Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER

Size: px
Start display at page:

Download "Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER"

Transcription

1 Data Lifecycle Management and Information Governance A DOCULABS WHITE PAPER

2 How do you purge your data? Are your data management practices in compliance with recordkeeping conventions and with legal standards? This white paper reports some surprising findings about how organizations approach data lifecycle management, discusses its impact on information governance, and offers recommendations for how to improve. [Type here]

3 Survey Overview Doculabs recently partnered with Executive Functions Management, Inc. (EFM) to develop and issue a survey to the EFM membership, which is made up of IT leaders at organizations of all sizes, from across all industries. The goal of the survey was to investigate how firms are governing the lifecycle and disposal of the data they generate. The questions ranged from how IT leaders manage, pay for, and cost their applications and storage, to what policies are in place for domains such as information security and records management, to whether they currently tier or purge data and whether they charge back to the business for services. We received 480 responses to the survey, with the respondents representing 432 organizations across a wide range of industries and of all sizes (see Figures 1 and 2). Figure 1: Respondents by Industry 3

4 Figure 2: Respondents by Firm Size Although there were many interesting points in the responses, in this white paper we re going to drill down into one issue in particular: how firms reported that they purge (or don t purge) data. Doculabs believes that where firms stand on this issue has significant consequences for their ability to adhere to core corporate compliance requirements and also has a direct impact on a company s legal and compliance risk profile. How a company purges its data has implications for its ability to meet compliance requirements as well having an impact on the company s risk profile. 4

5 Data Management Is a Compliance Issue Among the questions we asked was how our respondents companies purge data after it has passed its legal or operational life (see Figure 3). Figure 3: How Do You Purge Data that Has Passed Its Legal or Operational Life? At first glance, the response to this question seems to paint a fairly rosy picture of how organizations are purging data: Fully 70 percent of respondents reported that they purge in some way, with 25 percent reporting that they don t purge at all (5 percent were not sure whether they do or not). For all the keep everything forever, digital landfill doom and gloom we hear out there, this sounds pretty good. That is, until you look at the nature of the purging that s going on. Only one-third of respondents reported doing regular purging, whether automated (21 percent) or manual (12 percent). The rest reported purging on an ad hoc basis, whether automated (10 percent) or manual (26 percent). Considered from the perspective of records management and e- discovery, these percentages should give us pause. If a firm is purging on anything other than a regular basis and according to published policies and procedures, they re not compliant either with recordkeeping conventions or with the ways judges have tended to interpret the Federal Rules of Civil Procedure (FRCP) to apply to corporations. Ad hoc purging is risky because the courts typically regard it as capricious in that it doesn t follow established policies and procedures that provide an audit trail. Even if ad hoc purging doesn t lead to spoliation in a given case, the point is that it could have, because the organization didn t have controls in place to protect against it. 5

6 So what these numbers from our survey question suggest is that twothirds of respondents are not compliant with either recordkeeping conventions or the FRCP a very big number. We decided to do a more detailed analysis of how the responses to this particular question correlate to other questions in the survey, to see whether we could infer anything about why firms approach purging data the way they do, and what factors might contribute positively or negatively to their ability to be compliant in how they manage their data. Fully two-thirds of respondents to our survey reported that their organizations are not purging data regularly and therefore are not in compliance with good recordkeeping practices or with the FRCP. 6

7 Technology Usage A potentially important factor in whether and how organizations purge is the technology capabilities they have in place i.e. do they have in place the tools that would facilitate regular purging of data? For this survey, we asked participants about six categories of technology: Enterprise Content Management (ECM) Records Management (RM) Data Archiving (Application Level) Data Archiving (Across All Applications) Structured Application Decommissioning Unstructured Application Decommissioning We then analyzed the data according to respondents reported approach to data purging, looking to see the extent to which respondents in each group also made use of any of these technologies. For ECM and RM, respondents in all categories reported high usage (see Figures 4 and 5), which suggests that there isn t a strong correlation between having these technology capabilities and whether and how organizations purge. Figure 4: ECM Technology Usage But what s worth remarking is that 67 percent of those who report that they don t purge also report that they use RM tools moderately to extensively. The main value of RM tools is to allow organizations to retain documents and data for the time required by laws and regulations, and then purge them after their legal and operational usefulness is past so it s hard to imagine what these organizations are doing when they use RM tools if they re not purging data, i.e. if they are in effect keeping everything forever. 7

8 Figure 5: RM Technology Usage For data archiving tools, we found more disparity in how firms were leveraging these capabilities. For data archiving by application (i.e. within a single application), most firms are doing well, with 62 percent to 86 percent of firms reporting that they archive by application (see Figure 6). The outliers were firms that reported that they don t purge: Only 49 percent of them are archiving data by application. Figure 6: Data Archiving by Application For data archiving across all applications, the picture is substantially the same, but at lower levels across the board: 55 percent to 73 percent for most firms and 39 percent for firms that reported that they didn t purge (see Figure 7). 8

9 Figure 7: Data Archiving Across Applications When we turn to application decommissioning, however, the discrepancy between those who don t purge and those who do becomes more pronounced (see Figures 8 and 9). For both structured and unstructured application decommissioning, 78 percent and 71 percent respectively of those who reported that their organizations don t purge data also don t leverage application decommissioning tools. But overall, the number of firms who report using structured application decommissioning tools is low. Organizations that are purging using automated tools (whether ad hoc or regularly) reported the highest use of structured application decommissioning tools (54 percent and 57 percent, respectively). Figure 8: Structured Application Decommissioning 9

