A Maturity Model for Information Governance
|
|
|
- Emery McDowell
- 9 years ago
- Views:
Transcription
1 A Maturity Model for Information Governance Diogo Proença oa.pt Ricardo Vieira José Borbinha ABSTRACT Information Governance (IG) as defined by Gartner is the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archival and deletion of information. Includes the processes, roles, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals. Organizations that wish to comply with IG best practices, can seek support on the existing best practices, standards and other relevant references not only in the core domain but also in relevant peripheral domains. Thus, despite the existence of these references, organizations still are unable, in many scenarios, to determine in a straightforward manner two fundamental business-related concerns: (1) to which extent do their current processes comply with such standards; and, if not, (2) which goals do they need to achieve in order to be compliant. In this paper, we present how to create an IG maturity model based on existing reference documents. The process is based on existing maturity model development methods. These methods allow for a systematic approach to maturity model development backed up by a well-known and proved scientific research method called Design Science Research. We will focus on ISO16363 for the development of this maturity model. Categories and Subject Descriptors K.6.0 [Management of computing and information systems]: General - Economics General Terms Management, Measurement, Performance, Design. Keywords Information Governance, Maturity Model. 1. INTRODUCTION A maturity model defines a pathway of improvement for organizational aspects and is classified by a maturity level. The maturity levels often range from zero to five, where zero consists on the lack of maturity and five consists of a fully mature and selfoptimizing process. Maturity models can be used for assessing and/or achieving compliance since they allow the measurement of a maturity level and, by identifying the gap between the current and pursued level, allow the planning of efforts, priorities and objectives in order to achieve the goals proposed. The use of maturity models is widely used and accepted, both in the industry and the academia [2]. There are numerous maturity models, virtually one for each of the most trending topics in such areas as Information Technology or Management. Maturity Models are widely used and accepted because of their simplicity and effectiveness. They depict the current maturity level of a specific aspect of the organization, for example IT, Outsourcing or Project Management, in a meaningful way, so that stakeholders can clearly identify strengths and improvement points and prioritize what they can do in order to reach higher maturity levels, showing the outcomes that will result from that effort which enables stakeholders to decide if the outcomes justify the effort needed to go to higher levels and results in a better business and budget planning. The remaining of this paper is structured as follows: Section 2 presents the related work that can influence the development of the maturity model, Section 3 presents the development strategy for the maturity model as well as a first example of the maturity model based on the ISO16363 and based on the levels from SEI CMMI [3]. Section 4 presents the conclusions of this paper. The maturity model presented here is being developed in the context of the E- ARK 1 project. 2. RELATED WORK 2.1 Maturity Model Development Method There are various examples of maturity models developed for the information management and records management areas, as shown in Section 3.2. However, many of these maturity models have been developed in an ad hoc way, with no regard for detailed documentation of development, comparison with other models and even without following a certain process based on best practices from previous maturity model development efforts. One example of such method is presented in [1], which is backed by a Design Science Research (DSR) method [4], making it useful both for the industry and the academia. This method is founded in eight requirements (R1 R8) [1]: 1. R1 A Comparison with existing maturity models is presented and clearly argues for the need of a new model or the adaptation of an existing one; 2. R2 Iterative Procedures are followed to ensure a feedback loop and refinement; 3. R3 The principles, quality and effectiveness behind the design and development effort of a maturity model should pass through an iterative Evaluation step; 4. R4 The design and development of maturity models should follow a Multi-methodological Procedure which use must be well founded; 5. R5 During the development of a maturity model there should be a clear Identification of Problem Relevance so that the problem solution can be relevant to practitioners and researchers; 6. R6 Problem Definition should include the application domain for the maturity model and also detail the intended benefits and constraints of application; 1
2 7. R7 There should be a Targeted Presentation of Results regarding the users needs and application constraints; 8. R8 The design of a maturity model must include Scientific Documentation, which details the whole process design for each step of the process, as well as, the methods applied, people involved and the obtained results. The well-argued claim of these authors is that these fundamental requirements should drive the development of every maturity model. Apart from evaluating well-known models according to these dimensions, the authors also delineate a set of steps to correctly develop a maturity model. It depicts which documentation should result from each step, and includes an iterative maturity model development method that proposes that each iteration of the maturity model should be implemented and validated before going to a new iteration. 2.2 Maturity Models This section presents the several maturity models from the Information Management, Records Management and Information Governance domains that can influence the development of the maturity model proposed in this paper. Each Maturity Model is presented starting with a small description of the model, the aim of the model, scope, attributes and levels. These attributes further detail the maturity model by decomposing certain aspects of the maturity model domain. Some of the attributes being used are sections or principles. Although there are other attributes being used, such as, dimensions Asset Management Maturity Model The Asset Management Maturity Model is originated from an evaluation in the Netherlands to investigate how asset managers deal with long-term investment decisions [5]. This evaluation took into consideration organizations that control infrastructures, such as, networks, roads and waterways and focus on the strategy, tools, environment and resources. Aim: Understand how asset managers deal with longterm investment decisions and provide an improvement path for organization to