Digital Continuity for Change Managers
|
|
|
- Joleen Clarke
- 9 years ago
- Views:
Transcription
1 Digital Continuity for Change Managers This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and address risks to digital continuity Stage 4: Maintain digital continuity This guidance is produced by the Digital Continuity Project and is available from
2 Crown copyright 2011 You may re-use this document (not including logos) free of charge in any format or medium, under the terms of the Open Government Licence. To view this licence, visit ;or write to the Information Policy Team, The National Archives, Kew, Richmond, Surrey, TW9 4DU; or Any enquiries regarding the content of this document should be sent to Page 2 of 24
3 CONTENTS 1. Introduction What is the purpose of this guidance? Who is this guidance for? Digital continuity and change What is digital continuity? Why does it matter? Supporting wider government agendas Realising savings and efficiencies Why does change affect digital continuity? How to manage digital continuity through change Who you need to talk to Impact assessment Risk assessment Acceptance testing The impact of different types of change Business change Changes to how you need to find your information Changes to how you need to open your information Changes to how you need to work with your information Changes to how you need to understand your information Changes to how you need to trust your information Technology change Software changes File format migration Hardware changes Technology management changes Information and information management changes Ownership and governance change Individual staff changes Operational policy and process changes Next steps Further reading...23 Page 3 of 24
4 1. Introduction Digital continuity is the ability to use your information in the way you need, for as long as you need. If you do not actively work to ensure digital continuity, your information can easily become unusable. Digital continuity can be put at risk by changes in your organisation, management processes or technology. You need to manage your information carefully over time and through changes to maintain the usability you need. Planning for change means managing your information and supporting technology in a way that leaves you better positioned to respond to inevitable changes with agility and flexibility, and in a way that minimises the risks that come with change. It means ensuring that digital continuity is reflected in your business plans and strategies as well as, policies and risk and change management processes. 1.1 What is the purpose of this guidance? This piece of guidance helps you to understand: why your information is at risk during times of change what digital continuity is and why it is important how your digital continuity can be affected by change how you can make sure your information is protected. This piece forms part of a suite of guidance 1 that The National Archives has delivered as part of a digital continuity service for government, in consultation with central government departments. No prior knowledge of digital continuity is required to read this guidance, although you may find Understanding Digital Continuity useful to expand your knowledge. Managing your digital continuity through change forms an important part of the final stage in a four-stage process of more widely managing your digital continuity. You can find out more about this process in Managing Digital Continuity. 2 1 For more information and guidance, visit nationalarchives.gov.uk/digitalcontinuity Page 4 of 24
5 1.2 Who is this guidance for? This guidance is aimed at everyone involved with the planning and implementation of any changes that could affect the use or management of information. This may include project managers, change managers and risk managers, who may be either business or IT focussed. The information will also be useful for anyone concerned with managing information, information risk, or information assurance, e.g. KIM managers, IT managers, IA teams, Information Asset Owners (IAOs) and Senior Information Risk Owners (SIROs). See more on the roles and responsibilities that your organisation will require to ensure the digital continuity of your information in Managing Digital Continuity. 3 2 Managing Digital Continuity nationalarchives.gov.uk/documents/information-management/managingdigital-continuity.pdf 3 See more on roles and responsibilities in Managing Digital Continuity nationalarchives.gov.uk/documents/information-management/managing-digital-continuity.pdf Page 5 of 24
6 2. Digital continuity and change 2.1 What is digital continuity? Digital continuity is the ability to use your information in the way you need, for as long as you need. If you do not actively work to ensure digital continuity, your information can easily become unusable. Information is at the heart of good government, but without care and consideration the digital information on which government depends is less likely to survive and remain usable than paper records. Understanding how you need to use your information is a key part of managing your digital continuity. 4 What constitutes usable will be different depending on your business needs but in practical terms, your information is usable if you can: find it when you need it open it as you need it work with it in the way you need to understand what it is and what it is about trust that it is what it says it is. USABLE = AVAILABLE + COMPLETE Usable: your information meets your requirements for how you want to use your information. Available: you can find what you need and you have the correct technology to open it and work with it in the way you need. Complete: everything you need to use, understand and trust the information is present, including the content, context and all the necessary metadata. 4 Find out more about information assets and usability requirements in our guidance Identifying Information Assets and Business Requirements nationalarchives.gov.uk/documents/informationmanagement/identify-information-assets.pdf Page 6 of 24
7 2.2 Why does it matter? Managing digital continuity is essential if you are to protect the digital information you depend on to do business. This enables you to operate accountably, transparently, legally, effectively and efficiently. It helps you to protect your reputation, make informed decisions, reduce costs, and deliver better public services. If you lose information because you haven't managed your digital continuity properly, the consequences can be as serious as those of any other information loss. Once you have lost digital continuity, it is very difficult and often impossible to restore it and if you do manage to, it can involve severe financial and reputational repercussions. It is much more cost and time efficient to ensure you do not lose it in the first place Supporting wider government agendas It is your duty to maintain the accessibility and use of the public record, and managing digital continuity will help ensure this. Usable information is a prerequisite for working collaboratively and efficiently no government department can afford to waste its resources on recreating or recovering lost information. The need to ensure digital continuity is clearly recognised and embedded into wider government priorities and agendas on transparency, information management and information assurance. For example, it is included in Section 46 Code of Practice, 5 the National Information Assurance Strategy 6 and the Information Assurance Maturity Model and Assessment Framework Realising savings and efficiencies You can realise savings and efficiencies through providing the right level of continuity for the right information. Ensuring digital continuity can deliver real efficiency benefits, bringing opportunities to dispose of the information and IT that you do not really need, reducing data volumes and streamlining your technical environment. 5 FOI section 46 Code of Practice 6 National Information Assurance Strategy tegy.pdf 7 Information Assurance Maturity Model Page 7 of 24
