS teams, Hanover colleagues, third party suppliers. Principal Duties and Responsibilities

JOB DESCRIPTION. IS teams, Hanover colleagues, third party suppliers. Principal Duties and Responsibilities JOB DESCRIPTION Job title: IT Security Analyst Grade: Responsible to: Responsible for: Liaises with: Head of IS N/A IS teams, Hanover colleagues, third party suppliers Role Purpose: Location: The purpose

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

Guidance on data security breach management

Guidance on data security breach management Guidance on data security breach management Organisations which process personal data must take appropriate measures against unauthorised or unlawful processing and against accidental loss, destruction

More information

APES 325 Risk Management for Firms

APES 325 Risk Management for Firms APES 325 Risk Management for Firms Prepared and issued by Accounting Professional & Ethical Standards Board Limited ISSUED: December 2011 Copyright 2011 Accounting Professional & Ethical Standards Board

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure?

Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? SOLUTION BRIEF: CA INFORMATION GOVERNANCE Can CA Information Governance help us protect and manage our information throughout its life cycle and reduce our risk exposure? CA Information Governance delivers

More information

Symantec Enterprise Vault for Lotus Domino

Symantec Enterprise Vault for Lotus Domino Symantec Enterprise Vault for Lotus Domino Store, Manage and Discover Critical Business Information Overview Industry-leading email archiving for Lotus Domino With the recognition that email has become

More information

U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER

U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER U & D COAL LIMITED A.C.N. 165 894 806 BOARD CHARTER As at 31 March 2014 BOARD CHARTER Contents 1. Role of the Board... 4 2. Responsibilities of the Board... 4 2.1 Board responsibilities... 4 2.2 Executive

More information

2 Badger Explorer ASA - 2Q 2007

2 Badger Explorer ASA - 2Q 2007 Quarterly Report 2Q 2007 2 Badger Explorer ASA - 2Q 2007 SUMMARY The development, construction and testing of Badger Explorer progresses with test results as expected. During 2Q 2007 the full scale onshore

More information

2013 Statutory report

2013 Statutory report 2013 Statutory report ANNUAL 2013 REPORT /2013 Statutory report in accordance with Norwegian authority requirements Statoil 2014 STATOIL ASA BOX 8500 NO-4035 STAVANGER NORWAY TELEPHONE: +47 51 99 00 00

More information

POLICY. Number: 7311-10-005 Title: Enterprise Risk Management. Authorization

POLICY. Number: 7311-10-005 Title: Enterprise Risk Management. Authorization POLICY Number: 7311-10-005 Title: Enterprise Risk Management Authorization [ ] President and CEO [ X] Vice President, Finance and Corporate Services Source: Director, Enterprise Risk Management Cross Index:

More information

Energy: Price Comparison Tools BEUC response to the CEER public consultation on the draft advice on Price Comparison Tools

Energy: Price Comparison Tools BEUC response to the CEER public consultation on the draft advice on Price Comparison Tools Energy: Price Comparison Tools BEUC response to the CEER public consultation on the draft advice on Price Comparison Tools Contact: Guillermo Beltrà energy@beuc.eu Ref.: X/2012/003-17/01/12 Recommendation

More information

Third Party Security Requirements Policy

Third Party Security Requirements Policy Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,

More information

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments. Security solutions White paper Acquire a global view of your organization s security state: the importance of security assessments. April 2007 2 Contents 2 Overview 3 Why conduct security assessments?

More information

Location of the job: CFO Revenue Assurance

Location of the job: CFO Revenue Assurance JOB PROFILE Title of position: Manager: Revenue Assurance Operations Number of subordinates: 5-10 Location of the job: CFO Revenue Assurance Level: 3 Position Code: Time span: 2-3 years Key Performance

More information

Guidance on data security breach management

Guidance on data security breach management ICO lo Guidance on data security breach management Data Protection Act Contents... 1 Data Protection Act... 1 Overview... 1 Containment and recovery... 2 Assessing the risks... 3 Notification of breaches...

More information

A Changing Commission: How it affects you - Issue 1

A Changing Commission: How it affects you - Issue 1 A Changing Commission: How it affects you - Issue 1 Contents Overview... 3 Change Programme... 4 Introduction... 4 Reviewing how we regulate and engage... 4 What are the key changes... 5 What does it mean

More information

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I.