improve the long-term investment decisions. Scope: Management, specifically a subset of management entitled asset management. Term to name the Attributes: Dimensions / Category. Attributes (4): Strategy; Tools; Environment; Resources. Levels: 1 (Initial); 2 (Repeatable); 3 (Defined); 4 (Managed) and 5 (Optimizing) Records Management Maturity Model This maturity model was created by JISC infonet and stands as a self-assessment tool for higher education institution in England and Wales [6]. It is based on a code of practice and its aim is to help in the compliance with this code although it is independent from the code and the future plans are to continue development and enhancement independent from this code. Aim: Help higher education institutions to assess their current approach on records management in regard to recommendations issued by the United Kingdom government and benchmark against other similar organizations. Scope: Management, specifically information management. Term used to name of the Attributes: Section. Attributes (9): Organizational arrangements to support records management; Records management policy; Keeping records to meet corporate requirements; Records systems; Storage and maintenance of records; Security & access; Disposal of records; Records created in the course of collaborative working or through out-sourcing; Monitoring and reporting on records management. Levels: Level 0 (Absent); Level 1 (Aware); Level 2 (Defined) and Level 3 (Embedded) Digital Asset Management (DAM) Maturity Model The DAM maturity model builds on the ECM3 maturity model [7]. This model was developed having in mind that the successful implementation of DAM in organizations goes beyond the use of technology. It requires a holistic approach which includes people, systems, information and processes. This maturity model provides a description of where an organization is, where does it need to be so that it can perform gap analysis and comprehend what it needs to do to achieve the desired state of DAM implementation. Aim: Improve the success rate of DAM projects in organizations by providing a way of assessing the current state of the current implementation, as well as, an improvement path for enhancement of DAM. Scope: Management, more specifically Digital Asset Management. Term used to name of the Attributes: Categories / Dimensions. Attributes (4/15): People (Technical Expertise; Business Expertise; Alignment); Information (Asset; Metadata; Reuse; Findability; Use Cases); Systems (Prevalence; Security; Usability; Infrastructure); Processes (Workflow; Governance; Integration). Levels: Level 1 (Ad-Hoc); Level 2 (Incipient); Level 3 (Formative); Level 4 (Operational) and Level 5 (Optimal) Enterprise Content Management (ECM) Maturity Model In order to efficiently deploy ECM solutions organizations need to plan and develop a comprehensive strategy. That strategy must encompass the human, information and systems aspects of ECM [8]. If we look from a practical view, organizations cannot deal with all the ECM challenges at the same time. As such organizations need to enhance their ECM implementation step-by-step wise, by following a roadmap for ECM improvement. This maturity model provides the tools to build this roadmap by providing the current state of ECM implementation as well as a roadmap to reach the required maturity level.
3 Aim: Build a roadmap for ECM improvement, in a stepby-step fashion ranging from basic information collection and simple control to refined management and integration. Scope: Management, more specifically, Enterprise Content Management. Term used to name of the Attributes: Categories / Dimensions. Attributes (3/13): Human (Business Expertise; IT; Process; Alignment); Information (Context/Metadata; Depth; Governance; Re-Use; Findability); Systems (Scope; Breadth; Security; Usability) Levels: Level 1 (Unmanaged); Level 2 (Incipient); Level 3 (Formative); Level 4 (Operational) and Level 5 (Pro- Active) Information Governance Maturity Model This maturity model builds on the generally accepted recordkeeping principles developed by ARMA [9]. The principles provide highlevel guidelines of good practice for recordkeeping although they do not go into detail to the implementation of these principles and do not have further details on policies, procedures, technologies and roles. The point of this maturity model is to address this gap by detailing what a successful implementation of information governance is at different levels of maturity. Aim: Help organizations understand the standards, best practices and regulatory requirements that enclose information governance, so that they can understand what are the successful information governance characteristics at differing levels of maturity. Scope: Governance, more specifically a subset of governance entitled Information Governance. Term used to name of the Attributes: Principles. Attributes (8): Accountability; Transparency; Integrity; Protection; Compliance; Availability; Retention; Disposition. Levels: Level 1 (Sub-standard); Level 2 (In Development); Level 3 (Essential); Level 4 (Proactive) and Level 5 (Transformational). 3. DEVELOPMENT STRATEGY This section focuses on the development strategy used for developing the maturity model for information governance. In order to develop the maturity model for information governance we will use several references from various relevant domains, such as, information management, records management, archival management, asset management and digital preservation. Some of these references include: 1. ISO 14721: Space data and information transfer systems Open archival information system Reference model; 2. ISO 16363: Space data and information transfer systems Audit and certification of trustworthy digital repositories; 3. MoREQ 2010: Model Requirements for the Management of Electronic Records; 4. ISO 11442: Technical product documentation Document management; 5. ISO 13008: Information and documentation Digital records conversion and migration process; 6. ISO 15489: Information and documentation Records management; 7. ISO 16175: Information and documentation Principles and functional requirements for records in electronic office environments; 8. ISO 17068: Information and documentation Trusted third party repository for digital records; 9. ISO 18128: Information and documentation Risk assessment for records processes and systems; 10. ISO 23081: Information and documentation Managing metadata for records; 11. ISO 30300: Information and documentation Management systems for records Fundamentals and vocabulary; 12. ISO 30301: Information and documentation Management systems for records Requirements; 13. ISO 38500: Corporate governance of information technology; 14. ISO 27001: Information security management. For the purpose of the preliminary exercise in this paper we will use the Trustworthy Repositories Audit & Certification (TRAC) as the main reference. Its purpose is to be an audit and certification process for the assessment of the trustworthiness of digital