8 For further information, see What Does Digital Continuity Mean for You? An Overview of the Benefits Why does change affect digital continuity? The digital continuity of your information is maintained when your technology and information management processes support your information assets in meeting your business requirements both now, and in the future. This is when: you know what information you have, what it is about and where it is you understand how you want to use it, now and in the future your technology and information management process enables you to use your information, and is agile enough to cope with your changing requirements. Diagram 1: ensuring digital continuity 8 See our guidance What Does Digital Continuity Mean for You? An Overview of the Benefits nationalarchives.gov.uk/documents/information-management/an-overview-of-the-benefits.pdf Page 8 of 24
9 Managing change is key to managing digital continuity. As shown in the diagram above, digital continuity is about the alignment between your information, your usability requirements and the complex technological environment which supports it. Changes to any of these elements, even seemingly minor ones, could have a dramatic impact on your ability to use your digital information. Managing change means identifying when your information might be affected by a change, undertaking impact assessments to understand where there might be risks to your digital continuity, and putting in place effective plans to make sure your information remains usable through the change. If changes are not effectively managed, you could be left with information assets you can t use, or technology that fails to deliver the support in the way your information needs. At best, this creates inefficiencies. At worst, it can result in the loss of the information you need. It s not only immediate changes that you need to think about, there is also the risk that you are unprepared for change in the future. You should consider how you will want to use information, for instance in five years time are your business needs likely to change? Have you planned the lifecycle of your hardware and software so that you know when change is likely and can plan your strategies for maintaining digital continuity in advance? You should also have succession plans in place, so you have some contingency if staff critical to managing your information and IT leave the organisation. Page 9 of 24
10 3. How to manage digital continuity through change 3.1 Who you need to talk to To effectively protect your information through change, you will need to work alongside a number of people in your organisation. Your information management team and the relevant Information Asset Owners (IAOs) will be able to provide guidance on what information you have, how it needs to be used and what risks are associated with it. If you have a Senior Responsible Owner (SRO) assigned to manage digital continuity, they will also be able to provide advice and assistance. Depending on the scale of the change, you may need to include the Senior Information Risk Owner (SIRO) in your communications. There may be resistance to change, when it has a negative impact upon assets and the ways they can be used. Liaising with asset owners and end users should be a dialogue and compromises may have to be made on both sides of the process. By engaging in this discussion early in the change process it will hopefully be possible to mitigate risks before they develop into issues which are more difficult to resolve. At the very least you will have a shared understanding and decisions can be taken from an informed position. These conversations may also reveal opportunities to group additional changes together to minimise overall disruption. You may have opportunities to streamline information assets and the technology environment, revealing potential efficiency savings and system simplifications. 3.2 Impact assessment For any change you must make sure an impact assessment is undertaken for your organisation s information assets, to establish how the change will affect how your information can be used. You may have to produce this yourself, or you may need to make sure your information management team is doing this. You should embed this impact assessment into your organisation s change management processes. You will need to put together a comprehensive list of the assets that are affected by the change and how they are impacted. Ideally your organisation will have an Information Asset Register (IAR) which lists all the information your organisation holds, grouped into Page 10 of 24
11 manageable assets, each with an assigned owner and clearly defined set of requirements. 9 You can use this register to check each asset and consider the potential impact of the change upon it, highlighting the ones which may be affected. You must be careful to look beyond obvious impacts. There are likely to be complex relationships between information, technology and business needs so a variety of assets may be affected indirectly. Each asset that s affected may in turn affect other assets, technologies and business requirements, so what may seem an isolated change may in fact set off a chain reaction through a number of assets and systems. You can also use one vital change as a catalyst for other voluntary changes either to improve services or to realise savings and efficiencies. For each of the assets potentially affected by the change, you will need to document their usability requirements both what they are currently, and what they must be after the change. 10 By the end of this identification process you should have a comprehensive, documented list of: the information assets affected by the change the current usability requirements of those assets how you find, open, work with, understand and trust them any changes to those usability requirements any follow on impact to the technology that supports these requirements any follow on impact to the business processes any follow on impact to other information assets. Once you have identified these issues, you can include them into your planning alongside your other requirements, risks and actions. Depending on the scale of the impacts you may wish to include relevant IAOs, or the digital continuity SRO on your project board, on your communications list. 9 See Identifying Information Assets and Business Requirements for more on information assets and the development of an IAR nationalarchives.gov.uk/documents/information-management/identifyinformation-assets.pdf 10 See Identifying Information Assets and Business Requirements for guidance on how to assess your usability requirements nationalarchives.gov.uk/documents/information-management/identifyinformation-assets.pdf Page 11 of 24
