ARMA: Information Governance: A Revenue Source Potential
|
|
|
- Abel Owen
- 9 years ago
- Views:
Transcription
1 ARMA: Information Governance: A Revenue Source Potential
2 Presenter: Martin Tuip Executive Director for IG Products ARMA International
3 Agenda About ARMA International What is Information Governance? Generally Accepted Recordkeeping Principles (The Principles) State of the Law Firm Market Information Governance Assessment
4 About ARMA International Non-profit professional association for records and information managers and related industry practitioners and vendors Founded in ,000 members in 30 countries Providers educational opportunities and educational publications covering the principles of records management for its standards and guidelines The authority on information governance
5 Information Governance Information Management concerns how information flows through an organization; Information Governance asks why you have the information in the first place.
6 What is Information Governance? Gartner defines information governance as the specification of decision rights and an accountability framework to ensure appropriate behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles, policies, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.
7 Insights Currently, there is an unprecedented growth of content within organizations. Now more than ever, the need for governance across all stages of the information lifecycle is becoming more critical. Organizations must evaluate and address the big risks associated with information governance failures. More importantly, they need to find ways to leverage the opportunities that information governance can offer.
8 Generally Accepted Recordkeeping Principles (The Principles) Legislators to craft legislation meant to hold organizations accountable The Principles guide: CEOs to determine how to protect their organizations in the use of information assets Records management professionals to design comprehensive and effective records management programs
9 What are The Principles? Developed and published by ARMA International Foster general awareness of information governance standards and principles Assist organizations in developing information management systems that comply with them. Are grounded in practical experience and based on extensive consideration and analysis of legal doctrine and information theory Form the basis upon which every effective information governance program is built 9
10 What are The Principles? Principle of Accountability Do you have appropriate oversight over the individuals, policies and procedures to ensure your recordkeeping program auditability? Principle of Integrity Does the information generated or managed by the organization have a reasonable and suitable guarantee of authenticity and reliability? Principle of Protection Do you have controls in place to ensure a reasonable level of protection to records and information that are private, confidential, privileged, secret, or essential to business continuity? Principle of Compliance Are you in compliance with applicable laws and other binding authorities, as well as organizational policies as they relate to IG? 10
11 What are The Principles? Principle of Availability Can you ensure timely, efficient, and accurate retrieval of needed information in the event e-discovery request? Principle of Retention Are you maintaining records and information for an appropriate amount of time, taking into account legal, regulatory, fiscal, operational, and historical requirements? Principle of Disposition Are you providing secure and appropriate disposition for records that are no longer required to be maintained by applicable laws and the organization s policies? Principle of Transparency Are the processes and activities of your recordkeeping program documented in an understandable manner and available to all personnel and appropriate interested parties? 11
12 State of the Law Firm Market
13 State of the Law Firm Market Growing amount of clients are demanding fixed-fee contracts Nearly half of finance directors at top 100 law firms see fixed fees as the number one threat to their profit margins Highly competitive market
14 Information Governance and Law Firms Help clients get their information governance policies under control Further develop a deep trust relationship with clients Enable ability to create a new law firm practice with new revenue Information Governance
15 Latest development Resolution 109
16 Latest development The American Bar Association encourages all private and public sector organizations to develop, implement, and maintain an appropriate cybersecurity program that complies with applicable ethical and legal obligations and is tailored to the nature and scope of the organization and the data and systems to be protected.
17 Weakest link
18 Protection of data is important Protection of one of the most valuable and vulnerable assets of all organizations its information is vitally important Avoids the high costs associated with cybercrime, including forensic investigations and data breach notification; the loss of confidential, classified, and proprietary data; reputational damage; loss of public confidence; and in the case of business, drops in stock price, and loss of market share and trust.