10 For unstructured application decommissioning, the glaring standouts are firms that purge on an ad hoc basis using automated tools: 73 percent of them reported using unstructured application decommissioning tools moderately or extensively, compared to a range of 29 percent to 58 percent for the rest of the respondents. Figure 9: Unstructured Application Decommissioning 10

11 Governance Maturity Next we looked at what we could discern about the respondent firms maturity of governance structures. After all, the technology capabilities we just discussed are hard pressed to deliver value if the organization does not have the people/process controls in place to leverage those capabilities adequately. We asked respondents to tell us how strongly they had governance in place around four domains: Records Management Regulatory Compliance Information Security /Privacy Disaster Recovery/Business Continuity (DR/BC) Let s look at each of these in more detail. Records Management There was a significant correlation between those firms which reported having a moderate to strong Records Management (RM) function and those who purge, whether ad hoc or on a regular basis (see Figure 10). Not surprisingly, those firms who reported that they have no or weak RM were the same firms which reported that they don t purge data. After all, without clear guidance on what corporate data needs to be kept and for how long, purging is difficult, if not impossible. And left to their own devices without guidance from RM, IT will tend to keep everything forever to avoid the risk of either deleting something the business needs or spoliation of data on legal hold. Figure 10: Records Management Maturity But if we look more closely at the firms that report having moderate to strong RM, 38 percent of those firms also reported that they don t purge data. As with the high number of firms that reported having moderate to strong use of RM tools yet didn t purge data, there s a disconnect here between the aims and goals of an RM program (retaining data for the amount of time required by the law and then disposing of it) and on-the-ground practices (keeping everything forever). The responses showed no correlation, however, between those who had moderate to strong RM and regular versus ad hoc purging. It seems the kind of purging was less significant than that they purged. 11

12 Regulatory Compliance The reported rates of moderate to strong regulatory compliance were high across all categories, no matter how firms reported they purged data (see Figure 11). This isn t surprising, given the importance of regulatory compliance for firms of all sizes across industries. However, those who reported purging using automated tools (whether regularly or ad hoc) reported 91 percent to 95 percent moderate or strong regulatory compliance, versus 71 percent to 85 percent for firms that purged manually or didn t purge at all. This seems to suggest at least a mild correlation between moderate/strong regulatory compliance and automated purging not surprising, because purging corporate data requires policies and guidelines to provide the framework within which purging can be executed defensibly. Figure 11: Regulatory Compliance Maturity Information Security and Privacy Given the increasing scrutiny of information security and privacy in the aftermath of high-profile data breaches at organizations such as Target, The Home Depot, Premera, Anthem, and CHS, it s not surprising that the reported levels of maturity for information security and privacy are as high as the regulatory numbers we saw in the previous subsection. And, as with regulatory compliance, those firms that reported they didn t purge data had a higher incidence of no or weak information security and privacy compliance than other firms: 29 percent versus 8 percent to 22 percent. Similar to the discussion of regulatory compliance above, we believe the correlation likely has a similar basis: I.e. good information security and privacy policies and controls in place (1) enable IT to purge data without fear of doing something wrong and also (2) encourage IT to do so in order to comply with corporate policies and standards. 12

13 Figure 12: Information Security and Privacy Compliance Maturity Disaster Recovery and Business Continuity Disaster recovery and business continuity (DR/BC) is a critical business capability; without it, an organization is at risk for disruptions to operations from a range of potential threats: so-called acts of God, terrorism, hardware and software failure, criminal activity, etc. So it s not surprising that respondents in general reported having high levels of DR/BC controls in place. Again, the outliers were those firms that reported either that they didn t purge or that they purged manually on an ad hoc basis. These two categories reported that they had no or weak DR/BC in 41 percent and 47 percent of cases, respectively. Firms that regularly purge or that purge on an ad hoc basis but with automated tools reported moderate to strong DR/BC in 71 percent to 85 percent of cases. Figure 13: Disaster Recovery and Business Continuity Maturity 13

14 Potential Incentives to Purge Data Getting buy-in to purge data that s passed its legal or operational life sometimes requires incentives. And the incentives that get the most attention are the ones that have an impact on costs. Here, we look at two areas of potential opportunity to incent business units to regularly purge their data: chargeback models and data center models. Chargeback Models Chargeback refers to IT billing its internal corporate customers for the products and service it provides on a granular, service-based model (e.g. per gigabyte of storage, per user of an application, etc.). In addition to chargeback, there are two other approaches to billing internal customers for IT products and services: Fixed fee: charging each business unit a percentage of total IT spend; can be straight, i.e. divide IT spend by number of cost centers; or variable, i.e. based on number of FTEs within each cost center Percentage of budget: charging each business unit a percentage of total IT spend, based on what percentage of total corporate spend that unit s divisional budget represents Without getting into a detailed discussion of the pros and cons of IT costing models, suffice it to say that, as incentives for data purging, neither the fixed fee nor the percentage of budget model is effective at encouraging business units to take ownership of data and purge it once its legal and operational usefulness is done. This is because at most organizations the cost of IT storage is tied to the total number of business units, the total number of FTEs, or the total departmental spend, so purging data and thereby reducing the volume of data IT manages for an individual business unit doesn t lower the money that particular business unit spends on IT. In fact, it actually increases the unit cost per gigabyte: For example, if a business unit has 10 TB of data and spends $10,000 per year with IT for it, when they purge half of it (and still pay $10,000 per year), their unit cost has doubled; but if they double their volume of data, their unit cost drops by 50 percent. Despite the compelling reasons for using chargeback, very few firms surveyed reported using either approach. Across all firms, the range was 16 percent to 32 percent. However, when we dig in to the results, we see some significant differences. Those who do regular, automated purging top this list of chargeback, at 32 percent. Those doing regular manual purging placed second, with 22 percent reporting that they chargeback. The remaining firms reported levels of chargeback of less than 20 percent. 14