12 3.3 Risk assessment While your impact assessment focuses on the planned changes and their impacts, you should also perform a risk assessment to consider and document the unexpected impacts. You must consider your information assets during this stage as well, to make sure that you are prepared as far as possible for what to do if things do not go as planned. Part of the risk assessment will include creating an action plan to mitigate risks; things which can be done in advance to minimise the chances of incidents occurring, or reduce their impact if they do. You must work alongside the information management team and IAOs to develop this process and make sure it is communicated appropriately to everyone who uses the assets. See our Risk Assessment Handbook for more information on performing a digital continuity risk assessment Acceptance testing For major change with either significant impact, or considerable risk, to information assets there should be an agreement during the planning stage of how to assess whether the change has been successful. These checks should be incorporated into your test plans. 12 You should also make sure that all relevant documents, registers and logs are updated to reflect the change. 11 Risk Assessment Handbook nationalarchives.gov.uk/documents/information-management/risk- Assessment-Handbook.pdf 12 You can measure your success using our Testing for Continuity Checklist nationalarchives.gov.uk/documents/information-management/testing-for-continuity-checklist.pdf Page 12 of 24
13 4. The impact of different types of change As shown in Diagram 1, change factors that affect digital continuity can broadly be grouped into three categories: changes to the way the business needs to use its information (section 4.1) changes to the technology that supports the information (section 4.2) changes to the way the information is managed (section 4.3). Each of these types of change is likely to have different types and levels of impact on the information your organisation holds and uses. You may be responsible for one particular type of change, or your project may have wide ranging effects covering multiple categories. 4.1 Business change Your business requirements drive the way that you need to use information. Any change to what your business does, or how it does it, can have a corresponding effect on your information. If your business change has an impact on how you need to use your information, you will need to perform an assessment to make sure that the new requirements are fully supported by your technology environment and information management. Business change often necessitates extensive knock-on changes in other areas, so you will need to make sure that you can support your new usability requirements. A business change may influence only one of your usability criteria for example a change to your security policies which requires an amendment to who can open a specific asset. Alternately, it may affect a number of different usability requirements. For example, a Machinery of Government (MoG) change involving your organisation merging, dividing or closing down altogether, may necessitate a large-scale review of your information s usability requirements. 13 With business changes, it is vital to first understand what your starting point is. If you have an Information Asset Register, this should provide detail on your information assets and the usability required from them to meet your business objectives. We give some examples below of the potential impacts of changes to these usability requirements. 13 See Machinery of Government change guidance nationalarchives.gov.uk/documents/informationmanagement/machinery_of_government.pdf Page 13 of 24
14 4.1.1 Changes to how you need to find your information Changes to how you need to find your information can require both technology and information management changes. Example business requirement You need searching to be faster, it currently takes too much time to find information. Search criteria need to be more flexible, you need to be able to search against a greater number of fields. Impact You may need to change your technology, improve your search algorithm, or improve your hardware to allow faster processing. This may be a technology change to allow you to record a greater number of fields, or enabling you to make more complex searches. Or it may be an information management issue to update/introduce a metadata policy and train people to use it Changes to how you need to open your information This category covers not only how you limit access to your information, but also how you need or want to share it more widely. Example business requirement You need to increase security and restrict who can access information. You need to share your information with a wider audience as part of the government transparency agenda. Impact If you already have security measures in place which just need updating, this may be an information management issue to clarify roles and access levels. However, it may also affect technology if you need to enable new restrictions. The IAO, alongside the information management team can advise on promoting the sharing of the information. Datasets for example can be shared via data.gov.uk Changes to how you need to work with your information The way you work with your information is what you can do with it once it is opened, how you need to be able to use it. These issues tend to be largely technology related, requiring changes to software or configurations. 14 Data.gov.uk, home to national and local data for free re-use Page 14 of 24
15 Example business requirement You need to make a previously editable asset read-only so that it is no longer updated and can be archived. You need to change the way data is gathered and entered into a database. Impact You may need to migrate file formats, either using existing software or using new technology to produce an archivable format. The information management team should have recommendations for how to archive information. You may need to make adjustments to the technology to enable you to record different information, for example adding fields to a database Changes to how you need to understand your information Understanding your information is largely about metadata information about your information. Who created it, when and why? When was it last updated? Example business requirement You need to be able to track version histories of documents and reliably identify the latest version. You need to be able to understand and evaluate your file formats to avoid technical obsolescence. Impact You may already be able to do this within your current technology environment, in which case it falls to the information management team to train people how to use it and encourage them to do so. You may, however, require technology changes to add the functionality to your systems. The threat of obsolescence of information is now business critical, so you need to evaluate these formats in the context of your own business needs and technological environment See our guidance on Evaluating Your File Formats nationalarchives.gov.uk/documents/informationmanagement/evaluating-file-formats.pdf Page 15 of 24
