Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
WORKING THE IT/RIM RELATIONSHIP Helen Streck Records Management Consultant Shook, Hardy & Bacon LLP February 2009
<ul><li>Anybody who tells you that a relationship does not require work  </li></ul><ul><li>is not in one </li></ul>
Agenda <ul><li>Speaker Introduction  </li></ul><ul><li>Where are Organizations Today? </li></ul><ul><li>Bringing RIM to th...
Introduction  <ul><li>RIM Professional for 23 years </li></ul><ul><li>7 years consulting experience </li></ul><ul><li>Deve...
Where are Organizations Today?
Eliminating Dissatisfaction <ul><li>Systems are not “functioning they way the business thought it would. </li></ul><ul><li...
Bringing RIM to the Table <ul><li>What is RIM? </li></ul><ul><ul><li>Systematic controls - Process </li></ul></ul><ul><ul>...
Importance of Both at the Table <ul><li>Why do I need to see all sides of an issue? </li></ul><ul><li>There can be competi...
Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors More and more information is...
Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors Increased likelihood that in...
RIM’s Value to IT <ul><li>Controls </li></ul><ul><ul><li>Define policy and retention </li></ul></ul><ul><ul><li>Define acc...
Types of Relationships <ul><li>What we are NOT talking about </li></ul><ul><ul><li>Weddings </li></ul></ul><ul><ul><li>Hol...
IT/RIM Relationships Needed <ul><li>Business partnerships </li></ul><ul><li>Committee cross-memberships </li></ul><ul><li>...
<ul><li>Policy, Standards, SOPs </li></ul><ul><li>Records Retention Schedules  </li></ul><ul><li>Common Glossary and Docum...
In Summary <ul><li>Successful RIM projects need IT </li></ul><ul><li>Successful IT projects need RIM </li></ul><ul><li>Dri...
Questions
Upcoming SlideShare
Loading in …5
×