repositories, and its scope of application it s the entire range of digital repositories. It is based on the OAIS model [12]. The final version of TRAC was published in 2011, it contains 108 criteria that are divided into three main sections: Organizational Infrastructure; Digital Object Management; and Infrastructure and Security Risk Management. A successor version of TRAC, a standard for Trusted Digital Repositories (TDR), was published in February 2012 as the ISO 16363:2012 standard [10]. The maturity model for information governance, depicted in Sections 3.1 to 3.3, consists of three dimensions: Management: The term management refers to all the activities that are used to coordinate, direct, and control an organization. In this context, the term management does not refer to people. It refers to activities. ISO 9000 uses the term top management to refer to people. [11] Processes: A process is a set of activities that are interrelated or that interact with one another. Processes use resources to transform inputs into outputs. Processes are interconnected because the output from one process becomes the input for another process. In effect, processes are glued together by means of such input output relationships. [11] Infrastructure: The term infrastructure refers to the entire system of facilities, equipment, and services that an organization needs in order to function. According to ISO 9001, Part 6.3, the term infrastructure includes buildings and workspaces (including related utilities), process equipment (both hardware and software), support services
4 (such as transportation and communications), and information systems. [11] These dimensions provide different viewpoints of information governance which help to decompose the maturity model and enable easy understanding. For each dimension we have a set of levels, from one to five, where one show the initial phase of maturity of a dimension and level five shows that the dimension is fully mature, self aware and optimizing. These levels and their meaning were adapted from the levels defined for SEI CMMI. [3] To use this maturity model an organization needs to position itself in the maturity matrix in each of the dimensions. This step is called self-assessment. The self-assessment consists of following a series of predetermined steps in which the organization answers a series of questionnaires that will result in a maturity level. This selfassessment method will also be developed in conjunction with maturity model so that they are fully aligned. With the resulting maturity levels for each of the dimensions that resulted from the self-assessment, the organization can identify the desired maturity level for each of the dimensions and realize the work that needs to be done in order to reach that level. This results in better understanding of the steps needed to reach the organization goal and also helps to better allocate budget for improving maturity of information governance and an even help to substantiate expenditure to top management. 3.1 Management Level 1 (Initial) Management is unpredictable; the business is weakly controlled and reactive. The required skills for staff are neither defined nor identified. There is no planned training of the staff Level 2 (Managed) There is awareness of the need for effective management within the archive. However, there are no policies defined. The required skills are identified only for critical business areas. There is no training plan, however training is provided when the necessity arises Level 3 (Defined) The documentation, policies and procedures that allows for effective management are defined. There is documentation of skill requirements for all job positions within the organization. There is a formal training plan defined; however it is not enforced Level 4 (Quantitatively Managed) The organization monitors its organizational environment to determine when to execute its policies and procedures. Skill requirements are routinely assessed to guarantee that the required skills are present in the organization. There are procedures in place to guarantee that a skill is not lost when staff leaves the archive. There is a policy for knowledge sharing of information within the organization that is described in the training plan. The training plan is also assessed routinely Level 5 (Optimizing) Standards and best practices are applied. There is an effort for the organization to undergo assessment for certification of standards. The organization is seen as an example of effective management among its communities and there is continuous improvement of all management procedures. There is encouragement of continuous improvement of skills, based both on personal and organizational goals. Knowledge sharing is formally recognized in the organization. The organization staff contributes to external best practice. 3.2 Processes Level 1 (Initial) Ingest, Archival and Dissemination of content are not done in a coherent way. Procedures are ad-hoc and undefined, the archive may not even be prepared to ingest, archive and disseminate content Level 2 (Managed) There is evidence of procedures being applied in an inconsistent manner and based on individual initiative. Due to fact that the processes are not defined, most of the times the applied procedures cannot be repeated Level 3 (Defined) The Ingest, archival and dissemination processes are defined and in place. For ingest, is defined which content the archive accepts and how to communicate with producers, the creation of the Archival Information Package is defined as well as the Preservation Description Information necessary for ingesting the object into the archive. For archival, preservation planning procedures are defined and the preservation strategies are documented. For dissemination, the requirements that allow the designated community to discover and identify relevant materials are in place, and access policies are defined Level 4 (Quantitatively Managed) The Ingest, Archival and Dissemination processes are actively managed for their performance and adequacy. There are mechanisms to measure the satisfaction of the designated community. There are procedures in place that measure the efficiency of the ingest, archival and dissemination processes and identify bottlenecks in these processes Level 5 (Optimizing) There is an information system that allows for process performance monitoring in a proactive way so that the performance data can be systematically used to improve and optimize the processes. 3.3 Infrastructure Level 1 (Initial) The infrastructure is not managed effectively. Changes in the infrastructure are performed in a reactive basis, when there is hardware/software malfunction or it becomes obsolete. There are no security procedures in place. The organization reacts to threats when they occur Level 2 (Managed) There is evidence of procedures being applied to manage the infrastructure. There is awareness of the need to properly define the procedures that allow for effective management of the infrastructure that supports the critical areas of the business. There are security procedures in place. However, individuals perform these procedures in different ways and there is no common procedures defined Level 3 (Defined) Infrastructure procedures are defined and in place. There are technology watches/monitoring, there are procedures to evaluate when changes to software and hardware are needed, there is software and hardware available for performing backups and there are mechanisms to detect bit corruption and reporting it. Security procedures are defined and being applied in the organization. The