16 4.1.5 Changes to how you need to trust your information Trusting your information is about being able to prove, to a defined level of confidence, that your information is what it says it is. The information management team should be involved in any changes to the tracking and reporting of audit information; you should ensure everyone in the organisation understands how their actions are being monitored. Example business requirement You need to be able to start tracking who has printed a file. You need to be able to prove files have not been tampered with. Impact Your information management team will need to develop the policy for what is being tracked and who has access to the reports. The technology team will then need to implement systems to do this. If you have legal obligations, you must clearly understand what is required of your information so you can correctly and securely record it. Your business and legal teams will need to work closely with information managers to create the policy and work with the technical teams to implement and test the solutions. 4.2 Technology change The most obvious threats to digital continuity are changes to the technical environment which supports the use of your information assets. This type of change can be gradual, in that certain technologies become obsolescent over time, or isolated for instance, you may just be upgrading one piece of software. However, even such isolated changes can be made up of lots of smaller types of change for instance, an EDRM migration may involve not only software changes, but also file format and technology management issues. 16 The usability requirements of the information are generally delivered by the technology environment it provides the tools that enable the information to be found, opened, worked with, understood and trusted. Any changes to the environment can therefore have very immediate and direct effects on the ability to use the information in the way that business 16 See Migrating Information Between EDRMS nationalarchives.gov.uk/documents/informationmanagement/edrms.pdf Page 16 of 24
17 requires. Changes to one piece of technology may also have knock on effects on other pieces, which in turn affect more information assets. Ideally your organisation s technology team will have a Configuration Management Database (CMDB) or similar register 17 which will describe the relationships between systems and tools Software changes The software applications used to create, access, manipulate and store most public sector information are constantly changing and evolving if these applications no longer support the information you have previously created and still need, then you have a continuity problem. However, not upgrading particular pieces of software may mean that support is no longer available, or you are not able to share and re-use files from other organisations. Example software changes Updating to a new version of a key piece of software. Impact You may no longer be able to access files created in the old version. The same update may mean that files created in the new version can no longer be shared with another organisation which is still using the older version. You must make sure that the new version of the software does not remove features which you were using, or break any customised add-ins which you rely on. Updating the operating system. Decommissioning legacy systems and old software, streamlining and consolidating IT systems. The operating system not only has direct impacts upon the way information is used, but can have indirect effects in the way that it impacts other pieces of software that may not be available on the new platform, but are required for your information. Information created using the decommissioned systems may not be accessible using other software. You may need to consider migrating data or file formats to maintain the usability of your 17 See Mapping Technical Dependencies of Information Assets nationalarchives.gov.uk/documents/information-management/mapping-technical-dependencies.pdf Page 17 of 24
18 information File format migration Either as part of a software change, or in isolation, migrating information between file formats has a number of risks associated with it. Even if the new format has better support for your long term digital continuity, 18 the process of migrating into it can cause a loss of digital continuity itself. For example: Example file format changes You need to migrate from a proprietary file format to another format such as an open one (maybe due to a software change). A new file format is now supported by an established piece of software. Impact You should carefully evaluate the new format before you do any migration, as it must support all the usability that is required. You must undertake any migration carefully to ensure no data or metadata is lost. You should evaluate the new to consider whether it is better to use or not. For example, although your organisation is using the new version of the software, other organisations with whom you share your files are not and they cannot open the new format Hardware changes Hardware is replaced on relatively well-planned schedules and lifecycles are documented and tracked to allow for long term planning of licenses, support requirements and budgets. Unfortunately, hardware changes also occur on short notice when systems fail. Disaster recovery plans should be in place to make sure that even these spontaneous changes are well managed and no information is lost. It is vital to include risks to digital continuity into all these types of planning to protect your information through expected and unexpected change. Example hardware changes Phasing out support for legacy media types such as floppy disks, magnetic tapes and Impact Although new data is not being created on these formats, it may be that older files are 18 See our Evaluating Your File Formats nationalarchives.gov.uk/documents/informationmanagement/evaluating-file-formats.pdf Page 18 of 24
19 CDs. Introducing new hardware platforms to the organisation, for example Macs or Smartphones. still held on these. New platforms may not have support available for the software currently used to support the use you require from your assets Technology management changes The way you manage your technology affects the way it supports information. You must work with colleagues across disciplines to ensure you have an informed and consistent approach across your organisation. You should also avoid lengthy contract tie-ins or committing to contracts that make changes to meet new business requirements prohibitively expensive. Example management changes The license for a particular piece of software is allowed to expire. Reducing a support agreement from the top level to a mid-level, with corresponding decreases in response times. Impact Rationalising the number and types of licenses is a good way to save money, however you must perform a full audit to make sure that no one is actively using the software and that there are no legacy or archived files which you may still need to access in the future which you will not be able to do if the license has expired. If a new support contract has lower response rates, in the event of a failure users will not be able to access their information for longer. 4.3 Information and information management changes The very processes that look after your information can sometimes themselves change and, if you do not properly manage them, you can lose digital continuity. The way your information is managed varies between different organisations. You may have formal written policies and processes, documents and registers to manage your information for example retention schedules, metadata policies and IARs. There may be a dedicated team to manage information, with networks and extensive support for IAOs. Whatever process your organisation uses to manage information, any changes to those processes will have an effect on your information, and you must ensure that assets or aspects of their usability requirements don t fall through the gaps. Page 19 of 24