19 Where does revenue generation come into play? Relationship matters
20 IG complexity It is very difficult for organizations to get a holistic view of their IG status as in its whole several departments have responsibility for different components and rarely talk with each other (let alone use the same language) IG complexity increases exponentially with the complexity of the organization and its business
21 Who needs to be at the table?
22 Who Needs To Be At The Table? Same goals, different departments Legal Business Management Risk, Compliance / Privacy Officer Information Security Specialists Records Management Information Technology Senior Management Champion Change Management
23 Start with an assessment Where are you?
24 ARMA and ILTA members Special pricing ARMA s IG Assessment ILTA members receive REDUCED pricing. First assessment at $4,495 (a $500 discount) It s a firsttime use so you can understand how they will deploy with their client set or use internally 5-license package purchase at $5995, for the purpose of assessing 5 clients within a 12-month period Additional licenses can be purchased at the rate of $1,199 each.
25 ARMA and ILTA members Special pricing To purchase contact ARMA directly and mention ILTA membership pricing or international
26 Thank you Contact information:
27 Information Governance Assessment The ARMA Information Governance Assessment is an unbiased, comprehensive solution designed to help organizations turn information into an asset. Based on the fundamental best practices of the Generally Accepted Recordkeeping Principles Identifies, measures and monitors information risks, enabling your organization to establish a baseline, set benchmarks and drive improvements.
28 Information Governance Assessment
29 Information Governance Assessment
Electronic Records Management
Electronic Records Management HOW TRANSIT AGENCIES CAN LEVERAGE THEIR USE What is Electronic Records Management Electronic Records Management (ERM) utilizes technology to enable the indexing, imaging,
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
Information Governance
Information Governance in the Health Care Enterprise Bonnie S. Cassidy, MPA, RHIA, FAHIMA, FHIMSS Senior Director of HIM Innovation December 16, 2014 2014 Nuance Communications, Inc. All rights reserved.
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles
IG DG ITG Data Gov IT Gov Info Gov Data Governance vs. Information Governance? Data Gov Info Gov Data Governance vs. Information Governance Data Governance vs. Information Governance Data Facts, Measurements
Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
Non-Profit Records Management Tool Kit
Non-Profit Records Management Tool Kit January 2013 Contents Introduction.... 3 Generally Accepted Record Keeping Principles.... 4 What is a Record?.... 5 File Maintenance.... 6 Classifying a Record.....8
SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE
Information is an organization s most important strategic asset the lifeblood of the organization s knowledge, processes, transactions, and decisions. With information continuing to grow exponentially,
Information Governance: Where is ARMA International Headed? David M. Fleming, CRM, IGP, CIP ARMA Utah-Salt Lake Chapter Meeting September 18, 2014
Information Governance: Where is ARMA International Headed? David M. Fleming, CRM, IGP, CIP ARMA Utah-Salt Lake Chapter Meeting September 18, 2014 Discussion Points Defining Information Governance Defining
What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs
What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management
Fundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
Information Governance
New 2011 Report! Information Governance Fundamentals, Best Practices & Implementation Issues A Management Primer Including: Information Governance Framework Information Governance Maturity Models E-Document
YORK REGION DISTRICT SCHOOL BOARD. Policy and Procedure #160.0 Records and Information Management
YORK REGION DISTRICT SCHOOL BOARD Policy and Procedure #160.0 Records and Information Management Policy and Procedure #160.0 Records and Information Management outline the process for ensuring information
PRESENTATION TOPICS 2/27/2014. Why Update Policies? 21st Century Best Practices for Information Governance & Policies. Why update policies??
21st Century Best Practices for Information Governance & Policies Presented by: John Isaza, CEO- Information Governance Solutions, LLC Partner - Rimon PC ARMA NOVA Chapter Friday, February 28, 2014 12:30
ROLES & RESPONSIBILITIES OF RECORDS MANAGER
ROLES & RESPONSIBILITIES OF RECORDS MANAGER DATE : 12 June 2014 (Thursday) VENUE : National Archives of Malaysia PRESENTED BY : Mr. Mohd Saufi Samsudin Records Manager Malaysia Administrative Modernization
Information Management Strategic Plan - Methodology
OVERVIEW: According to ISO 15489-1 and -2 Information and Documentation Records Management, Part 1 (General) and Part 2 (Guidelines), in order to design and implement sustainable record systems, a design
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
Information Governance Policy
Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date
Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.
