2. into seclusion, public disclosure of private facts, publication in
a false light, and breach of
contract/defamation).
8. LO8Explain the extent to which an employer can legally
dictate the off-work acts of its employees.
9. LO9Discuss how advances in technology have impacted
employee privacy.
10. LO10State the key business justifications for employee
monitoring.
11. LO11Explain the most effective means by which to design
and implement a technology use policy.
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-5
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-6
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-8
3. https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-9
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-10
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-11
12. LO12Describe the legal environment that surrounds
employee use of social media technologies.
page 711
Opening Scenarios
SCENARIO 1
Cherita runs a small family medical practice in rural Montana
and is concerned about the skyrocketing costs
of medical malpractice insurance, which her office provides for
all of its full-time physicians. She worries that her
five-physician medical group would suffer a financial disaster if
one of its workers inadvertently transferred the
disease to one of their patients. Therefore, she wants to conduct
a confidential HIV test of each of her present
employees and also all future applicants. Cherita has several
questions. First, what if a physician refuses to take
the test claiming an invasion of privacy? Second, if someone’s
test returns a positive result, can Cherita refuse
to hire that individual or can she discharge an employee without
violating federal laws protecting employees with
disabilities? Third, if an employee’s tests return with a negative
result, but Cherita decides to terminate the
employee anyway, is she liable for the appearance that the
employee is HIV positive and that Cherita terminated
her or him as a consequence of the test results? Fourth, what is
4. the most effective way for Cherita to ensure that
the test results are kept confidential?
SCENARIO 2
Abraham, a real estate agent, has three children, two of whom
are in college. In order to earn extra money
to help with college tuition payments, Abraham (who studied
modern dance during his college career) finds a job
dancing in a club that caters specifically to women. While not
exactly erotic dancing (he keeps all of his clothes
on), it is not ballroom dancing either. Celebrating during a
bachelorette party, one of the partners of the real
estate firm for which Abraham works catches sight of him
dancing. When he arrives at the office the next day,
she calls him into her office and orders him to quit his night
job. She claims that both clients and potential clients
might see him there and he would lose all credibility as a real
estate agent. Does she have a right to require
Abraham to do this as a condition of future employment?
(Presume that he is an employee and not an
independent contractor.)
SCENARIO 3
Kanani receives what appears to be a legitimate email asking
her to click on an embedded link to learn
more about new solar technologies. Though she does not
recognize the name of the sender, she clicks on the
link because she works at a solar panel installation company
and is always excited to learn about the latest
technology. She is also on several listservs so it is not
uncommon for her to receive emails such as this one.
Kanani finds herself looking at a website with photos of
Leonardo DiCaprio that are “not safe/suitable for work”
(NSFW), which may have been Photoshopped images. She is so
5. annoyed by this occurrence that she spends a
few moments looking around the website trying to figure out
how to unsubscribe from its list. After searching for
several minutes with no luck, she leaves the website and goes
back to reading her email. She responds quickly
to a question from her intern and then sends an email to her
teenage daughter reminding her to pick up the dog
from puppy day care on her way home from school. She then
returns to preparing for her upcoming presentation.
A few days later, she receives a warning from her manager for
using employer-owned computer equipment
for personal use, including looking at NSFW materials online
and emailing her daughter. She learns that her
manager was using a program that alerted him any time an
employee viewed certain inappropriate websites. He
also was monitoring her work email account for key words and
her puppy day care was flagged. Kanani is furious
at the invasion of her privacy posed by this computer
monitoring. Does her employer have a right to monitor her
computer use in this way, and how might you suggest she
respond? If you were her manager, how might you
distinguish in your monitoring between appropriate technology
use (if you consider this to be appropriate) and
inappropriate use?
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#lo14-12
Are There Guarantees in Life?
Privacy is a surprisingly vague and disputed value in
contemporary society. With the tremendous
increase in computer technology in recent decades, calls for
greater protection of privacy have
increased. Yet, there is widespread confusion page
6. 712concerning the nature, extent, and value
of privacy. Philosophers have argued that our society cannot
maintain its core values without
simultaneously guaranteeing the privacy of the individual.