5 security risk facts are analyzed, the controls for these risks are identified and there is disaster preparedness and recovery plans Level 4 (Quantitatively Managed) There are procedures in place that actively monitor the environment to detect when hardware and software technology changes are needed. The hardware and software that support the services are monitored so that the organization can provide appropriate services to the designated community. There are procedures in place to record and report data corruption that identify the steps needed to replace or repair corrupt data. The security risk factors are analyzed periodically and new controls are derived from these risk factors. There are procedures to measure the efficiency of these controls to treat the security risk factors identified. Disaster preparedness and recovery plans are tested and measured for their efficacy Level 5 (Optimizing) There is an information system that monitors the technological environment and detects when changes to hardware and software are needed and reacts to it by proposing plans to replace hardware and software. There is also a system that detects data corruption and identifies the necessary steps to repair the data and acts without human intervention. To allow for continuous improvement there are also mechanisms to act upon when the hardware and software available no longer meets the designated community requirements. There is an information system that manages security and policy procedures and the disaster and recovery plans which allows for continual improvement. There is a security officer that is a recognized expert in data security. 4. CONCLUSIONS This paper presented the fundaments of a maturity model for information Governance, as well as, a state of the art on maturity models surrounding information governance found in literature. Based on that state of the art and other references from the archival domain, namely the ISO16363 we developed a maturity matrix consisting of three dimensions and five levels. Further on the goal is to analyze other references from different domain, such as, records management as detailed before which will enhance, detail and help develop the maturity model that will be developed in the scope of the E-ARK project. Moreover, there will also be a method to perform a self-assessment of this maturity model which will result in a toolset consisting of both the maturity model and the self-assessment method which will help assessing the state of information governance in organizations as well as provide an improvement path that organizations can follow to enhance their information governance practice. 5. ACKNOWLEDGEMENTS This research was co-funded by FCT Fundação para a Ciência e Tecnologia, under project PEst-OE/EEI/LA0021/2013 and by the European Commission under the Competitiveness and Innovation Programme , E-ARK Grant Agreement no under the Policy Support Programme. The authors are solely responsible for the content of this paper. 6. REFERENCES [1] J. Becker, R. Knackstedt, J. Pöppelbuß. Developing Maturity Models for IT Management A Procedure Model and its Application. In Business & Information Systems Engineering, vol.1, issue 3, pp [2] S. Shang, S. Lin. Understanding the effectiveness of Capability Maturity Model Integration by examining the knowledge management of software development process. In Total Quality Management & Business Excellence, Vol. 20, Issue [3] CMMI Product Team, CMMI for services, version 1.3. Software Engineering Institute. Carnegie Mellon University, Tech. Rep. CMU/SEI-2010-TR-034, [4] K. Peffers, T. Tuunanen, M. Rothenberger, S. Chatterjee, A Design Science Research Methodology for Information Systems Research, In Journal of Management Information Systems, [5] T. Lei, A. Ligtvoet, L. Volker, P. Herder, Evaluating Asset Management Maturity in the Netherlands: A Compact Benchmark of Eight Different Asset Management Organizations, In Proceedings of the 6th World Congress of Engineering Asset Management, [6] JISC InfoNet, Records Management Maturity Model. [Online]. Available: [7] Real Story Group, DAM Foundation, The DAM Maturity Model. [Online]. Available: [8] A. Pelz-Sharpe, A. Durga, D. Smigiel, E. Hartmen, T. Byrne, J. Gingras, Ecm Maturity Model - Version 2.0, Wipro - Real Story Group - Hartman, [9] ARMA International, Generally Accepted Recordkeeping Principles - Information Governance Maturity Model. [Online]. Available: [10] ISO 16363:2012. Space data and information transfer systems Audit and certification of trustworthy digital repositories [11] ISO 9001:2008: Quality management systems Requirements [12] ISO 14721:2010. Space data and information transfer systems Open archival information system Reference model
Information Governance Maturity Model
Information Governance Maturity Model Diogo Proença* ([email protected]) Ricardo Vieira ([email protected]) José Borbinha ([email protected] ) 1 Motivation Working group in Portugal developed a set of
Achieving a Step Change in Digital Preservation Capability
Essential Guide Achieving a Step Change in Digital Preservation Capability An assessment of Preservica using the Digital Preservation Capability Maturity Model (DPCMM) Executive Summary Nearly every organization
The DAM Maturity Model
The DAM Maturity Model Digital Asset Management (DAM) is the collection of systems and processes that enable the management of assets from creation through distribution and archive. The DAM Maturity Model
Generally Accepted Recordkeeping Principles
Generally Accepted Recordkeeping Principles Information Governance Maturity Model Information is one of the most vital strategic assets any organization possesses. Organizations depend on information to
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?
Generally Accepted Recordkeeping Principles How Does Your Program Measure Up? GARP Overview Creation Purpose GARP Overview Creation About ARMA International and the Generally Accepted Recordkeeping Principles
How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )
The Electronic Discovery Reference Model (EDRM) How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP ) December 2011
Digital Archives Migration Methodology. A structured approach to the migration of digital records
Digital Archives Migration Methodology A structured approach to the migration of digital records Published July 2014 1 Table of contents Executive summary... 3 What is the Digital Archives Migration Methodology?...