15 Figure 14: Chargeback Models in Use Data Center Operational Model Third-party hosting of a corporate data center can be a powerful incentive to purge data, because many contracts for data center hosting include volume pricing i.e. a price per gigabyte per month. So if IT reduces the volume of content, its monthly costs go down a direct line between purging and operational costs. However, the respondents to this survey overwhelmingly hosted their own data: a range of from 61 percent to 74 percent host it mostly in house, with 17 percent to 24 percent reporting a hybrid model. Those reporting mostly outsourced data centers fell between 8 percent and 15 percent. Given this, it s not possible to draw a correlation from the survey data about hosting and purging, although intuitively we would assume that per gigabyte pricing would encourage purging. Figure 15: Data Center Hosting 15

16 Conclusion and Recommendations We believe the results of this survey provide the basis for some important conclusions about managing corporate data. Good governance is strongly correlated with regular data purging. Those firms that reported that they didn t purge data also reported that they had weaker records management, information security and privacy, and disaster recovery/ business continuity functions. Purging is strongly correlated with data hygiene in general. Those firms that reported that they didn t purge data also reported significantly lower levels of storage tiering and application decommissioning, possibly as a result of a pervasive culture of corporate hoarding or to an overall lack of discipline in information lifecycle management. Many organizations are not getting the value they should from records management. The high percentage of firms that reported usage of RM tools or moderate to strong RM functions (or both) also reported that they didn t purge data a clear disconnect between the purpose and value of RM and what these firms are actually realizing. Application decommissioning is underutilized relative to its potential returns. Applications are expensive (hardware, software, and FTE to maintain), so the low number of firms overall reporting that they decommission applications suggests that this is an area of opportunity for IT to deliver value to the organization. Given these conclusions, Doculabs recommends the following to firms looking to improve how they manage structured applications and data: Focus on information governance rather than technology. The survey results indicated a much stronger correlation between good data hygiene and good governance than between good data hygiene and technology capabilities. Without clarity and structure around the rules of the road, organizations will struggle to effectively manage their data. Incent good data hygiene with chargeback. If there isn t a direct tie between what a business unit pays for IT and how much data they have (or worse, an inverse relation, as in fixed fee or percentage of budget models), it s going to be difficult to get them to agree to purge their outdated data. It s also difficult for IT to prove the value they add to the organization in managing applications and data. Pursue application decommissioning. Very few firms reported decommissioning applications, so this is a significant opportunity area that has not only big dollar savings, but a positive compliance impact i.e. less outdated data reduces the impact and severity of data breaches and lowers the effort and cost of e-discovery. 16

17 About Doculabs We are experts in social collaboration and content management. We help our clients by delivering highly actionable and comprehensive strategic plans and roadmaps, helping our clients achieve their business goals and create competitive advantage. Our consulting services also help our clients improve their records management and information governance approaches to facilitate compliance, reduce risk, and reduce the cost of e-discovery. Founded in 1993, Doculabs has an established track record in helping its clients bring content under control and improving the ways they collaborate. Our engagements focus on guiding our clients with our expertise, analysis, and in-depth market knowledge. And we re independent; we don t sell software or implementation services, so our clients can be sure that our recommendations are objective. Our consultants are highly experienced, averaging more than 20 years of relevant professional background and many years of working together as part of the Doculabs team. We re recognized thought leaders in the industry, frequent speakers at industry events and webinars, and active contributors to leading publications, social media sites, and organizations such as AIIM. Hundreds of Fortune 1000 organizations and agencies of state and local government have turned to Doculabs for assistance with their information management strategies. For more information about our services, visit the web site at or call (312) About EFM Executive Function Management, Inc. (EFM) was created with a goal of providing strategic-level events and peer networking groups for technology leaders throughout the U.S. EFM offers events for technology leaders that provide an opportunity for select leading-edge suppliers to forge new relationships with IT professionals. EFM s IT Symposium Conferences are annual gatherings that allow CIOs and their senior IT leaders to explore critical business, technology, and leadership strategies and to build a stronger professional peer network and attain real-world knowledge on business changing technology and management solutions. EFM IT Symposiums are currently held in 28 cities across the U.S.