20 Knowledge and expertise in the understanding of assets and how they are used can be lost when members of staff leave or even just have extended periods of time off. There are tangible things such as passwords which must be transferred, but there is also a lot of knowledge which can be harder to transfer understanding of how information was gathered, where things are kept, or how to use bespoke software. Information may also be stored inside accounts and on local hard drives which may no longer be accessible once the person leaves. You should work alongside the HR department to make sure the exit process includes information management concerns Ownership and governance change Changes to your information governance structure, and roles accountable for owning information and risk, will prompt a change in how that information is managed. You need to ensure that you maintain an understanding of what information assets you have, and have a governance framework in place to manage risk and change. This challenge can arise when going through significant organisational changes and restructures, such as Machinery of Government (MoG) change, when overall ownership of the information shifts. Example ownership/governance changes The asset is moved into a different department, a new group of people become the primary users and owners of the asset (this may be driven by a MoG change). Impact As information is created, changed and deleted from within the asset it is easy to introduce errors, for example incorrect or absent metadata, or corruption of audit trails. If the asset is moved into a different department, this may introduce risk as the technology and management processes change. You must ensure a full handover is given and the new users are correctly trained in how to use the information to prevent errors occurring. You must integrate the information asset into the new information and governance structures. Page 20 of 24
21 4.3.2 Individual staff changes Each information asset is connected to a number of people and may be dependent on particular expertise to understand the information and maintain its context and supporting technology. As these individuals come and go they can have a significant impact on the digital continuity of those assets. Example people changes The Information Asset Owner (IAO) leaves the organisation. The technology administrator for the system holding a key information asset leaves the organisation. Impact The IAO is the primary custodian of the asset, responsible for managing risk and maximising opportunities. This is the individual who best understands the asset and its requirements and who should act as its advocate in times of change. If the asset owner changes, you can lose this understanding. If you do not replace the asset owner, or you poorly manage the handover, you have an increased risk of losing the digital continuity of your asset. Bespoke and legacy technology is often highly dependent on the skills and expertise of a small number of individuals who have built up specific knowledge of how technology works or information is structured and organised. There is risk to the ongoing usability of the information if you do not capture and share the knowledge and effectively hand it over through succession planning Operational policy and process changes Your organisation will have a number of policies and processes in place which inform how you should create, manage, share and discard information. The information management team should be responsible for both managing what is in those policies, but also for communicating and educating colleagues to make sure that operational processes are compliant with the policy. Policy and process changes may be driven from within, or influenced by, changes in wider policy and legislation. Page 21 of 24
22 Example policy/process changes The organisation is introducing a new protective marking scheme and needs to ensure this information is captured in the Electronic Document and Records Management System (EDRMS). The security policy is being revised to restrict the number of people who can access key finance documents. Transparency policy is being revised to require all published datasets are published in machine readable format. Retention schedules are being reviewed and updated, changing the retention period for various information assets. Impact Changes to the information you need to record about any given information asset will prompt a number of changes in policy and processes. You may need to update the EDRMS metadata policy to make it mandatory for staff to populate certain metadata fields. You may need to reconfigure the system to ensure it can capture and manage any new metadata required. You must train users on the new system. You will need to implement changes to privacy settings and access levels. You may be able to do this using existing technology, or you may have to customise them. You may have to convert datasets from one format to another, or at the very least, their update their usability requirements in the IAR. You will need to update retention related metadata and disposal schedules associated with information. You might need to change technology configurations and settings. Users of the information will need informing of the changes, and potentially trained. If retention periods are significantly extended, you will need to review the technology you are dependent on against the usability requirements to assess risks to digital continuity over the new retention period. Page 22 of 24
23 5. Next steps There are two facets to managing your digital continuity through change. Firstly, you must make sure that information management is embedded within your existing change management processes, and also that your impact and risk assessments and test processes include considerations for the information that supports your business and relies on your technology. Secondly, for each individual change you must engage with your organisation s information management team and relevant users of the information assets. Communication is key to protecting your information and potentially finding additional savings and efficiencies. 5.1 Further reading This guidance relates to the following other digital continuity documents: Understanding Digital Continuity nationalarchives.gov.uk/documents/informationmanagement/understanding-digital-continuity.pdf This piece of guidance is a high level introduction to digital continuity what it is, why it s important and why it s relevant to you and your organisation. Managing Digital Continuity nationalarchives.gov.uk/documents/informationmanagement/managing-digital-continuity.pdf This document outlines the four-stage process which we recommend you use for managing digital continuity. Identify Information Assets and Business Requirements nationalarchives.gov.uk/documents/information-management/identify-information-assets.pdf This guidance helps you understand the information your organisation holds and how it needs to be used to support your business. It will also includes how to record that information in an IAR. Mapping your Information Assets and Business Requirements nationalarchives.gov.uk/information-management/our-services/dc-guidance.htm. This guidance helps you to identify and map the relationships between the information assets your business requires and your technical environment. Page 23 of 24