Interagency Science Working Group. National Archives and Records Administration
Interagency Science Working Group 1 National Archives and Records Administration Establishing Trustworthy Digital Repositories: A Discussion Guide Based on the ISO Open Archival Information System (OAIS)
Enterprise Content Management. Image from http://webbuildinginfo.com/wp-content/uploads/ecm.jpg. José Borbinha
Enterprise Content Management Image from http://webbuildinginfo.com/wp-content/uploads/ecm.jpg José Borbinha ECM? Let us start with the help of a professional organization http://www.aiim.org http://www.aiim.org/about
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire. P3M3 Project Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Project Management Self-Assessment Contents Introduction 3 User Guidance 4 P3M3 Self-Assessment Questionnaire
Research Data Management Framework: Capability Maturity Guide
ANDS Guides Research Data Management Framework: Capability Maturity Guide Introduction The outline set out below shows five levels of attainment or maturity which institutions may achieve in managing their
The role of Information Governance in an Enterprise Architecture Framework
The role of Information Governance in an Enterprise Architecture Framework Richard Jeffrey-Cook, MBCS, CITP, FIRMS Head of Information and Records Management In-Form Consult Ltd, Cardinal Point Park Road,
What We ll Cover. Defensible Disposal of Records and Information Litigation Holds Information Governance the future of records management programs
What We ll Cover Foundations of Records and Information Management Creating a Defensible Retention Schedule Paper v. Electronic Records Organization and Retrieval of Records and Information Records Management
Fundamentals of Information Governance:
Fundamentals of Information Governance: More than just records management PETER KURILECZ CRM CA IGP Hard as I try, I simply cannot make myself understand how Information Governance isn t just a different
The World of Information Governance
The World of Information Governance Society of Corporate Compliance and Ethics Maggi Johnsen, CRM October 12, 2012 Table of Contents What is Information Governance (IG)? What Might Lead to an IG Failure?
UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES
UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES CONCEPT SEARCHING This document discusses some of the inherent challenges in implementing and maintaining a sound records management
ESRC Research Data Policy
ESRC Research Data Policy Introduction... 2 Definitions... 2 ESRC Research Data Policy Principles... 3 Principle 1... 3 Principle 2... 3 Principle 3... 3 Principle 4... 3 Principle 5... 3 Principle 6...
9. GOVERNANCE. Policy 9.8 RECORDS MANAGEMENT POLICY. Version 4
9. GOVERNANCE Policy 9.8 RECORDS MANAGEMENT POLICY Version 4 9. GOVERNANCE 9.8 RECORDS MANAGEMENT POLICY OBJECTIVES: To establish the framework for, and accountabilities of, Lithgow City Council s Records
P3M3 Portfolio Management Self-Assessment
Procurement Programmes & Projects P3M3 v2.1 Self-Assessment Instructions and Questionnaire P3M3 Portfolio Management Self-Assessment P3M3 is a registered trade mark of AXELOS Limited Contents Introduction
The Department for Business, Innovation and Skills IMA Action Plan PRIORITY RECOMMENDATIONS
PRIORITY RECOMMENDATIONS R1 BIS to elevate the profile of information risk in support of KIM strategy aims for the protection, management and exploitation of information. This would be supported by: Establishing
GARP and how it helps you achieve better information governance
E-Guide GARP and how it helps you achieve better information governance Sponsored By: E-Guide GARP and how it helps you achieve better information governance Table of Contents Resources from IBM Sponsored
Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015
Breaking Down the Silos: A 21st Century Approach to Information Governance May 2015 Introduction With the spotlight on data breaches and privacy, organizations are increasing their focus on information
information Records Management Checklist business people security preservation accountability Foreword Introduction Purpose of the checklist
Records Management Checklist Foreword We fi rst developed the Records Management Checklist in 2008 to complement our performance audit Records Management in the Victorian Public Sector. At that time the
Assessing Your Information Technology Organization
Assessing Your Information Technology Organization Are you running it like a business? By: James Murray, Partner Trey Robinson, Director Copyright 2009 by ScottMadden, Inc. All rights reserved. Assessing
Blackhawk Technical College. Information Technology Services. Process Improvement Visioning Document
Blackhawk Technical College Information Technology Services Process Improvement Visioning Document December 12, 2008 Steven Davidson Chief Information Officer Blackhawk Technical College [email protected]
Records Management Policy
Records Management Policy Responsible Officer Chief Operating Officer Approved by Vice-Chancellor Approved and commenced April, 2014 Review by April, 2017 Relevant Legislation, Ordinance, Rule and/or Governance
Management. Competency Profiles
i Information Management Records Management Competency Profiles March 24 Produced by Information Management Branch Government and Program Support Services Division Alberta Government Services 3 rd Floor,
The PNC Financial Services Group, Inc. Business Continuity Program
The PNC Financial Services Group, Inc. Business Continuity Program 1 Content Overview A. Introduction Page 3 B. Governance Model Page 4 C. Program Components Page 4 Business Impact Analysis (BIA) Page
Implementation of a Quality Management System for Aeronautical Information Services -1-
Implementation of a Quality Management System for Aeronautical Information Services -1- Implementation of a Quality Management System for Aeronautical Information Services Chapter IV, Quality Management
Business Continuity / Disaster Recovery Context
Capability Business Continuity / Disaster Recovery Context What is Business Continuity? The Business Continuity Program Life Cycle Copyright: Virtual Corporation, 1994 2006 Modified U.S. DoD Graphic Normal
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
An Oracle White Paper. December 2011. Cloud Computing Maturity Model Guiding Success with Cloud Capabilities
An Oracle White Paper December 2011 Cloud Computing Maturity Model Guiding Success with Cloud Capabilities Executive Overview... 3 Introduction... 4 Cloud Maturity Model... 4 Capabilities and Domains...