Information Governance 2.0 A DOCULABS WHITE PAPER

Information Governance 2.0 A DOCULABS WHITE PAPER Information Governance 2.0 A DOCULABS WHITE PAPER Information governance is the control of an organization s information to meet its regulatory, litigation, and risk objectives. Effectively managing and

More information

From Shared Drives to SharePoint: A Methodology

From Shared Drives to SharePoint: A Methodology Doculabs White Paper From Shared Drives to SharePoint: A Methodology The problem with shared drives is one of the most significant information management challenges facing corporations today. Gigabytes,

More information

Real World Strategies for Migrating and Decommissioning Legacy Applications

Real World Strategies for Migrating and Decommissioning Legacy Applications Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of

More information

The Role of Microsoft SharePoint in a Records Management Strategy. A Docula bs Wh i te Pa pe r

The Role of Microsoft SharePoint in a Records Management Strategy. A Docula bs Wh i te Pa pe r The Role of Microsoft SharePoint in a Records Management Strategy A Docula bs Wh i te Pa pe r 2009 Doculabs, 200 West Monroe Street, Suite 2050, Chicago, IL 60606 (312) 433-7793 info@doculabs.com. Reproduction

More information

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks;

3. Ensure the management of information is compliant with legislative requirements to maximise the benefits and minimise risks; Enterprise Content Management (ECM) Policy Version Information A. Introduction Purpose 1. Outline and articulate the strategy for enterprise content management across Redland City Council (RCC). This document

More information

Director, Value Engineering

Director, Value Engineering Director, Value Engineering April 25 th, 2012 Copyright OpenText Corporation. All rights reserved. This publication represents proprietary, confidential information pertaining to OpenText product, software

More information

ECM as a Shared Service: The New Frontier

ECM as a Shared Service: The New Frontier Doculabs White Paper: ECM as a Shared Service: The New Frontier Organizations are struggling with the increasing growth of unstructured content: all the word processing files, e-mail, spreadsheets, web

More information

Email Management and Litigation Risk Management

Email Management and Litigation Risk Management Email and Litigation Risk Email is one of the most heavily used applications in every enterprise. But it s also an application that, without proper management, can threaten an organization s future. Just

More information

Enterprise 2.0 and SharePoint 2010

Enterprise 2.0 and SharePoint 2010 Enterprise 2.0 and SharePoint 2010 Doculabs has many clients that are investigating their options for deploying Enterprise 2.0 or social computing capabilities for their organizations. From a technology

More information

Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks

Cohasset Associates, Inc. NOTES. 2014 Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks Understanding Today s Economics of Information Get Your Act Together Now! Sylvan Sibito H Morley III IBM Worldwide Director Information Lifecycle Governance Information Economics: The discipline of analyzing

More information

Managing Information for E-discovery Readiness. A Docula bs Wh i te Pa pe r

Managing Information for E-discovery Readiness. A Docula bs Wh i te Pa pe r Managing Information for E-discovery Readiness A Docula bs Wh i te Pa pe r 2009 Doculabs, 200 West Monroe Street, Suite 2050, Chicago, IL 60606 (312) 433-7793 info@doculabs.com. Reproduction in whole or

More information

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email.

68% Meet compliance needs with Microsoft Exchange. of companies send sensitive data via email. Meet compliance needs with Microsoft Exchange As the volume and importance of digital information grows, regulatory compliance schemas are broadening to encompass an ever-larger share of data that companies

More information

Realizing the ROI of Information Governance. Gregory P. Kosinski Director, Product Marketing EMC

Realizing the ROI of Information Governance. Gregory P. Kosinski Director, Product Marketing EMC Realizing the ROI of Information Governance Gregory P. Kosinski Director, Product Marketing EMC Copyright 2009 2010 EMC Corporation. All rights reserved. 1 2 Just How Important IS this? Technologies That

More information

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist

Beyond Mandates: Getting to Sustainable IT Governance Best Practices. Steve Romero PMP, CISSP, CPM IT Governance Evangelist Beyond Mandates: Getting to Sustainable IT Governance Best Practices Steve Romero PMP, CISSP, CPM IT Governance Evangelist Agenda > IT Governance Definition > IT Governance Principles > IT Governance Decisions

More information

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup

WHITEPAPER. 7 Reasons Why Businesses are Shifting to Cloud Backup WHITEPAPER 7 Reasons Why Businesses are Shifting to Cloud Backup Table of Contents Introduction..1 Internal Resource Efficiency..2 Enhance Security.2 Leverage Deduplication Technology..2 Process Validation

More information

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs

What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management

More information

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance

and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Electronic Record Retention and ediscovery Peter Pepiton ediscovery Product Manager CA Information Governance Agenda What is all this ediscovery buzz? Email is major focus of ESI Impact of New FRCP rules

More information

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Brochure. ECM without borders. HP Enterprise Content Management (ECM) Brochure ECM without borders HP Enterprise Content Management (ECM) HP Enterprise Content Management (ECM) Without question, the volume, variety, and velocity of data across your enterprise create new

More information

The Disconnect Between Legal and IT Teams

The Disconnect Between Legal and IT Teams WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,

More information

Cloud Computing Safe Harbor or Wild West?