24 Risk Assessment Handbook nationalarchives.gov.uk/information-management/ourservices/dc-guidance.htm This guidance offers practical information and support to help you assess and manage risks to digital continuity. Page 24 of 24
Digital Continuity to Support Forensic Readiness
Digital Continuity to Support Forensic Readiness This guidance is produced by the Digital Continuity Project and is available from www.nationalarchives.gov.uk/dc-guidance Crown copyright 2011 You may re-use
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Identifying Information Assets and Business Requirements
Identifying Information Assets and Business Requirements This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Embedding Digital Continuity in Information Management
Embedding Digital Continuity in Information Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
MANAGING DIGITAL CONTINUITY
MANAGING DIGITAL CONTINUITY Project Name Digital Continuity Project DRAFT FOR CONSULTATION Date: November 2009 Page 1 of 56 Contents Introduction... 4 What is this Guidance about?... 4 Who is this guidance
Digital Continuity in ICT Services Procurement and Contract Management
Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage
Information Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
Records management in SharePoint 2010
Records management in SharePoint 2010 Implications and issues Crown copyright 2011 You may re-use this information (excluding logos) free of charge in any format or medium, under the terms of the Open
The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS
PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing
Good Practice Guide: the internal audit role in information assurance
Good Practice Guide: the internal audit role in information assurance Janaury 2010 Good Practice Guide: the internal audit role in information assurance January 2010 Official versions of this document
Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth
Draft Guidance: Non-economic Regulators: Duty to Have Regard to Growth January 2014 Purpose of this document The duty to have regard to the desirability of promoting economic growth (the growth duty )
Guide 4 Keeping records to meet corporate requirements
Guide 4 Keeping records to meet corporate requirements This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor
ITIL Introducing service transition
ITIL Introducing service transition The goals of service transition Aligning the new or changed service with the organisational requirements and organisational operations Plan and manage the capacity and
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
Information Management Strategy. July 2012
Information Management Strategy July 2012 Contents Executive summary 6 Introduction 9 Corporate context 10 Objective one: An appropriate IM structure 11 Objective two: An effective policy framework 13
Information Governance Management Framework
Information Governance Management Framework Responsible Officer Author Business Planning & Resources Director Governance Manager Date effective from October 2015 Date last amended October 2015 Review date
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Guide 2 Organisational
Guide 2 Organisational arrangements to support records management This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by
Right to challenge parking policies
Right to challenge parking policies Traffic Management Act 2004: Network Management Duty Guidance March 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical
Information governance strategy 2014-16
Information Commissioner s Office Information governance strategy 2014-16 Page 1 of 16 Contents 1.0 Executive summary 2.0 Introduction 3.0 ICO s corporate plan 2014-17 4.0 Regulatory environment 5.0 Scope
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
ITIL Managing Digital Information Assets
ITIL Managing Digital Information Assets Shirley Lacy, ConnectSphere Frieda Midgley, Digital Continuity Project Judith Riley, Digital Continuity Project Nigel Williamson, Digital Continuity Project White
Implementing an Electronic Document and Records Management System. Key Considerations
Implementing an Electronic Document and Records Management System Key Considerations Commonwealth of Australia 2011 This work is copyright. Apart from any use as permitted under the Copyright Act 1968,
Transition Guidelines: Managing legacy data and information. November 2013 v.1.0
Transition Guidelines: Managing legacy data and information November 2013 v.1.0 Document Control Document history Date Version No. Description Author October 2013 November 2013 0.1 Draft Department of
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Archiving and Backup - The Basics
Introduction Backup and archiving are useful tools for managing data, especially volumes of ageing data. Agency policies for retention and access necessitate that these tools should be used to implement
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
SFJCCAD2 Promote business continuity management
Overview This unit is about providing advice and assistance on business continuity management, including general advice for the business and voluntary sectors, and specific advice and assistance to individual
Housing Association Regulatory Assessment
Welsh Government Housing Directorate - Regulation Housing Association Regulatory Assessment Melin Homes Limited Registration number: L110 Date of publication: 20 December 2013 Welsh Government Housing
Information Management Advice 18 - Managing records in business systems: Overview
Information Management Advice 18 - Managing records in business systems: Overview Introduction The purpose of this Advice is to assist agencies to identify and manage State records in business systems,
DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy
Part Two Part One Not Protectively Marked DORSET & WILTSHIRE FIRE AND RESCUE AUTHORITY Performance, Risk and Business Continuity Management Policy. The Dorset & Wiltshire Fire and Rescue Authority (DWFRA)
Management of Official Records in a Business System
GPO Box 2343 ADELAIDE SA 5001 Tel (08) 8204 8773 Fax (08) 8204 8777 DX:467 [email protected] www.archives.sa.gov.au Management of Official Records in a Business System October 2011 Version
EDRMS Migration Project Checklist
EDRMS Migration Project Checklist Use our step-by-step checklist to help you to manage your project and work through each stage of your EDRMS migration. It will help you to manage the migration of your
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as
MAXIMUM PROTECTION, MINIMUM DOWNTIME
MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is
Corporate Risk Management Policy
Corporate Risk Management Policy Managing the Risk and Realising the Opportunity www.reading.gov.uk Risk Management is Good Management Page 1 of 19 Contents 1. Our Risk Management Vision 3 2. Introduction
7 Directorate Performance Managers. 7 Performance Reporting and Data Quality Officer. 8 Responsible Officers
Contents Page 1 Introduction 2 2 Objectives of the Strategy 2 3 Data Quality Standards 3 4 The National Indicator Set 3 5 Structure of this Strategy 3 5.1 Awareness 4 5.2 Definitions 4 5.3 Recording 4
Queensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
A Changing Commission: How it affects you - Issue 1
A Changing Commission: How it affects you - Issue 1 Contents Overview... 3 Change Programme... 4 Introduction... 4 Reviewing how we regulate and engage... 4 What are the key changes... 5 What does it mean
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN. Records Management Policy. Version 4.0. Page 1 of 11 Policy PHSO Records Management Policy v4.