Policy Statement. Employee privacy, data protection and human resources. Prepared by the Commission on E-Business, IT and Telecoms. I. International Chamber of Commerce The world business organization Policy Statement Employee privacy, data protection and human resources Prepared by the Commission on E-Business, IT and Telecoms I. Introduction

More information

The Impact of HIPAA and HITECH

The Impact of HIPAA and HITECH The Health Insurance Portability & Accountability Act (HIPAA), enacted 8/21/96, was created to protect the use, storage and transmission of patients healthcare information. This protects all forms of patients

More information

Procedure for Managing a Privacy Breach

Procedure for Managing a Privacy Breach Procedure for Managing a Privacy Breach (From the Privacy Policy and Procedures available at: http://www.mun.ca/policy/site/view/index.php?privacy ) A privacy breach occurs when there is unauthorized access

More information

Outbound Email Security and Content Compliance in Today s Enterprise, 2005

Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,

More information

Data Governance Policy. Version 2.0 19 October 2015

Data Governance Policy. Version 2.0 19 October 2015 Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage

More information

IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS

IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS IRM CERTIFICATE AND DIPLOMA OUTLINE SYLLABUS 1 Module 1: Principles of Risk and Risk Management Module aims The aim of this module is to provide an introduction to the principles and concepts of risk and

More information

Data Security Breach Management - A Guide

Data Security Breach Management - A Guide DATA PROTECTION (JERSEY) LAW 2005 GUIDANCE ON DATA SECURITY BREACH MANAGEMENT GD21 2 DATA PROTECTION (JERSEY) LAW 2005: GUIDANCE ON DATA SECURITY BREACH MANAGEMENT Introduction Organisations which process

More information

Department of Information and Technology Management

Department of Information and Technology Management INFOTEC Overview Department of Information and Technology Management Introduction The Information and Technology Management Department (INFOTEC) is responsible for providing modern, secure, fit for purpose

More information

Information Management Advice 39 Developing an Information Asset Register

Information Management Advice 39 Developing an Information Asset Register Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if

More information

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public

WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...

More information

Supply Chain Impacts Measuring and Managing Environmental Impacts for Higher Education

Supply Chain Impacts Measuring and Managing Environmental Impacts for Higher Education Supply Chain Impacts Measuring and Managing Environmental Impacts for Higher Education Kathy Lindahl Assistant Vice President for Finance & Operations Michigan State University Kim Kokenakes Director of

More information

Implementation progress of the EASEE-gas Common Business Practices (CBP's)

Implementation progress of the EASEE-gas Common Business Practices (CBP's) 1 Implementation progress of the EASEE-gas Common Business Practices (CBP's) 1. Introduction The European Association for the Streamlining of Energy Exchange-gas, or EASEE-gas, was established on March

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

ISO 27002:2013 Version Change Summary

ISO 27002:2013 Version Change Summary Information Shield www.informationshield.com 888.641.0500 sales@informationshield.com Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category

More information

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security

SECURITY ORGANISATION Security Awareness and the Five Aspects of Security SECURITY ORGANISATION Security Awareness and the Five Aspects of Security Shift Security simply used to protect information vs. Enabling business initiatives with security Bolt-on/add-on structure to business

More information

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS

TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS TECHNOLOGY PARTNER CERTIFICATION BENEFITS AND PROCESS BUSINESS BENEFITS Use of the Certified Partner seal and the Secured by RSA brand on product packaging and advertising Exposure in the Secured by RSA

More information

CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value. May 2012.

CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value. May 2012. CRO Forum Paper on the Own Risk and Solvency Assessment (ORSA): Leveraging regulatory requirements to generate value May 2012 May 2012 1 1. Introduction 1.1. Purpose of the paper In this discussion paper

More information

IBM CommonStore email Archiving Preload Solution

IBM CommonStore email Archiving Preload Solution Designed to simplify e-mail archiving to help support data protection, governance and compliance IBM CommonStore email Archiving Preload Solution Highlights This solution can help small to This end-to-end

More information

Information Security Management Systems

Information Security Management Systems Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector

More information

GUIDANCE PAPER No. 2 ON CORPORATE GOVERNANCE IN INSURANCE COMPANIES

GUIDANCE PAPER No. 2 ON CORPORATE GOVERNANCE IN INSURANCE COMPANIES In order to foster more efficient management and supervision of insurers, in line with the core principles of insurance supervision promoted by the International Association of Insurance Supervisors (IAIS),

More information

Data Security: Fight Insider Threats & Protect Your Sensitive Data

Data Security: Fight Insider Threats & Protect Your Sensitive Data Data Security: Fight Insider Threats & Protect Your Sensitive Data Marco Ercolani Agenda Data is challenging to secure A look at security incidents Cost of a Data Breach Data Governance and Security Understand

More information

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY

ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,

More information

Building an Effective Business Architecture & Metrics Capability

Building an Effective Business Architecture & Metrics Capability Building an Effective Business Architecture & Metrics Capability Building an effective business architecture capability is fundamentally about organisational change management. A siloed business architecture

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester

More information

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME:

case study Core Security Technologies Summary Introductory Overview ORGANIZATION: PROJECT NAME: The Computerworld Honors Program Summary developed the first comprehensive penetration testing product for accurately identifying and exploiting specific network vulnerabilities. Until recently, organizations

More information

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the

More information

Quality Programs for Regulatory Compliance

Quality Programs for Regulatory Compliance Quality Programs for Regulatory Compliance Roy Garris, IconATG Regulatory Compliance Practice Manager (866) 785-4266 http://www.iconatg.com info@iconatg.com Version 1.00 Application Vulnerabilities Put

More information

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

Data Privacy and Gramm- Leach-Bliley Act Section 501(b) Data Privacy and Gramm- Leach-Bliley Act Section 501(b) October 2007 2007 Enterprise Risk Management, Inc. Agenda Introduction and Fundamentals Gramm-Leach-Bliley Act, Section 501(b) GLBA Life Cycle Enforcement

More information

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014 Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues Palace Hotel Saigon, HCMC, November 19 th 2014 Cyber Security and Supply Chain Integrity as Risk Factors

More information

Customer Experience Functional Lead - BaseCamp. Business Change Manager

Customer Experience Functional Lead - BaseCamp. Business Change Manager Position Profile Position: Customer Experience Functional Lead - BaseCamp Position Incumbent: Company: Location: Reporting to: Meridian Energy Christchurch Business Change Manager Date: December 2008 This

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Applications & Operations - Resource Stewardship & Major Projects

Applications & Operations - Resource Stewardship & Major Projects Temporary GIS Technician (12 Months) BC Oil & Gas Commission, Fort St John Grid 18 - $55,294.14 - $62,886.67* * Posted salary includes a JFMM Allowance of 10% & a Location Allowance of 3% Applications

More information

OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable)

OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) OH&S MANAGEMENT SYSTEM CHECKLIST - AS 4801:2001 (STATUS A = Acceptable; N = Not Acceptable; N/A = Not Applicable) 4.1 General Requirements 4.2 OHS policy Has the organisation an established and maintained

More information

Information Security Controls for Website Development and Hosting

Information Security Controls for Website Development and Hosting Information Security Controls for Website Development and Hosting Version: 1.0 Author: ictqatar Classification: Internal Date of Issue: 18 th August 2011 Information Security Controls for Website Hosting

More information

EA-ISP-001 Information Security Policy

EA-ISP-001 Information Security Policy Technology & Information Services EA-ISP-001 Information Security Policy Owner: Adrian Hollister Author: Paul Ferrier Date: 13/03/2015 Document Security Level: PUBLIC Document Version: 2.41 Document Ref:

More information

Henkel s Compliance Management System (CMS)

Henkel s Compliance Management System (CMS) Henkel s Compliance Management System (CMS) As a company that operates in an ethically and legally correct manner, Henkel s image and reputation is inseparable from the appropriate conduct of each of its

More information

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open

Protective Monitoring as a Service. Lot 4 - Specialist Cloud Services. Version: 1.0, Issue Date: 05/02/201405/02/2014. Classification: Open Protective Monitoring as a Service Version: 1.0, Issue Date: 05/02/201405/02/2014 Classification: Open Classification: Open ii MDS Technologies Ltd 2014. Other than for the sole purpose of evaluating this