Cloud Computing Safe Harbor or Wild West? IT Best Practices Series Cloud Computing Safe Harbor or Wild West? With IT expenditures coming under increasing scrutiny, the cloud is being sold as an oasis of practical solutions. It s true that many

More information

ECM Migration Without Disrupting Your Business: Seven Steps to Effectively Move Your Documents

ECM Migration Without Disrupting Your Business: Seven Steps to Effectively Move Your Documents ECM Migration Without Disrupting Your Business: Seven Steps to Effectively Move Your Documents A White Paper by Zia Consulting, Inc. Planning your ECM migration is just as important as selecting and implementing

More information

Meaning Based Computing: Managing the Avalanche of Unstructured Data

Meaning Based Computing: Managing the Avalanche of Unstructured Data Meaning Based Computing: Managing the Avalanche of Unstructured Data Bill Tolson, Director of Information Governance POWER PROTECT PROMOTE Moving away from structured data Accelerated unstructured information

More information

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it

Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it The Cloud Threat Why Cloud CompuTing ThreaTens midsized enterprises and WhaT To do about it This white paper outlines the concerns that often prevent midsized enterprises from taking advantage of the Cloud.

More information

Six Steps to a Successful Email Migration to Exchange 2013. Step 1: Migration Project Assessment, Planning and Design

Six Steps to a Successful Email Migration to Exchange 2013. Step 1: Migration Project Assessment, Planning and Design Six Steps to a Successful Email Migration to Exchange 2013 Six Steps to a Successful Email Migration to Exchange 2013 Migrating your organization s email to Exchange 2013, whether it be on premises or

More information

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011

More information

Information Retention and ediscovery Survey GLOBAL FINDINGS

Information Retention and ediscovery Survey GLOBAL FINDINGS 2011 Information Retention and ediscovery Survey GLOBAL FINDINGS CONTENTS Introduction... 4 Methodology... 6 Finding 1: There is more to ediscovery than email... 8 Finding 2: Wide variations in information

More information

A Practical Guide to Legacy Application Retirement

A Practical Guide to Legacy Application Retirement White Paper A Practical Guide to Legacy Application Retirement Archiving Data with the Informatica Solution for Application Retirement This document contains Confidential, Proprietary and Trade Secret

More information

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks.

Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. Blind spot Banks are increasingly outsourcing more activities to third parties. But they can t outsource the risks. For anyone familiar with the banking industry, it comes as no surprise that banks are

More information

Why enterprise data archiving is critical in a changing landscape

Why enterprise data archiving is critical in a changing landscape Why enterprise data archiving is critical in a changing landscape Ovum white paper for Informatica SUMMARY Catalyst Ovum view The most successful enterprises manage data as strategic asset. They have complete

More information

Agenda. You are not in the business to manage records

Agenda. You are not in the business to manage records Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records

More information

Whitepaper. Managed Services in the 21 st century

Whitepaper. Managed Services in the 21 st century Whitepaper Managed Services in the 21 st century Managed Services in the 21 st century How to optimise cloud benefits and reduce costs with Hybrid Managed Services One of the great benefits of the cloud

More information

Information Governance in the Cloud

Information Governance in the Cloud Information Governance in the Cloud TABLE OF CONTENTS Executive Summary...3 Information Governance: Building a Trusted Foundation for Business Content...5 The Challenge...5 The Solution....5 Content and

More information

Fundamentals of Information Governance:

Fundamentals of Information Governance: Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different

More information

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec Improving Unstructured Data Governance Ryan Jancaitis Product Management Symantec Agenda 1 2 3 4 Overview Data Management Data Protection and Compliance Summary Unstructured Information Growth Leads to

More information

Designing a Modern, Holistic ECM Strategy for Healthcare. How ECM consulting helps healthcare providers thrive in an atmosphere of change.

Designing a Modern, Holistic ECM Strategy for Healthcare. How ECM consulting helps healthcare providers thrive in an atmosphere of change. Designing a Modern, Holistic ECM Strategy for Healthcare How ECM consulting helps healthcare providers thrive in an atmosphere of change. Executive Summary Today s healthcare industry is undergoing continual

More information

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc.

Asset Management Equipment Redeployment And Termination Services. A Service Offering From Data Center Assistance Group, Inc. DCAG Data Center Assistance Group, Inc. Revision Date: 5/20/2013 Asset Management Redeployment And Termination Services A Service Offering From Data Center Assistance Group, Inc. (DCAG) Prepared by: Thomas

More information

How to Plan and Implement Information Governance

How to Plan and Implement Information Governance Doculabs White Paper: How to Plan and Implement Information Governance Information governance (IG) is the control of information to meet your legal, regulatory, and business risk objectives. The primary

More information

Four Things You Must Do Before Migrating Archive Data to the Cloud

Four Things You Must Do Before Migrating Archive Data to the Cloud Four Things You Must Do Before Migrating Archive Data to the Cloud The amount of archive data that organizations are retaining has expanded rapidly in the last ten years. Since the 2006 amended Federal

More information

Best Practices in Disaster Recovery Planning and Testing

Best Practices in Disaster Recovery Planning and Testing Best Practices in Disaster Recovery Planning and Testing axcient.com 2015. Axcient, Inc. All Rights Reserved. 1 Best Practices in Disaster Recovery Planning and Testing Disaster Recovery plans are widely

More information

ediscovery Solution for Email Archiving

ediscovery Solution for Email Archiving ediscovery Solution for Email Archiving www.sonasoft.com INTRODUCTION Enterprises reliance upon electronic communications continues to grow with increased amounts of information being shared via e mail.

More information

Benchmark Report. Customer Marketing: Sponsored By: 2014 Demand Metric Research Corporation. All Rights Reserved.

