The Inventory Maturity Model for Information Governance



Similar documents
From Information Management to Information Governance: The New Paradigm

Generally Accepted Recordkeeping Principles

Leveraging a Maturity Model to Achieve Proactive Compliance

Generally Accepted Recordkeeping Principles How Does Your Program Measure Up?

How the Information Governance Reference Model (IGRM) Complements ARMA International s Generally Accepted Recordkeeping Principles (GARP )

Information Governance Challenges and Solutions

GOVERNANCE DEFINED. Governance is the practice of making enterprise-wide decisions regarding an organization s informational assets and artifacts

September Tsawwassen First Nation Policy for Records and Information Management

Information Governance Workshop. David Zanotta, Ph.D. Vice President, Global Data Management & Governance - PMO

Access Control BUSINESS REQUIREMENTS FOR ACCESS CONTROL

Transform HR into a Best-Run Business Best People and Talent: Gain a Trusted Partner in the Business Transformation Services Group

Mobilize SharePoint Securely: Top 5 Enterprise Requirements

How To Manage E-Discovery

Project Management Office: Seeing the Whole Picture

Successful Implementation of Enterprise-Wide Information Governance

Cohasset Associates, Inc. NOTES Managing Electronic Records Conference 1.1. The discipline of analyzing the. Value Costs and Risks

GOVERNANCE AND MANAGEMENT OF CITY COMPUTER SOFTWARE NEEDS IMPROVEMENT. January 7, 2011

The Business Case for Enterprise Content Management. A Collection of Enterprise Content Management (ECM) and Document Management Research Data

Feature. Developing an Information Security and Risk Management Strategy

Mergers and Acquisitions: The Data Dimension

ANALYTICS PAYS BACK $13.01 FOR EVERY DOLLAR SPENT

Internal Audit. Audit of HRIS: A Human Resources Management Enabler

Symantec NetBackup 7.5 for VMware

Private Cloud: Key considerations for an insurance agency

Developing a Records Retention Program

Organizational Restructuring Toolkit

IT Governance Regulatory. P.K.Patel AGM, MoF

University of Hawai i Executive Policy on Data Governance (Draft 2/1/12)

Identify and Protect Your Vital Records

Enabling IT Performance & Value with Effective IT Governance Assessment & Improvement Practices. April 10, 2013

Governance, Risk, and Compliance (GRC) White Paper

Maximizing Your IT Value with Well-Aligned Governance August 3, 2012

The Ultimate Guide to Buying HR Software for your Growing Business. Get your decision right with this step-by-step guide!

Basic Records Management Practices for Saskatchewan Government*

Administrative Procedures Memorandum A2005

Take the right steps 9 principles for building the Risk Intelligent Enterprise

Business Intelligence and Analytics: Leveraging Information for Value Creation and Competitive Advantage

How To Get Rid Of A Collection Of Disparate Systems

Human Capital Management: Leveraging Your Human Assets

The Business Case for Enterprise Content Management. A Collection of Enterprise Content Management (ECM) and Document Management Research Data

AV-20 Best Practices for Effective Document and Knowledge Management

The Business Case for HP ControlPoint

THE NEXT GENERATION OF HR SHARED SERVICES SUBHEADLINE RUNS HERE AND HERE AND HERE AND HERE

Information Governance 2.0 A DOCULABS WHITE PAPER

HR Field Guide: 5 Tips To Effective Succession Planning

The IBM data governance blueprint: Leveraging best practices and proven technologies

Integrated archiving: streamlining compliance and discovery through content and business process management

Webinar: Chart of Accounts Alignment through Information Governance

PROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data.

The IBM Data Governance Council Maturity Model: Building a roadmap for effective data governance

ISO Controls and Objectives

Enterprise IT Portfolio Governance and Management Model

Enterprise Data Management

fmswhitepaper Why community-based financial institutions should practice enterprise risk management.

Why You Still Need to Master Your Data Before You Master Your Business (Intelligence) Business Imperatives Addressed By Reliable, Integrated View

Data Governance for Master Data Management and Beyond

SAME PRINCIPLES APPLY, BUT NEW MANDATES FOR CHANGE

building a business case for governance, risk and compliance

CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.