Agenda. You are not in the business to manage records
Global Records and Information Management Risk: Proactive and Practical Approaches to Effective Records Management September 16, 2014 Maura Dunn, MLS, CRM Lee Karas, MBA Agenda Drivers for your Records
The challenges of becoming a Trusted Digital Repository
The challenges of becoming a Trusted Digital Repository Annemieke de Jong is Preservation Officer at the Netherlands Institute for Sound and Vision (NISV) in Hilversum. She is responsible for setting out
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
STANDARD. Risk Assessment. Supply Chain Risk Management: A Compilation of Best Practices
A S I S I N T E R N A T I O N A L Supply Chain Risk Management: Risk Assessment A Compilation of Best Practices ANSI/ASIS/RIMS SCRM.1-2014 RA.1-2015 STANDARD The worldwide leader in security standards
44-76 mix 2. Exam Code:MB5-705. Exam Name: Managing Microsoft Dynamics Implementations Exam
44-76 mix 2 Number: MB5-705 Passing Score: 800 Time Limit: 120 min File Version: 22.5 http://www.gratisexam.com/ Exam Code:MB5-705 Exam Name: Managing Microsoft Dynamics Implementations Exam Exam A QUESTION
Reliable Business Data Implementing A Successful Data Governance Strategy with Enterprise Modeling Standards
Reliable Business Data Implementing A Successful Data Governance Strategy with Enterprise Modeling Standards All Rights Reserved Welcome! Let Me Introduce Myself Marcie Barkin Goodwin President & CEO Axis
Queensland recordkeeping metadata standard and guideline
Queensland recordkeeping metadata standard and guideline June 2012 Version 1.1 Queensland State Archives Department of Science, Information Technology, Innovation and the Arts Document details Security
UNIVERSITY OF MANITOBA PROCEDURE
UNIVERSITY OF MANITOBA PROCEDURE Procedure: Parent Policy: Effective Date: June 23, 2015 Revised Date: Review Date: June 23, 2025 Approving Body: Authority: Responsible Executive Officer: Delegate: Contact:
An Oracle White Paper September 2013. SOA Maturity Model - Guiding and Accelerating SOA Success
An Oracle White Paper September 2013 SOA Maturity Model - Guiding and Accelerating SOA Success Executive Overview... 2 Introduction... 2 SOA Maturity Model... 2 Capabilities and Domains... 2 Maturity...
Version 1.0. 18 February, 2009. Authored by: Alan Pelz Sharpe. Apoorv Durga. David Smigiel. Erik Hartman. Tony Byrne
Version 1.0 18 February, 2009 Authored by: Alan Pelz Sharpe Apoorv Durga David Smigiel Erik Hartman Tony Byrne Licensed under Creative Commons 2009 Wipro CMS Watch Hartman Table of Contents About the Initial
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems
Information Management Advice 18 - Managing records in business systems Part 1: Checklist for decommissioning business systems Introduction Agencies have systems which hold business information, such as
Information Management Strategic Plan - Methodology
OVERVIEW: According to ISO 15489-1 and -2 Information and Documentation Records Management, Part 1 (General) and Part 2 (Guidelines), in order to design and implement sustainable record systems, a design
State Records Guideline No 25. Managing Information Risk
State Records Guideline No 25 Managing Information Risk Table of Contents 1 Introduction... 4 1.1 Purpose... 4 1.2 Authority... 4 2 Risk Management and Information... 5 2.1 Overview... 5 2.2 Risk management...
PHASE 9: OPERATIONS AND MAINTENANCE PHASE
PHASE 9: OPERATIONS AND MAINTENANCE PHASE During the Operations and Maintenance Phase, the information system s availability and performance in executing the work for which it was designed is maintained.
Real World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
ENTERPRISE RISK MANAGEMENT FRAMEWORK
ENTERPRISE RISK MANAGEMENT FRAMEWORK COVENANT HEALTH LEGAL & RISK MANAGEMENT CONTENTS 1.0 PURPOSE OF THE DOCUMENT... 3 2.0 INTRODUCTION AND OVERVIEW... 4 3.0 GOVERNANCE STRUCTURE AND ACCOUNTABILITY...