Benchmark Report. Customer Marketing: Sponsored By: 2014 Demand Metric Research Corporation. All Rights Reserved. Benchmark Report Customer Marketing: Sponsored By: 2014 Demand Metric Research Corporation. All Rights Reserved. TABLE OF CONTENTS 3 Introduction 18 Customer Marketing Skills 5 Executive Summary 20 The

More information

A Guide to Selecting a Medical Billing Service

A Guide to Selecting a Medical Billing Service BEST PRACTICES: A Guide to Selecting a Medical Billing Service Who should hire a medical billing service? If your practice is increasingly focused on resolving billing issues, leaving less time to dedicate

More information

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011

White. Paper. The SMB Market is Ready for Data Encryption. January, 2011 White Paper The SMB Market is Ready for Data Encryption By Mark Peters January, 2011 This ESG White Paper was commissioned by Tandberg Data and is distributed under license from ESG. 2011, Enterprise Strategy

More information

Compliance Requirements and Social Media Usage: FINRA and SEC

Compliance Requirements and Social Media Usage: FINRA and SEC Compliance Requirements and Social Media Usage: FINRA and SEC About Doculabs 2 Doculabs consultants are experts in enterprise social collaboration and content management. We deliver highly actionable and

More information

GARP and how it helps you achieve better information governance

GARP and how it helps you achieve better information governance E-Guide GARP and how it helps you achieve better information governance Sponsored By: E-Guide GARP and how it helps you achieve better information governance Table of Contents Resources from IBM Sponsored

More information

Employing Best Practices for Mainframe Tape Encryption

Employing Best Practices for Mainframe Tape Encryption WHITE PAPER: DATA ENCRYPTION BEST PRACTICES FOR MAINFRAME TAPE Employing Best Practices for Mainframe Tape Encryption JUNE 2008 Stefan Kochishan CA MAINFRAME PRODUCT MARKETING John Hill CA MAINFRAME PRODUCT

More information

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik

Market Research. Study. Database Security and Compliance Risks. December, 2009. By Jon Oltsik Market Research Study Database Security and Compliance Risks By Jon Oltsik December, 2009 An ESG Market Research Study Sponsored by Application Security, Inc. 2009, Enterprise Strategy Group, Inc. All

More information

Knowledge Capture Voice - Compliance Enabled Call Recording

Knowledge Capture Voice - Compliance Enabled Call Recording Knowledge Capture Voice - Compliance Enabled Call Recording Ever since 1875 when Sir Alexander Graham Bell first invented the telephone people have wanted to record conversations and retrieve them. Whilst

More information

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009

State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN. January 2010 December 2012 DECEMBER 31, 2009 State of Florida ELECTRONIC RECORDKEEPING STRATEGIC PLAN January 2010 December 2012 DECEMBER 31, 2009 Florida Department of State State Library and Archives of Florida 850.245.6750 http://dlis.dos.state.fl.us/recordsmanagers

More information

The Importance of Information Governance and Risk Management

The Importance of Information Governance and Risk Management Information Governance what it is and how it relates to your customers Julie J. Colgan, IGP, CRM 2015 PRISM Annual Conference How much of the world s data was created in the last 2 years? 30% 50% 70% 90%

More information

YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE?

YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE? BEYOND TOOLS: BUSINESS INTELLIGENCE MEETS ANALYTICS YOUR ITAM PROGRAM: TO OUTSOURCE, OR NOT TO OUTSOURCE? Frank Venezia, Siwel Consulting, Inc. Steffani Lomax, Siwel Consulting, Inc. White Paper - September

More information

COMPLIANCE BENEFITS OF SAP ARCHIVING

COMPLIANCE BENEFITS OF SAP ARCHIVING O P E R AT I O NA L A N D COMPLIANCE BENEFITS OF SAP ARCHIVING A article sponsored by EMC Author: Jarad Carleton, Senior Consultant ICT Practice Partnering with clients to create innovative growth strategies

More information

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015 Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information

More information

Guide to Information Governance: A Holistic Approach

Guide to Information Governance: A Holistic Approach E-PAPER DECEMBER 2014 Guide to Information Governance: A Holistic Approach A comprehensive strategy allows agencies to create more reliable processes for ediscovery, increase stakeholder collaboration,

More information

Dublin City University

Dublin City University Asset Management Policy Asset Management Policy Contents Purpose... 1 Scope... 1 Physical Assets... 1 Software Assets... 1 Information Assets... 1 Policies and management... 2 Asset Life Cycle... 2 Asset

More information

KAHN CONSULTING INC.

KAHN CONSULTING INC. A Summary of Findings from User Research on Compliance and Information Management Authored by John F. Mancini President, AIIM International The Emperor s New Clothes: The Current State of Information Management

More information

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Certified Identity and Access Manager (CIAM) Overview & Curriculum Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management

More information

Based on 2008 Survey of 255 Non-IT CEOs/Executives

Based on 2008 Survey of 255 Non-IT CEOs/Executives Based on 2008 Survey of 255 Non-IT CEOs/Executives > 50% Ranked ITG as very important > 75% of businesses consider ITG to be an integral part of enterprise governance, but the overall maturity level is

More information

As databases grow, performance drops, backup and recovery times increase, and storage and infrastructure costs rise.