PARLIAMENTARY AND HEALTH SERVICE OMBUDSMAN Records Management Policy Version 4.0 Page 1 of 11 Document Control Title: Original Author(s): Owner: Reviewed by: Quality Assured by: File Location: Approval
Confident in our Future, Risk Management Policy Statement and Strategy
Confident in our Future, Risk Management Policy Statement and Strategy Risk Management Policy Statement Introduction Risk management aims to maximise opportunities and minimise exposure to ensure the residents
NSW Government. Cloud Services Policy and Guidelines
NSW Government Cloud Services Policy and Guidelines August 2013 1 CONTENTS 1. Introduction 2 1.1 Policy statement 3 1.2 Purpose 3 1.3 Scope 3 1.4 Responsibility 3 2. Cloud services for NSW Government 4
Solihull Clinical Commissioning Group
Solihull Clinical Commissioning Group Business Continuity Policy Version v1 Ratified by SMT Date ratified 24 February 2014 Name of originator / author CSU Corporate Services Review date Annual Target audience
Cloud Computing Security Considerations
Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction
HMG Security Policy Framework
HMG Security Policy Framework Security Policy Framework 3 Foreword Sir Jeremy Heywood, Cabinet Secretary Chair of the Official Committee on Security (SO) As Cabinet Secretary, I have a good overview of
Recordkeeping for Good Governance Toolkit. GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy
Recordkeeping for Good Governance Toolkit GUIDELINE 14: Digital Recordkeeping Choosing the Best Strategy i The original version of this guideline was prepared by the Pacific Regional Branch of the International
Planning application process improvements
Planning application process improvements Government response to consultation January 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical arrangement
Risk Management & Business Continuity Manual 2011-2014
ANNEX C Risk Management & Business Continuity Manual 2011-2014 Produced by the Risk Produced and by the Business Risk and Business Continuity Continuity Team Team February 2011 April 2011 Draft V.10 Page
ADRI. Advice on managing the recordkeeping risks associated with cloud computing. ADRI-2010-1-v1.0
ADRI Advice on managing the recordkeeping risks associated with cloud computing ADRI-2010-1-v1.0 Version 1.0 29 July 2010 Advice on managing the recordkeeping risks associated with cloud computing 2 Copyright
Microsoft SharePoint and Records Management Compliance
Microsoft SharePoint and Records Management Compliance White Paper Revision: 2 Date created: 20 February 2015 Principal author: Nigel Carruthers-Taylor, Principal, icognition Reference: 15/678 Summary
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION
SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION Please Note: 1. THIS IS NOT A ONE-SIZE-FITS-ALL OR A FILL-IN-THE BLANK COMPLIANCE PROGRAM.
Cyber Security: Guidelines for Backing Up Information. A Non-Technical Guide
Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Executives, Business Managers Administrative & Operations Managers This appendix is a supplement to the Cyber Security:
Argyll and Bute Council. Information Management Strategy 2014-2018
Argyll and Bute Council Information Management Strategy 2014-2018 Version 1.3 November 2014 $Hcxs4vps.Docx INDEX 1. INTRODUCTION... 3 1.1 Purpose of the Document... 3 2. INFORMATION MANAGEMENT OVERVIEW...
National Approach to Information Assurance 2014-2017
Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version
Copeland Borough Council. Communications Strategy 2006/7
Copeland Borough Council Communications Strategy 2006/7 CONTENTS Introduction: Why Communicate? - external communications - internal communications The Purpose; - what is a communications strategy? - what
Process Streamlining. Whitepapers. Written by A Hall Operations Director. Origins
Whitepapers Process Streamlining Written by A Hall Operations Director So, your processes are established and stable, but are clearly inefficient and you are not meeting your performance expectations.
Feedback Ferret. Security Incident Response Plan
Feedback Ferret Security Incident Response Plan Document Reference Feedback Ferret Security Incident Response Plan Version 3.0 Date Created June 2013 Effective From 20 June 2013 Issued By Feedback Ferret
Relationship Manager (Banking) Assessment Plan
Relationship Manager (Banking) Assessment Plan ST0184/AP03 1. Introduction and Overview The Relationship Manager (Banking) is an apprenticeship that takes 3-4 years to complete and is at a Level 6. It
Wiltshire Council s Behaviours framework
Wiltshire Council s Behaviours framework It s about how we work Trust and respect Simplicity Responsibility Leadership Working together Excellence Why do we need a behaviours framework? Wiltshire Council
Planning Act 2008: Guidance on Changes to Development Consent Orders. December 2015 Department for Communities and Local Government
Planning Act 2008: Guidance on Changes to Development Consent Orders December 2015 Department for Communities and Local Government Crown copyright, 2015 Copyright in the typographical arrangement rests
Benefits. MIRACLE Benefits. I have no idea! What is going on in here? Konferencja "Bezpieczny Projekt" WARSZAWA 11 maja 2010 r.