Best Practices for Long-Term Retention & Preservation. Michael Peterson, Strategic Research Corp. Gary Zasman, Network Appliance

An RCG White Paper The Data Governance Maturity Model

The Value of Vulnerability Management*

The Data Governance Maturity Model

Security Solutions in the Aerospace/Defense Industry A Pinkerton Government Services White Paper

Fortune 500 Medical Devices Company Addresses Unique Device Identification

Agenda. You are not in the business to manage records

ISO27001 Controls and Objectives

White Paper March Government performance management Set goals, drive accountability and improve outcomes

1. The records have been created, sent or received in connection with the compilation.

Information Governance for Healthcare Executives. Lesley Kadlec, MA, RHIA Lydia Mays Washington, MS, RHIA, CPHIMS

ARMA: Information Governance: A Revenue Source Potential

Transcription:

The Inventory Maturity Model for Information Governance Challenges Information Governance has a significant impact on business The absence of solid Information Governance is told in fines, lawsuits, and missed opportunities The ad hoc approach is too costly Takeaways In This White Paper Overview Maturity Model Defined The Maturity Model: A Closer Look at Process, Management and Resources Inventory Redux About IG Mapware and the Authors The 5 levels of inventory maturity The definitions of each level The significance of each level to a business, looking at the key areas of: Responsibility Process Formats Stewardship Duplication Overall Information Governance

Information Governance: The Activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs. Source: Information Governance Initiative Annual Report, 2014. 1 Overview and costs. 1 Information governance practice has a huge impact on businesses the absence of good costs. information 1 governance practice is told in fines, lawsuits and missed opportunities for efficiency and profit. Today s business environments and big bucket retention systems have created a false sense of confidence and the mistaken impression that the establishment of company-wide information governance inventories is too old school in this age of databases and hosted applications. Yet, the process of memorializing the information inventory is more important than ever. Up-to-date tools for storing and sharing information are only part of the equation what remains is to systematically assess where all the information is, how it is managed, and by whom. This creates the need for assessment tools such as the Information Governance Inventory Maturity Model. The ad hoc approach is simply too costly. Maturity Model Overview The foundation for effective information governance, which provides for the appropriate management of information, is the identification of all information assets: documents, records, content, data, etc. This inventory provides the framework for implementing information governance. The inventory process has many levels, from human resources to technology systems to management processes. The inventory maturity model addresses the maturity levels in six areas, and details how criteria are defined for each maturity level from chaotic to completely optimized. The maturity levels are:

Maturity Level 1 Chaotic The lowest maturity level is uncontrolled chaos, at which the organization is vulnerable to risks such as regulatory fines, negative audit outcomes and other costly inefficiencies. Maturity Level 2 Repeatable This maturity level contains some repeatable processes and functions, although the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The resulting inefficiencies are costly, but moderately less than in the chaotic maturity level. Maturity Level 3 Repeatable In this maturity level we find much more definition of both processes and functions. This is where the majority of organizations are today, having moved from a hardcopy information governance model to one that includes electronic information. This move is often driven by risk and usually pertains to only portions of the organization s electronic information. This level of maturity indicates that the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The inefficiencies at this level can be costly, but much less so than in previous levels. Maturity Level 4 Managed In this maturity level we move from a defined to a managed process, which brings oversight including audits. This is where more tightly regulated and forwardthinking organizations are today. A distinguishing factor of organizations at this maturity level is the presence of a comprehensive inventory of all electronic information in the organization. These organizations minimize the risks related to producing information and achieve significant cost savings by eliminating inefficiencies and redundancies.

Maturity Level 5 Optimized The highest level of maturity is totally sustainable, integrated and transparent. Organizations that have achieved this level of maturity are able to implement their information governance programs effectively for all information formats and locations. This level of maturity ensures that there are minimal risks related to producing information. Significant ROI is realized through business process improvement and technology deployments that are based on the inventory data.

The Maturity Model: A Closer Look at Process, Management and Resources Each level of the Maturity Model is characterized by distinct criteria regarding an organization s management processes and resources. In the following section, these criteria in six areas Responsibility, Process, Format, Stewardship, Duplication and Information Governance will be detailed for each level of organizational maturity.