As databases grow, performance drops, backup and recovery times increase, and storage and infrastructure costs rise. Battling Growth and Staying Compliant Through Oracle Application Archiving Editor s Note: Data bloat can be a disastrous problem. Whether you re an archive administrator or a system user who d like to

More information

Enforce Governance, Risk, and Compliance Programs for Database Data

Enforce Governance, Risk, and Compliance Programs for Database Data Enforce Governance, Risk, and Compliance Programs for Database Data With an Information Lifecycle Management Strategy That Includes Database Archiving, Application Retirement, and Data Masking WHITE PAPER

More information

Software License Asset Management (SLAM) Part 1

Software License Asset Management (SLAM) Part 1 LANDesk White Paper Software License Asset Management (SLAM) Part 1 Five Steps to Reduce Software License Costs and Ensure Audit Preparedness Contents A Software Audit Looms in Your Future.... 3 Overbuying

More information

Microsoft SharePoint and Records Management Compliance

Microsoft SharePoint and Records Management Compliance Microsoft SharePoint and Records Management Compliance White Paper Revision: 2 Date created: 20 February 2015 Principal author: Nigel Carruthers-Taylor, Principal, icognition Reference: 15/678 Summary

More information

Securing The Cloud With Confidence. Opinion Piece

Securing The Cloud With Confidence. Opinion Piece Securing The Cloud With Confidence Opinion Piece 1 Securing the cloud with confidence Contents Introduction 03 Don t outsource what you don t understand 03 Steps towards control 04 Due diligence 04 F-discovery

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

Software Asset Management on System z

Software Asset Management on System z Software Asset Management on System z Mike Zelle Tivoli WW IT Asset Management Marketing SAM in SHARE Project Manager mzelle@us.ibm.com Agenda Why Software Asset Management (SAM) The Discipline of Software

More information

Hosting and cloud services both provide incremental and complementary benefits to the organization

Hosting and cloud services both provide incremental and complementary benefits to the organization 33 Yonge St., Suite 420, Toronto, Ontario Canada, M5E 1G4 W H I T E P A P E R I D C a n d T E L U S E n t e r p r i s e C l o u d S t u d y, 2 0 1 3 : C a p i t a l i z i n g on C l o u d ' s W i n d o

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com W H I T E P A P E R L e v e r a g e R e c o r d s M a n a g e m e n t B e s t P r a c t i c e s t

More information

WHITE PAPER. Overview of RSD GLASS. Comprehensive Information Governance Solution. RSD, 2010. Page 1

WHITE PAPER. Overview of RSD GLASS. Comprehensive Information Governance Solution. RSD, 2010. Page 1 WHITE PAPER Overview of RSD GLASS Comprehensive Information Governance Solution RSD, 2010. Page 1 TABLE OF CONTENTS Executive Summary... 3 The Information Governance Challenge... 4 Business Drivers for

More information

The IBM data governance blueprint: Leveraging best practices and proven technologies

The IBM data governance blueprint: Leveraging best practices and proven technologies May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and

More information

Email Archiving: To SaaS or not to SaaS?

Email Archiving: To SaaS or not to SaaS? Proofpoint Email Archiving Whitepaper: A look at the pros and cons of Software-as-a-Service and how they apply to email archiving. threat protection compliance archiving & governance secure communication

More information

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security

BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security BEFORE THE BREACH: Why Penetration Testing is Critical to Healthcare IT Security August 2014 w w w.r e d s p in.c o m Introduction This paper discusses the relevance and usefulness of security penetration

More information

The IT Financial Management Challenge: Where Is the ROI? WHITE PAPER

The IT Financial Management Challenge: Where Is the ROI? WHITE PAPER WHITE PAPER Table of Contents Introduction.... 3 ROI Approaches... 3 Guiding Principles of a Modified ROI Approach.... 3 Modified ROI Defined.... 4 Category 1: IT Financial Management Labor.... 5 Guiding

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

WHITE PAPER. Deficiencies in Traditional Information Management

WHITE PAPER. Deficiencies in Traditional Information Management WHITE PAPER Deficiencies in Traditional Information Management Table of Contents 3 Abstract 3 Information Management Defined 7 Problems with Traditional Approaches 8 Conclusion Table of Figures 5 Figure

More information

NO MORE TIERS ASSUREON, REDEFINING WHAT ARCHIVE MEANS

NO MORE TIERS ASSUREON, REDEFINING WHAT ARCHIVE MEANS WHITEPAPER NO MORE TIERS ASSUREON, REDEFINING WHAT ARCHIVE MEANS Companies are faced with a wave of complexity in trying to make sense of tiered storage: complex storage infrastructures storage management

More information

DATA ARCHIVING. The first Step toward Managing the Information Lifecycle. Best practices for SAP ILM to improve performance, compliance and cost

DATA ARCHIVING. The first Step toward Managing the Information Lifecycle. Best practices for SAP ILM to improve performance, compliance and cost DATA ARCHIVING The first Step toward Managing the Information Lifecycle Best practices for SAP ILM to improve performance, compliance and cost 2010 Dolphin. West Chester, PA All rights are reserved, including

More information

A Practical Approach to Information Management

A Practical Approach to Information Management A Practical Approach to Information Management Solution Brief: Information Management Contents Information management isn t just a priority, it s mandatory.................................................

More information

IBM Unstructured Data Identification and Management

IBM Unstructured Data Identification and Management IBM Unstructured Data Identification and Management Discover, recognize, and act on unstructured data in-place Highlights Identify data in place that is relevant for legal collections or regulatory retention.