Supplier Quality Management System Audit Checklist (ISO 9000:2000, TS 16949:2002)
Supplier Quality Management System Audit Checklist (ISO 9000:2000, TS 16949:2002) Supplier: Plant/Location: Date: Audit Team: Scope of Audit: Number of C.A.R. s: Corrective Action Due: Potential suppliers
ARMA: Information Governance: A Revenue Source Potential
ARMA: Information Governance: A Revenue Source Potential Presenter: Martin Tuip Executive Director for IG Products ARMA International Agenda About ARMA International What is Information Governance? Generally
Sound Transit Internal Audit Report - No. 2014-3
Sound Transit Internal Audit Report - No. 2014-3 IT Project Management Report Date: Dec. 26, 2014 Table of Contents Page Background 2 Audit Approach and Methodology 2 Summary of Results 4 Findings & Management
HR Function Optimization
HR Function Optimization People & Change Advisory Services kpmg.com/in Unlocking the value of human capital Human Resources function is now recognized as a strategic enabler, aimed at delivering sustainable
Defensible Disposition Strategies for Disposing of Structured Data - etrash
Defensible Disposition Strategies for Disposing of Structured Data - etrash Presented by John Isaza, Esq., FAI Co-Founder & CEO, Information Governance Solutions, LLC Tom Reding, CRM Executive Consultant,
Digital Preservation Strategy, 2012-2015
Digital Preservation Strategy, 2012-2015 Preface This digital preservation strategy sets out what the National Library of Wales (NLW) intends to do to preserve digital materials over the next three years.
Successful Implementation of Enterprise-Wide Information Governance
Successful Implementation of Enterprise-Wide Information Governance ARMA Austin Monthly Meeting November 13, 2014 TAD C. HOWINGTON, CRM, FAI Manager, E- Records and Information Governance Kinder- Morgan
Succeeding with Business Process Outsourcing
A P P L I C A T I O N S A WHITE PAPER SERIES COMPANIES ARE SEEKING NEW WAYS TO STREAMLINE PROCESSES, REALIZE FURTHER COST REDUCTIONS AND INCREASE TIME-TO-MARKET. MANY ORGANIZATIONS ARE CONSIDERING BUSINESS
Benefits of conducting a Project Management Maturity Assessment with PM Academy:
PROJECT MANAGEMENT MATURITY ASSESSMENT At PM Academy we believe that assessing the maturity of your project is the first step in improving the infrastructure surrounding project management in your organisation.
Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010
Public Record Office Victoria PROS 10/10 Strategic Management Guideline 5 Records Management Strategy Version Number: 1.0 Issue Date: 19/07/2010 Expiry Date: 19/07/2015 State of Victoria 2010 Version 1.0
A Practical Guide for Creating an Information Management Strategy and Strategic Information Management Roadmap
A Practical Guide for Creating an Information Management Strategy and Strategic Information Management Roadmap Principal Author Sam McCollum, CRM, MBA Director of End User Consulting Parity Research LLC
Contents. viii. 4 Service Design processes 57. List of figures. List of tables. OGC s foreword. Chief Architect s foreword. Preface.
iii Contents List of figures List of tables OGC s foreword Chief Architect s foreword Preface Acknowledgements v vii viii 1 Introduction 1 1.1 Overview 4 1.2 Context 4 1.3 Purpose 8 1.4 Usage 8 2 Management
CMMI for Development Introduction & Implementation Roadmap
www.businessbeam.com CMMI for Development Introduction & Implementation Roadmap Business Beam (Pvt.) Limited Today 1 About CMMI for Development 2 Implementation Roadmap 3 CMMI & Business Beam 2 About CMMI
North Carolina Digital Preservation Policy. April 2014
North Carolina Digital Preservation Policy April 2014 North Carolina Digital Preservation Policy Page 1 Executive Summary The North Carolina Digital Preservation Policy (Policy) governs the operation,
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
WHITE PAPER The IT Manager's Role in Proactive Information Retention and Disposition Management: Balancing ediscovery and Compliance Obligations with IT Operational and Budget Constraints Sponsored by:
Feet On The Ground: A Practical Approach To The Cloud Nine Things To Consider When Assessing Cloud Storage
Feet On The Ground: A Practical Approach To The Cloud Nine Things To Consider When Assessing Cloud Storage by seth anderson consultant audiovisual preservation solutions 2014 AVPreserve Media Archiving
Well File Management: Using a Maturity Model to Increase Value
Well File Management: Using a Maturity Model to Increase Value Agenda Introductions History of Well Files Well File Maturity Model Question and Answer Page 2 Noah Consulting About Us Founded by information
Cloud Computing in a Regulated Environment
Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2
Implementing Enterprise Information Governance: A Practical Approach
Implementing Enterprise Information Governance: A Practical Approach TAD C. HOWINGTON, CRM, CA, FAI MANAGER, RECORDS AND INFORMATION COPANO ENERGY HOUSTON, TEXAS 512.627.9181 Learning Objectives Upon completion
ITSM Process Maturity Assessment
ITSM Process Maturity Assessment April 2011 Prepared by: Brian Newcomb TABLE OF CONTENTS Executive Summary... 3 Detailed Assessment Results and Recommendations... 5 Advisory Group Survey Results (External