Maturity Level 1 Chaotic The lowest maturity level is uncontrolled chaos, at which the organization is vulnerable to risks such as regulatory fines, negative audit outcomes and other costly inefficiencies. Responsibility: Responsibility levels for the identification of the organization s information assets are not defined. If they exist at all, they are both need-based and reactive. Example: Assigning responsibility to know where particular assets are for a divestiture or lawsuit. Process: The process of identifying information assets is uncontrolled, varying from one area to another based on need. The privacy officer might have a spreadsheet of the locations for private information, but these are isolated and inconsistent. Formats: The lowest level of maturity will generally focus on inactive records stored off-site, at a commercial records center or company-owned facility. There is no identification of records that exist in electronic formats, regardless of their location. Stewardship: The importance of knowing the stewards of information is not recognized, and if there are stewards identified, it is a by-product of any process for sending hardcopy records off-site. Identifying the steward for a particular type of electronic record would not be possible at this stage. Duplication: Categories of information are identified with isolated instances of deduplicating as part of sending records off-site. Duplication between the electronic and hardcopy versions of records would not be available. Information Governance: There is no identification of the organization s assets the foundational process for information governance. Any information governance would be executed without identifying resources for the organization s categories of information. Maturity Level 2 Repeatable This maturity level contains some repeatable processes and functions, although the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The resulting inefficiencies are costly, but moderately less than in the chaotic maturity level. Responsibility: Responsibility levels for the identification of the organization s information assets are done departmentally, or in silos. Example: An attorney insuring that the legal department knows what their categories of information are, but with no other groups in the organization having the same level of identification for their information assets.

Process: The process of identifying information assets is standardized, but the execution of this standardization is inconsistent. The group in charge of physical security might know, using a standard format, where the company s hardcopy proprietary information is located. However, the organization s electronic proprietary information is unidentified. Formats: In Maturity Level 2, both the active and inactive hardcopy information assets are identified for organized departmental centralized files and off-site storage. The hardcopy in individual offices is not identified. For example, there would be organizational knowledge of all HR personnel files that are both active and inactive; however, there would be no identification of electronic data about employees that is tracked in the payroll system. Stewardship: The stewards of hardcopy information assets are identified for departments, but this does not extend to electronic information. Example: the company has access to the names of all stewards responsible for hardcopies of executed contracts. Duplication: There is more content identified at the second level of maturity; however, this identification is isolated and does not seek to identify duplication. Information Governance: There is no comprehensive identification of the organization s assets. Information governance is ad hoc. For example, certain hardcopy records are kept locked because there is identification of all proprietary and confidential hardcopy records. Maturity Level 3 Defined In this maturity level we find much more definition of processes and functions. This is where the majority of organizations are today, having moved from a hardcopy information governance model to one that includes electronic information. This move is often driven by risk and usually pertains to only portions of the organization s electronic information. This level of maturity indicates that the organization is still vulnerable to risks such as regulatory fines and negative audit/litigation outcomes. The inefficiencies at this level can be costly, but much less so than in previous levels. Responsibility: There is recognition of the need for central coordination, and responsibility is assigned and staffed. Often the centralized responsibility is not staffed at the level necessary for the proper identification of the organization s information assets, and the process is never completed and rarely updated. Process: The process for inventorying is standardized and consistent. This might involve using an enterprise-wide spreadsheet or database to memorialize the

information. The process does not include provisions for periodic updates. If there was a divestiture, the information that was divested might not be memorialized. Formats: The vast majority of information in today s organizations is electronic. At this maturity level, there is an attempt to address electronic information based on its level of risk. For some, this could be email; for others, their electronic accounting/financial information. A significant percentage of the electronic information would not be addressed. Stewardship: During the inventory, the stewards of each information asset would be identified. This would relate to both hardcopy and high-risk electronic records. Because a large volume of electronic information would not be identified, neither would the stewards be identified. The stewards of financial and accounting electronic information would be identified, but the lower-risk electronic information related to human resources would not be identified. Duplication: At this maturity level there is a deliberate effort to identify the information assets and areas of duplication. This includes duplicates throughout the enterprise and media duplicates that could exist within departments. If the records related to a project exist in both electronically and in hardcopy, this is identified. Information Governance: The identification of the organization s assets establishes the framework for information governance. Information governance is applied to various silos based on risk. For example, an organization may audit the protection of both private information and confidential information against the data contained in the inventory. Maturity Level 4 Managed At this maturity level we move from a defined to a managed process, which brings oversight including audits. This is where more tightly regulated and forwardthinking organizations are today. A distinguishing factor of organizations at this maturity level is the presence of a comprehensive inventory of all electronic information in the organization. These organizations minimize the risks related to producing information and achieve significant cost savings by eliminating inefficiencies and redundancies. Responsibility: There is central management, with responsibility assigned and staffed. Departments are responsible for participating in the inventory process and maintaining the inventory with management oversight. The maintenance activity is done both on a scheduled and an as needed basis. Process: The process for inventorying is standardized and consistent; it is sustainable, supported by a centralized database that tracks the initial data and any changes to