Programme Plan MIRACLE Benefits Benefits What is going on in here? I have no idea! 1 W A R S Z A W A R Z E S Z Ó W W R O C Ł A W 1 Fitting the pieces together How the APMG Product Set helps you manage
Business Continuity Management
Business Continuity Management Policy Statement & Strategy July 2009 Basildon District Council Business Continuity Management Policy Statement The Council is committed to ensuring robust and effective
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
Cloud Computing and Records Management
GPO Box 2343 Adelaide SA 5001 Tel (+61 8) 8204 8773 Fax (+61 8) 8204 8777 DX:336 [email protected] www.archives.sa.gov.au Cloud Computing and Records Management June 2015 Version 1 Version
Migrating digital records
Migrating digital records A guideline for Queensland public authorities June 2012 Version 1.0 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details
Adopting Agile Testing
Adopting Agile Testing A Borland Agile Testing White Paper August 2012 Executive Summary More and more companies are adopting Agile methods as a flexible way to introduce new software products. An important
Guide 1 What is records management?
Guide 1 What is records management? This guidance has been produced in support of the good practice recommendations in the Code of Practice on Records Management issued by the Lord Chancellor under section
Information Management Policy
Title Information Management Policy Document ID Director Mark Reynolds Status FINAL Owner Neil McCrirrick Version 1.0 Author Deborah Raven Version Date 26 January 2011 Information Management Policy Crown
BS 25999 BUSINESS CONTINUITY MANAGEMENT
BS 25999 BUSINESS CONTINUITY MANAGEMENT AUDIT, CERTIFICATION & training services HOW CAN YOU ENSURE BUSINESS CONTINUITY? BS 25999 AUDITS & CERTIFICATION FROM SGS Most organisations will, at some point,
ICT Business Continuity & Disaster Recovery for Local Authorities. White Paper
ICT Business Continuity & Disaster Recovery for Local Authorities White Paper Contents 1 Introduction...3 1.1 What Constitutes a Disaster?...3 1.2 Phases...3 1.3 Overall Contingency Planning...3 2 Discovery
Small businesses: What you need to know about cyber security
Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning
Digital Archiving Survey
Digital Archiving Survey Background information Under the Public Records Act 2002 (the Act), public authorities have a responsibility to ensure that digital records under their control remain accessible
V1.0 - Eurojuris ISO 9001:2008 Certified
Risk Management Manual V1.0 - Eurojuris ISO 9001:2008 Certified Section Page No 1 An Introduction to Risk Management 1-2 2 The Framework of Risk Management 3-6 3 Identification of Risks 7-8 4 Evaluation
State Records Guideline No 25. Managing Information Risk
State Records Guideline No 25 Managing Information Risk Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Risk Management and Information... 5 2.1 Overview... 5 2.2 Risk management...
Backup and Recovery in Laserfiche 8. White Paper
Backup and Recovery in Laserfiche 8 White Paper July 2008 The information contained in this document represents the current view of Compulink Management Center, Inc on the issues discussed as of the date
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
Considerations for Outsourcing Records Storage to the Cloud
Considerations for Outsourcing Records Storage to the Cloud 2 Table of Contents PART I: Identifying the Challenges 1.0 Are we even allowed to move the records? 2.0 Maintaining Legal Control 3.0 From Storage
Section 106 Planning Obligations speeding up negotiations
Section 106 Planning Obligations speeding up negotiations Student accommodation and affordable housing contributions Consultation February 2015 Department for Communities and Local Government Crown copyright,
COLUMN. Planning your SharePoint intranet project. Intranet projects on SharePoint need a clear direction APRIL 2011. Challenges and opportunities
KM COLUMN APRIL 2011 Planning your SharePoint intranet project Starting a SharePoint intranet project, whether creating a new intranet or redeveloping an existing one, can be daunting. Alongside strategy
Information Governance Strategy. Version No 2.1
Livewell Southwest Information Governance Strategy Version No 2.1 Notice to staff using a paper copy of this guidance. The policies and procedures page of LSW Intranet holds the most recent version of
How To Protect School Data From Harm
43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:
9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4
9. GOVERNANCE Policy 9.8 RECORDS MANAGEMENT POLICY Version 4 9. GOVERNANCE 9.8 RECORDS MANAGEMENT POLICY OBJECTIVES: To establish the framework for, and accountabilities of, Lithgow City Council s Records
Information Governance Policy
Information Governance Policy Document Number 01 Version Number 2.0 Approved by / Date approved Effective Authority Customer Services & ICT Authorised by Assistant Director Customer Services & ICT Contact
White Paper. Central Administration of Data Archiving
White Paper Central Administration of Data Archiving Archiving and Securing Corporate Data... 1 The Growing Need for Data Archive Solutions... 1 Determining Data Archiving Policy... 2 Establishing the
CCG: IG06: Records Management Policy and Strategy
Corporate CCG: IG06: Records Management Policy and Strategy Version Number Date Issued Review Date V3 08/01/2016 01/01/2018 Prepared By: Consultation Process: Senior Governance Manager, NECS CCG Head of
Business Continuity Management. Policy Statement and Strategy
Business Continuity Management Policy Statement and Strategy November 2011 Title Business Continuity Management Policy & Strategy Date of Publication: Cabinet Council Published by Borough Council of King
Project Management Manual
Project Management Manual PM01 Introduction to the Project Management Manual Ref: PM01 (V7.01) - Uncontrolled once Printed Issued on 20 th December 2006 Manual Owner: James Couper Head of Project Management
Local Government Cyber Security:
Local Government Cyber Security: Guidelines for Backing Up Information A Non-Technical Guide Essential for Elected Officials Administrative Officials Business Managers Multi-State Information Sharing and