February 2009 Working the IT/RIM Relationship Presentation by Helen Streck

690 views

Published on

Published in: Technology, Business
  • Be the first to comment

February 2009 Working the IT/RIM Relationship Presentation by Helen Streck

  1. 1. WORKING THE IT/RIM RELATIONSHIP Helen Streck Records Management Consultant Shook, Hardy & Bacon LLP February 2009
  2. 2. <ul><li>Anybody who tells you that a relationship does not require work </li></ul><ul><li>is not in one </li></ul>
  3. 3. Agenda <ul><li>Speaker Introduction </li></ul><ul><li>Where are Organizations Today? </li></ul><ul><li>Bringing RIM to the Table </li></ul><ul><li>Driving Forces, Risks, Success Factors </li></ul><ul><li>Types of Relationships </li></ul><ul><li>Business Relationship More than Co-Existing </li></ul><ul><li>Working the Relationship </li></ul><ul><li>Value Achieved for the Organization </li></ul><ul><li>In Summary </li></ul>
  4. 4. Introduction <ul><li>RIM Professional for 23 years </li></ul><ul><li>7 years consulting experience </li></ul><ul><li>Developed programs for a variety of industries </li></ul><ul><li>Developed Business Cases </li></ul><ul><ul><li>Records Management Software </li></ul></ul><ul><ul><li>Legal Hold Software </li></ul></ul><ul><ul><li>Document Management Systems </li></ul></ul><ul><li>Developed business processes to support e-records archiving, system decommissioning, electronic processes for legal hold creation/distribution </li></ul><ul><li>Worked on governance for addressing abandoned data </li></ul>
  5. 5. Where are Organizations Today?
  6. 6. Eliminating Dissatisfaction <ul><li>Systems are not “functioning they way the business thought it would. </li></ul><ul><li>The business group is still obligated to meet compliance issues and after build there is no “easy” way to comply. </li></ul><ul><li>Adding controls when there is gigabytes, terabytes or pedabytes of data is extremely difficult </li></ul>RIM controls not designed into the build out. Solution Bring RIM into the discussion at the design of a system. RIM need to learn and become familiar with the technology options available and how they will impact compliance.
  7. 7. Bringing RIM to the Table <ul><li>What is RIM? </li></ul><ul><ul><li>Systematic controls - Process </li></ul></ul><ul><ul><li>Lifecycle - Classification/Taxonomies </li></ul></ul><ul><ul><li>Retention - Access Rights </li></ul></ul><ul><ul><li>Security rules - Privacy mandates </li></ul></ul><ul><ul><li>Litigation demands </li></ul></ul><ul><li>What is the value to IT in applying this controls </li></ul>
  8. 8. Importance of Both at the Table <ul><li>Why do I need to see all sides of an issue? </li></ul><ul><li>There can be competing requirements. </li></ul><ul><li>Laws are written years after the technology may have been implemented. </li></ul><ul><li>Rules can be written that technology can NOT apply or automate. </li></ul><ul><li>Uncontrolled growth. </li></ul><ul><li>Increased costs and risks. </li></ul><ul><li>Increased litigation exposure. </li></ul>
  9. 9. Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors More and more information is only in electronic format. Information retention requirements outlast technology solutions. Growth in electronic information volume increases complexity of managing, finding, and using information E-information needed for litigation and retention for global companies may not be accessible for long periods of time. Realistic retention requirements and categorization that is consistently enforced. Information classification and metadata governance models.
  10. 10. Current Driving Forces, Risks and Success Factors Current Drivers Risk/Impact Success Factors Increased likelihood that intellectual capital is lost. Increased litigation around the globe with varying rules for privacy and access. Increased litigation to defend patents and income. Increased need for legal teams across the globe as well as discovery teams to process more and more information increasing costs. Surgical approach to determining relevance. Information security has the appropriate controls and information security classification is clearly defined. Enterprise search tools applied.
  11. 11. RIM’s Value to IT <ul><li>Controls </li></ul><ul><ul><li>Define policy and retention </li></ul></ul><ul><ul><li>Define access and classification standards </li></ul></ul><ul><ul><li>Develop document hierarchy </li></ul></ul><ul><ul><li>Combine glossary of terms into a single language for the organization </li></ul></ul><ul><li>Processes </li></ul><ul><ul><li>Translate policies, requirements and laws into business processes </li></ul></ul><ul><ul><li>Translate business processes into functional requirements </li></ul></ul><ul><ul><li>Advise the business on process changes for improved technology efficiencies </li></ul></ul>
  12. 12. Types of Relationships <ul><li>What we are NOT talking about </li></ul><ul><ul><li>Weddings </li></ul></ul><ul><ul><li>Holiday Events </li></ul></ul><ul><ul><li>Going to each other’s homes </li></ul></ul><ul><ul><li>Agreeing all the time </li></ul></ul><ul><ul><li>Attending children’s functions </li></ul></ul>
  13. 13. IT/RIM Relationships Needed <ul><li>Business partnerships </li></ul><ul><li>Committee cross-memberships </li></ul><ul><li>Advisory relationships </li></ul><ul><li>Champion each other’s value and projects </li></ul><ul><li>Align projects, values, and goals </li></ul><ul><li>Define/confirm functional requirements and translate to technical requirements </li></ul><ul><li>Test and refine RIM governance models and structures </li></ul><ul><li>Education and Training </li></ul>
  14. 14. <ul><li>Policy, Standards, SOPs </li></ul><ul><li>Records Retention Schedules </li></ul><ul><li>Common Glossary and Document Hierarchy Structure </li></ul><ul><li>Distinguishing Archives from Backups </li></ul>Constructing the Governance Developing Workflows and Processes Participating on Teams Applying Rules and Requirements to Technology <ul><li>Designing systems that apply retention requirements </li></ul><ul><li>Designing and implementing a records management system </li></ul><ul><li>Applying the processes designed systematically and appropriately across organization </li></ul><ul><li>Discovery Teams (Law, RIM and IT) </li></ul><ul><li>Technology Implementation teams (Business Unit, RIM and IT) </li></ul><ul><li>Developing RFP and evaluating vendors </li></ul><ul><li>Applying requirements to existing systems/processes (Bus., IT, Legal, Compliance & RIM) </li></ul><ul><li>Information workflows for DMS </li></ul><ul><li>Processes for E-Records Archiving; System Decommissioning </li></ul><ul><li>Terminated Staff Information for Discovery </li></ul><ul><li>Training and Educating Staff Members </li></ul>Areas Where IT/RIM Relationships Co-Exist
  15. 15. In Summary <ul><li>Successful RIM projects need IT </li></ul><ul><li>Successful IT projects need RIM </li></ul><ul><li>Drivers and risks support a working relationship between RIM and IT </li></ul><ul><li>Working the relationship includes being a team member and championing efforts </li></ul><ul><li>Try looking at managing information from both sides, the view is different </li></ul>
  16. 16. Questions

×