the data. The process is sustainable because it supports both ad hoc changes as well as data validation done on a prescribed schedule. Formats: The vast majority of information in today s organizations is electronic. At this maturity level, all electronic information in the enterprise is inventoried, including databases, Internet/intranet, desktop, email, social media, etc. Stewardship: During the inventory, the stewards of each information asset are identified. This includes all electronic information assets. The stewardship differentiates between electronic information that is controlled by the IT department, e.g., ERP systems data, and electronic information that is controlled by departments, e.g., Access/Lotus databases. The stewardship role is defined to include responsibilities applicable to information governance at the department level. Duplication: At Maturity Level 4, there is a deliberate effort to identify all information assets and areas of duplication. This includes duplicates throughout the enterprise and media duplicates within a department, including all electronic information. There is a deliberate effort to analyze this data and to de-duplicate it. Information Governance: Information governance is applied enterprise-wide and is not based on risk. Information governance compliance is audited on a regular schedule against the data contained in the inventory. Maturity Level 5 Optimized The highest level of maturity is totally sustainable, integrated and transparent. Organizations that have achieved this level of maturity are able to implement their information governance programs effectively for all information formats and locations. This level of maturity ensures that there are minimal risks related to producing information. Significant ROI is realized through business process. Responsibility: There is central management with responsibility that is assigned and staffed. Departments are responsible for participating in the inventory process and maintaining the inventory with management oversight, with maintenance activity being done both when there are changes and on a prescribed schedule. There is enterprise oversight of the activity, and it is budgeted and supported at the highest levels of the organization. Process: The process for inventorying is standardized and consistent; it is also sustainable. The process is supported by a centralized database that tracks the initial data and any changes to the data. The optimized maturity level includes inventory integration with other systems to insure information governance consistency. Example: The integration of privacy and security classifications into ECM and RMS solutions.

Formats: At this maturity level, all electronic and hardcopy information in the enterprise is inventoried, including databases, Internet/intranet, desktop, email, social media, etc. In addition to inventorying information in the enterprise, all information assets related to core business functions that are in the custody of third parties are inventoried. This could include worker compensation claims handled by outside third parties, specialized safety training tracked by third parties, etc. Stewardship: During the inventory, the stewards of each information asset are identified. This includes all electronic information assets. In addition to the stewards within the enterprise, the stewards for information in the custody of third parties are identified. The stewardship role is defined to include responsibilities applicable to information governance at the department level. Additionally, any information stewardship roles and responsibilities for third party stewards are memorialized contractually. Duplication: At this maturity level there is a deliberate effort to identify the information assets and instances of duplication, throughout the enterprise and within departments. It includes all electronic information and information in the custody of third parties. All data is systematically analyzed and de-duplicated. Governance: The identification of the organization s assets establishes the framework for information governance. Information governance is applied enterprise-wide, and is not based on risk. The inventory is a totally transparent process throughout the enterprise. Information governance compliance is audited on a regular schedule against the data contained in the inventory. Inventory Redux Although some consider the information inventory to be old school, it remains absolutely essential in today s information environment. As organizations focus on information governance, they realize that it requires a knowledge base of the organization s information assets, and that the information inventory is the cornerstone for building an effective information governance practice that defuses liabilities and increases cost efficiency. Once this centralized asset is created, only then can an organization attack the systematized layers of better information governance and reap the rewards. About IG Mapware IG Mapware is a comprehensive, easy-to-use database for information asset inventory and data mapping. Designed by industry experts, IG Mapware offers multiple views of all your information assets in one place (electronic documents, emails, hard copies,

information at third parties, etc.), so you can quickly identify the value and risks associated with your information. As a cloud-based service, you can easily scale IG Mapware to your unique needs without internal technical support. IG Mapware is affordable, comprehensive and evergreen, making it a smart foundation for your information governance programs. Professional services are also available. IG Mapware s clients range from Fortune 500 companies to public agencies with 200 employees. Learn more at www.igmapware.com. About Jeanne Caldwell Jeanne Caldwell is the chief executive officer of IG Mapware. She s spent her career helping organizations establish a smart foundation for their information governance, strengthen their compliance and records programs, and make better use of their time. Jeanne is a proven innovator in software for the records and information management field. Her firm pioneered the functional big bucket approach to retention schedules, along with one of the first barcode-enabled, file tracking software applications. Jeanne brings more than 20 years of information governance experience to each IG Mapware implementation. Her deep expertise ensures that IG Mapware can be adapted to and meet the strategic needs of your legal, IT and compliance departments. Jeanne is a national speaker and a program coordinator for the local chapter of ARMA, the international professional association for information governance and records management. She regularly gives back to the community. She can be reached at jeanne@igmapware.com.