More information

Automotive Engineering Change: The Key to Cost Reduction for Competitive Advantage

Automotive Engineering Change: The Key to Cost Reduction for Competitive Advantage Engineering Change: The Key to Cost Reduction for Competitive The automotive industry has seen significant change over the last couple of decades, but looking to the future, there will be even more significant

More information

Email Archiving Benefits

Email Archiving Benefits www.sonasoft.com INTRODUCTION In this digital age, small and medium businesses (SMBs) continue to rely heavily on e mail as their primary form of business communications. This has led to a proliferation

More information

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL

TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,

More information

4/10/2015. Beyond Records ediscovery and Information Management. Speaker Bio. Where are we and how did we get here? DISCOVERING "DARK DATA"

4/10/2015. Beyond Records ediscovery and Information Management. Speaker Bio. Where are we and how did we get here? DISCOVERING DARK DATA Beyond Records ediscovery and Information Management DISCOVERING "DARK DATA" Speaker Bio Bill Tolson is the owner of Tolson Communications LLC, an information governance and ediscovery consulting and content

More information

Practical Approaches to Achieving Sustainable IT Governance

Practical Approaches to Achieving Sustainable IT Governance Practical Approaches to Achieving Sustainable IT Governance Beyond Mandates: Getting to Sustainable IT Governance Best Practices Agenda IT Governance Definition IT Governance Principles IT Governance Decisions

More information

Software License Asset Management (SLAM) Part III

Software License Asset Management (SLAM) Part III LANDesk White Paper Software License Asset Management (SLAM) Part III Structuring SLAM to Solve Business Challenges Contents The Third Step in SLAM: Optimizing Your Operations.... 3 Benefiting from Step

More information

2011 Forrester Research, Inc. Reproduction Prohibited

2011 Forrester Research, Inc. Reproduction Prohibited 1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester

More information

Role of Analytics in Infrastructure Management

Role of Analytics in Infrastructure Management Role of Analytics in Infrastructure Management Contents Overview...3 Consolidation versus Rationalization...5 Charting a Course for Gaining an Understanding...6 Visibility into Your Storage Infrastructure...7

More information

5 Steps to Implement & Maintain PCI DSS Compliance. www.alienvault.com

5 Steps to Implement & Maintain PCI DSS Compliance. www.alienvault.com 5 Steps to Implement & Maintain PCI DSS Compliance www.alienvault.com 5 Steps to Implement and Maintain PCI DSS Compliance If you haven t guessed it by now, achieving and maintaining Payment Card Industry

More information

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007

Lowering E-Discovery Costs Through Enterprise Records and Retention Management. An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management An Oracle White Paper March 2007 Lowering E-Discovery Costs Through Enterprise Records and Retention Management Exponential

More information

How to Manage Your SharePoint Cloud Based Business

How to Manage Your SharePoint Cloud Based Business Enhancing SharePoint's Records Capabilities Real Life Cases for 3rd Party Solutions December 9, 2013 Agenda About the Speaker and his Company What is Driving Information Management Why SharePoint? Why

More information

Application Security Maturity Model (ASM)

Application Security Maturity Model (ASM) Application Security Maturity Model (ASM) A PRAGMATIC APPROACH TO SECURING YOUR SOFTWARE APPLICATIONS 187 Ballardvale Street, Wilmington, MA 01887 +1.978.694.1008 2 Table of Contents Introduction... 3

More information

Prioritizing Regulatory Compliance in the Financial Services Industry

Prioritizing Regulatory Compliance in the Financial Services Industry Prioritizing Regulatory Compliance in the Financial Services Industry 1185 Sanctuary Parkway Suite 250 Alpharetta, GA 30004 Tel: 678.992.0262 www.compliance360.com A Regulatory Perfect Storm What do these

More information

Information Security Program

Information Security Program Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security

More information

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014

Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago

More information

Managing Special Authorities. for PCI Compliance. on the. System i

Managing Special Authorities. for PCI Compliance. on the. System i Managing Special Authorities for PCI Compliance on the System i Introduction What is a Powerful User? On IBM s System i platform, it is someone who can change objects, files and/or data, they can access

More information

Information Governance Challenges and Solutions

Information Governance Challenges and Solutions Challenges and Solutions In this modern information age, organizations struggle with two things: the problem of too much electronic data and how to govern the data. Each year, the speed of information

More information

Peer Research Cloud Security Insights for IT Strategic Planning

Peer Research Cloud Security Insights for IT Strategic Planning SEPTEMBER 2011 Peer Research Cloud Security Insights for IT Strategic Planning Intel s IT Manager Survey on Cloud Security Why you should read this document: This report describes key findings from a survey

More information

How To Manage Cloud Data Safely

How To Manage Cloud Data Safely Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In

More information

E-DISCOVERY: A Primer

E-DISCOVERY: A Primer New for 2010 E-DISCOVERY: A Primer Electronic Discovery Principles, Best Practices & Standards A MANAGEMENT PRIMER Robert F. Smallwood, MBA With Amy Girst, J.D. 2010 R. F. Smallwood and Charmaine Brooks

More information

Things You Need to Know About Cloud Backup

Things You Need to Know About Cloud Backup Things You Need to Know About Cloud Backup Over the last decade, cloud backup, recovery and restore (BURR) options have emerged as a secure, cost-effective and reliable method of safeguarding the increasing

More information