Information Governance (IG) encompasses sets of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY
CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
Washington State s Use of the IBM Data Governance Unified Process Best Practices
STATS-DC 2012 Data Conference July 12, 2012 Washington State s Use of the IBM Data Governance Unified Process Best Practices Bill Huennekens Washington State Office of Superintendent of Public Instruction,
10 Steps to Establishing an Effective Email Retention Policy
WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Tactics v. Strategy: From Records & Information Management to Information Governance
Tactics v. Strategy: From Records & Information Management to Information Governance David M. Fleming, CRM, CIP ARMA Silicon Valley Chapter Meeting March 14, 2013 Discussion Points About Zions Bancorporation
From Information Management to Information Governance: The New Paradigm
From Information Management to Information Governance: The New Paradigm By: Laurie Fischer Overview The explosive growth of information presents management challenges to every organization today. Retaining
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
IT Security Risk Management: A Lifecycle Approach
Information Technology Security Guidance IT Security Risk Management: A Lifecycle Approach ITSG-33 November 2012 Foreword The of is an unclassified publication issued under the authority of the Chief,
How To Manage Cloud Data Safely
Information Governance In The Cloud Galina Datskovsky, Ph. D., CRM President of ARMA International SVP Information Governance Solutions Topics Cloud Characteristics And Risks Information Management In
The Relationship Between Information Governance, Data Governance, and Big Data. Richard Kessler November 2015
The Relationship Between Information Governance, Data Governance, and Big Data Richard Kessler November 2015 Definitions and Interpretations Data Governance "The exercise of authority and control over
The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II).
Page 1 of 7 The CIPM certification is comprised of two domains: Privacy Program Governance (I) and Privacy Program Operational Life Cycle (II). Domain I provides a solid foundation for the governance of
AHIMA: Leading Information Governance for Healthcare
AHIMA: Leading Information Governance for Healthcare 2014 AHIMA Panelists Moderator: Margarita L. Valdez, Director, Congressional Relations, AHIMA Angela Kennedy, EdD, MBA, RHIA, President AHIMA Meryl
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope
IAPP Global Privacy Summit Protecting Privacy Under the Cybersecurity Microscope March 6, 2014 Victoria King UPS (404) 828-6550 [email protected] Lisa J. Sotto Hunton & Williams LLP (212) 309-1223 [email protected]
Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits)
Page 1 of 5 Course Content Summary ITN 267 Legal Topics in Network Security (3 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Conveys an in-depth
Cloud Service Contracts: An Issue of Trust
Cloud Service Contracts: An Issue of Trust Marie Demoulin Assistant Professor Université de Montréal École de Bibliothéconomie et des Sciences de l Information (EBSI) itrust 2d International Symposium,
INFORMATION GOVERNANCE Principles for Healthcare (IGPHC)
INFORMATION GOVERNANCE Principles for Healthcare (IGPHC) AHIMA 3 INFORMATION GOVERNANCE Principles for Healthcare (IGPHC) Preamble...3 Principle of Accountability...5 Principle of Transparency...6 Principle
Retention & Disposition in the Cloud Do you really have control?
InterPARES Trust Retention & Disposition in the Cloud Do you really have control? Franks Patricia, San Jose State University, San Jose, USA and Alan Doyle, University of British Columbia, Canada October
BEFORE USING THIS GUIDANCE, MAKE SURE YOU HAVE THE MOST UP TO DATE VERSION GUIDANCE 2 POLICY AREA: INFORMATION GOVERNANCE
GUIDANCE 1 TITLE: INFORMATION GOVERNANCE FRAMEWORK 2 POLICY AREA: INFORMATION GOVERNANCE 3 ACCOUNTABLE DIRECTOR FOR POLICY AREA: DIRECTOR OF QUALITY AND GOVERNANCE 4 GUIDANCE DRAFTED BY: INTEGRATED GOVERNANCE
Defensible Disposition Strategies for Disposing of Structured Data - etrash
Defensible Disposition Strategies for Disposing of Structured Data - etrash Presented by John Isaza, Esq., FAI Co-Founder & CEO, Information Governance Solutions, LLC Tom Reding, CRM Executive Consultant,
Enterprise Data Management for SAP. Gaining competitive advantage with holistic enterprise data management across the data lifecycle
Enterprise Data Management for SAP Gaining competitive advantage with holistic enterprise data management across the data lifecycle By having industry data management best practices, from strategy through
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Certified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
The World of Information Governance
The World of Information Governance Society of Corporate Compliance and Ethics Maggi Johnsen, CRM October 12, 2012 Table of Contents What is Information Governance (IG)? What Might Lead to an IG Failure?