Best Value toolkit: Information management
Best Value toolkit: Information management Prepared by Audit Scotland July 2010 Contents Introduction 2 The Audit of Best Value 2 The Best Value toolkits 4 Using the toolkits 4 Auditors evaluations 5 Best
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization
Internal Quality Management System Audit Checklist (ISO9001:2015) Q# ISO 9001:2015 Clause Audit Question Audit Evidence 4 Context of the Organization 4.1 Understanding the organization and its context
ISO 9001 (2000) QUALITY MANAGEMENT SYSTEM ASSESSMENT REPORT SUPPLIER/ SUBCONTRACTOR
Page 1 of 20 ISO 9001 (2000) QUALITY MANAGEMENT SYSTEM ASSESSMENT REPORT SUPPLIER/ SUBCONTRACTOR SUPPLIER/ SUBCONTRACTOR NAME: ADDRESS: CITY AND STATE: ZIP CODE: SUPPLIER/MANUFACTURER NO PHONE: DIVISION:
Application Overhaul. Key Initiative Overview
Scott D. Nelson Research Managing Vice President This overview provides a high-level description of the Application Overhaul Key Initiative. IT leaders can use this guide to understand how to develop an
ICH guideline Q10 on pharmaceutical quality system
September 2015 EMA/CHMP/ICH/214732/2007 Committee for Human Medicinal Products Step 5 Transmission to CHMP May 2007 Transmission to interested parties May 2007 Deadline for comments November 2007 Final
A DESIGN SCIENCE APPROACH TO DEVELOP A NEW COMPREHENSIVE SOA GOVERNANCE FRAMEWORK
A DESIGN SCIENCE APPROACH TO DEVELOP A NEW COMPREHENSIVE SOA GOVERNANCE FRAMEWORK Fazilat Hojaji 1 and Mohammad Reza Ayatollahzadeh Shirazi 2 1 Amirkabir University of Technology, Computer Engineering
ECM Rescue Recovering Failed Project - Top 10 Reasons
ECM Rescue Recovering from a Failed Implementation 17-Oct-08 Greg Clark, MBA AIIM International Conference 2009 2008 C3 Associates Inc. April 1, 2009 Agenda 1. Introduction (5 minutes) 2. Building the
USGS Guidelines for the Preservation of Digital Scientific Data
USGS Guidelines for the Preservation of Digital Scientific Data Introduction This document provides guidelines for use by USGS scientists, management, and IT staff in technical evaluation of systems for
IT Services Management Service Brief
IT Services Management Service Brief Service Continuity (Disaster Recovery Planning) Prepared by: Rick Leopoldi May 25, 2002 Copyright 2002. All rights reserved. Duplication of this document or extraction
Row Manufacturing Inc. Quality Manual ISO 9001:2008
Row Manufacturing Inc. Quality Manual ISO 9001:2008 Row Manufacturing 210 Durham Drive Athens, Alabama 35611 Phone:256.232.4151 Fax:256.232.4133 Page 2 of 33 This Page intentionally left Blank Page 3 of
Revised October 2013
Revised October 2013 Version 3.0 (Live) Page 0 Owner: Chief Examiner CONTENTS: 1. Introduction..2 2. Foundation Certificate 2 2.1 The Purpose of the COBIT 5 Foundation Certificate.2 2.2 The Target Audience
Integrated Information Services (IIS) Strategic Plan
Integrated Information Services (IIS) Strategic Plan Preamble Integrated Information Services (IIS) supports UCAR/NCAR/UCP efforts to both manage, preserve, and provide access to its scholarship for the
Title: Rio Tinto management system
Standard Rio Tinto management system December 2014 Group Title: Rio Tinto management system Document No: HSEC-B-01 Standard Function: Health, Safety, Environment and Communities (HSEC) No. of pages: 23
W H I T E P A P E R E X E C U T I V E S U M M AR Y S I T U AT I O N O V E R V I E W. Sponsored by: EMC Corporation. Laura DuBois May 2010
W H I T E P A P E R E n a b l i n g S h a r e P o i n t O p e r a t i o n a l E f f i c i e n c y a n d I n f o r m a t i o n G o v e r n a n c e w i t h E M C S o u r c e O n e Sponsored by: EMC Corporation
How To Be An Architect
February 9, 2015 February 9, 2015 Page i Table of Contents General Characteristics... 1 Career Path... 3 Typical Common Responsibilities for the ure Role... 4 Typical Responsibilities for Enterprise ure...
Certified Information Professional 2016 Update Outline
Certified Information Professional 2016 Update Outline Introduction The 2016 revision to the Certified Information Professional certification helps IT and information professionals demonstrate their ability
White paper. Corrective action: The closed-loop system
White paper Corrective action: The closed-loop system Contents Summary How corrective action works The steps 1 - Identify non-conformities - Opening a corrective action 6 - Responding to a corrective action
INFORMATION GOVERNANCE Principles for Healthcare (IGPHC)
INFORMATION GOVERNANCE Principles for Healthcare (IGPHC) AHIMA 3 INFORMATION GOVERNANCE Principles for Healthcare (IGPHC) Preamble...3 Principle of Accountability...5 Principle of Transparency...6 Principle
Harvard Library Preparing for a Trustworthy Repository Certification of Harvard Library s DRS.
National Digital Stewardship Residency - Boston Project Summaries 2015-16 Residency Harvard Library Preparing for a Trustworthy Repository Certification of Harvard Library s DRS. Harvard Library s Digital
ISO 9001:2000 AUDIT CHECKLIST
ISO 9001:2000 AUDIT CHECKLIST No. Question Proc. Ref. Comments 4 Quality Management System 4.1 General Requirements 1 Has the organization established, documented, implemented and maintained a quality