More information

Information Management Policy London Borough of Barnet

Information Management Policy London Borough of Barnet Information Management Policy London Borough of Barnet DATA PROTECTION 11 Information Management Policy - Unrestricted Document Control Document Description Version V.03 Date Created September 2010 Information

More information

Information and Compliance Management Information Management Policy

Information and Compliance Management Information Management Policy Aurora Energy Group Information Management Policy Information and Compliance Management Information Management Policy Version History REV NO. DATE REVISION DESCRIPTION APPROVAL 1 11/03/2011 Revision and

More information

Pay As You Go, File System Archiving and Storage

Pay As You Go, File System Archiving and Storage Pay-as-you-go ILM Service Pay-as-you-go email & file system data archiving for business Secure business data through automated backup and restore Pay-as-you-go ILM Service Take control of your data don

More information

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM

POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM W H I T E P A P E R POLICY ISSUES IN E-COMMERCE APPLICATIONS: ELECTRONIC RECORD AND SIGNATURE COMPLIANCE FDA 21 CFR 11 ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives

More information

Scope 2 Accounting Guidance: What it means for corporate decisions to purchase environmental instruments

Scope 2 Accounting Guidance: What it means for corporate decisions to purchase environmental instruments Scope 2 Accounting Guidance: What it means for corporate decisions to purchase environmental instruments January 2015 Corporate Scope 2 accounting has traditionally been relatively straight forward. Common

More information

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards

General Register Office for Scotland information about Scotland s people. Paper NHSCR GB 1/08. NHSCR Scotland Information Governance Standards General Register Office for Scotland information about Scotland s people Paper NHSCR GB 1/08 NHSCR Scotland Information Governance s This is a draft on which the Board s comments would be welcome. Contents

More information

Subsea - a key area for the industry Vekst i vest Florø, 03.10.2013 Johan Kr Mikkelsen. STL-Vekst i Vest-131003-131002.pptx

Subsea - a key area for the industry Vekst i vest Florø, 03.10.2013 Johan Kr Mikkelsen. STL-Vekst i Vest-131003-131002.pptx Subsea - a key area for the industry Vekst i vest Florø, 03.10.2013 Johan Kr Mikkelsen 0 A strategy for superior profitability and growth 1 mill boepd We have a long term perspective on the NCS 4 3 Industrialisation

More information

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...

Part A OVERVIEW...1. 1. Introduction...1. 2. Applicability...2. 3. Legal Provision...2. Part B SOUND DATA MANAGEMENT AND MIS PRACTICES... Part A OVERVIEW...1 1. Introduction...1 2. Applicability...2 3. Legal Provision...2 Part B SOUND DATA MANAGEMENT AND MIS PRACTICES...3 4. Guiding Principles...3 Part C IMPLEMENTATION...13 5. Implementation

More information

Background. When the Government Is the Landlord. 1 Norway's oil and gas reserves are all offshore.

Background. When the Government Is the Landlord. 1 Norway's oil and gas reserves are all offshore. Regional Details: Norway In this appendix, we describe the methods the government uses to obtain revenues from oil and gas production in Norway. We present quantitative estimates of revenues as well as

More information

Records Management and SharePoint 2013

Records Management and SharePoint 2013 Records Management and SharePoint 2013 SHAREPOINT MANAGEMENT, ARCHITECTURE AND DESIGN Bob Mixon Senior SharePoint Architect, Information Architect, Project Manager Copyright Protected by 2013, 2014. Bob

More information

Webinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015

Webinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015 Webinar Questions Local Government Data Security Help Improve Your Compliance, 30 July 2015 Here are the answers to the questions we were asked during the webinar. There are a few questions we are still

More information

Job Number: 350002 ROLE DESCRIPTION

Job Number: 350002 ROLE DESCRIPTION Job Number: 350002 ROLE DESCRIPTION Role Title: Senior Advisor Records Management Number and Title of Direct Reports: (2) Directorate: Corporate Services Budget: NIL Reports to: Team Leader Business Support

More information