4.10 Information Management Policy
Policy Statement Information is a strategic business resource that the must manage as a public trust on behalf of Nova Scotians. Effective information management makes program and service delivery more
IBM Data Security Services for endpoint data protection endpoint data loss prevention solution
Automating policy enforcement to prevent endpoint data loss IBM Data Security Services for endpoint data protection endpoint data loss prevention solution Highlights Protecting your business value from
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
University of Michigan Medical School Data Governance Council Charter
University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
Real World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
Cloud Security Who do you trust?
Thought Leadership White Paper Cloud Computing Cloud Security Who do you trust? Nick Coleman, IBM Cloud Security Leader Martin Borrett, IBM Lead Security Architect 2 Cloud Security Who do you trust? Cloud
a Legal Project Management Consultancy Plan. Resource. Realize.
a Legal Project Consultancy Plan. Resource. Realize. Disclaimer Information is Not Legal Advice Alice E Burns of Eleventh Hour provides information regarding businesses, compliance and litigation trends
Records Management Policy
Once printed off, this is an uncontrolled document. Please check the Intranet for the most up to date copy Author Freedom of Information Lead Version 5.0 Issue Issue Date October 2011 Review Date October
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
Privacy and Security Framework, February 2010
Privacy and Security Framework, February 2010 Updated April 2014 Our Vision Better data. Better decisions. Healthier Canadians. Our Mandate To lead the development and maintenance of comprehensive and
Records Management: Seven Best Practices for Staying Ahead of the Curve
Records Management: Seven Best Practices for Staying Ahead of the Curve 2014 Table of Contents Introduction... 3 Obtain Executive Support... 3 Define A Records Management Approach... 4 Create A Clear Policy
Competency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Information Management Strategy. July 2012
Information Management Strategy July 2012 Contents Executive summary 6 Introduction 9 Corporate context 10 Objective one: An appropriate IM structure 11 Objective two: An effective policy framework 13
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
Blending Corporate Governance with. Information Security
Blending Corporate Governance with Information Security WHAT IS CORPORATE GOVERNANCE? Governance has proved an issue since people began to organise themselves for a common purpose. How to ensure the power
CORPORATE GOVERNANCE GUIDELINES WD 40 COMPANY
CORPORATE GOVERNANCE GUIDELINES WD 40 COMPANY The following Corporate Governance Guidelines (the Guidelines ) have been adopted by the Board of Directors (the Board ) of WD 40 Company (the Company ) to
Financial Markets Authority Website: www.fma.govt.nz
Financial Markets Authority Website: www.fma.govt.nz Auckland Office Level 5, Ernst & Young Building 2 Takutai Square, Britomart PO Box 106 672 AUCKLAND 1143 Wellington Office Level 2 1 Grey Street PO
Information Security for Managers
Fiscal Year 2015 Information Security for Managers Introduction Information Security Overview Enterprise Performance Life Cycle Enterprise Performance Life Cycle and the Risk Management Framework Categorize
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Information Management
G i Information Management Information Management Planning March 2005 Produced by Information Management Branch Open Government Service Alberta 3 rd Floor, Commerce Place 10155 102 Street Edmonton, Alberta,
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
Standards for the Professional Practice of Internal Auditing
Standards for the Professional Practice of Internal Auditing THE INSTITUTE OF INTERNAL AUDITORS 247 Maitland Avenue Altamonte Springs, Florida 32701-4201 Copyright c 2001 by The Institute of Internal Auditors,
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