Edward Bloustein writes that “an
individual deprived of privacy merges with the mass. His
opinions, being public, tend never to be
different; his aspirations, being known, tend always to be
conventionally accepted ones; his
feelings, being openly exhibited, tend to lose their quality of
unique personal warmth and to
become the feelings of every man. Such a being, although
sentient, is fungible; he is not an
individual.”1
Recent inventions and business methods call attention to the
next step that must be taken for
the protection of the person and for securing to the individual
what Judge Cooley calls the right
“to be let alone.” Instantaneous photographs and newspaper
enterprises have invaded the sacred
precincts of private and domestic life, and numerous mechanical
devices threaten to make good
the prediction that “what is whispered in the closet shall be
proclaimed from the house-tops.”2
Philosopher Chris MacDonald explains that privacy is about
having a realm of personal control
from which others can be excluded at will. In other words, it
has to do with freedom of action,
freedom from the prying eyes of neighbors, governments, or
employers. The more such freedom
we have, the more privacy we have.3
Europeans generally view employee rights using a different
7. perspective from that in the United
States. While Americans view rights of employees in terms of
the protection of their privacy,
Europeans are more likely to perceive their protection with
regard to human dignity, the
employee’s right to be free from embarrassment and
humiliation.4 The result of this distinction is
that European employees generally enjoy a wider range of
freedom from employer intrusion in
the workplace than do U.S. employees. Indeed, some U.S. firms
that engage in business
internationally have found themselves in violation of EU
standards, and subject to hefty fines,
when they applied their privacy rules to employees who were
located in the European Union.
LO1
The concept of privacy as a fundamental right certainly is not
limited to the United States and
Europe. Islamic thought recognizes a fundamental right to
privacy based in the Qur’an, which
instructs: “Do not spy on one another” (49:12); and “Do not
enter any houses except your own
homes unless you are sure of their occupants’ consent” (24:27).
Hadiths (recorded sayings of the
Prophet Mohammed) report that he instructed his followers that
a man should not even enter his
own house suddenly or surreptitiously.5 Ancient Greece already
had laws protecting privacy, and
the Jewish Talmud considers privacy an aspect of one’s
sanctity, providing rules for protecting
one’s home. In fact, the Talmud contains reference to “harm
caused by seeing” (hezeq re’iyyah)
when one intrudes upon another.
8. But do employees actually have a “fundamental right to
privacy” as many believe? The answer
to this question is not as easy as one might presume, given the
wide recognition of employee
rights in the workplace. The right to privacy may not be as
fundamental as employees generally
believe it to be, which makes it all the more important in these
days of advancing information
technology. Computer technology, though largely beneficial,
can have a negative effect on
employees if the easily obtained information is misused,
incorrect, or misleading. Employers now
have a greater capacity to invade an employee’s privacy than
ever before. Among other devices,
there are chairs that can sense and record the time an employee
spends page 713at his or her
desk, computer programs that measure employees’ computer
keystrokes to ensure they are as
productive as they should be, phones that monitor employees’
phone calls, and policies related
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn5
to workplace communication to make sure all communications
are work-related. Monitoring is
9. only increasing in power, ability, and frequency. Worldwide
security and computer monitoring
software revenue totaled $22.1 billion in 2015, a 3.7 percent
increase from 2014.6 But perhaps
there is a greater employer need to monitor employees in the
workplace: according to a study by
the National Retail Federation, in 2014, employee theft cost
retailers nearly $15.2 billion,
accounting for around 34.5 percent of total “retail shrinkage”
(loss of inventory due to employee
theft, shoplifting, paperwork errors, or supplier fraud),
compared with 33.8 percent from
shoplifting.7 Employers may even have good reasons for
seeking seemingly private information
about employees and their activities outside of work: in 2013
there were 22.4 million illicit drug
users aged 18 or older in the United States. The rate of illicit
drug use among those who were
employed ranged from almost 10 percent (those employed on a
full-time basis) to almost 14
percent (those employed on a part time basis).8 Drug use in
American industry costs employers
approximately $250 billion per year in lost productivity,
absenteeism, attrition, safety issues,
workers’ compensation claims, and hidden health care
expenditures.9 and failure to perform an
intensive reference and background check of an applicant may
cost the employer enormous
amounts in litigation fees defending claims of negligent hiring,
easily outweighing the cost of a
drug test, usually less than $50. In this time of increased
competition in the global marketplace,
each employee becomes all the more crucial to the workings of
the company. An employer has a
justified basis for attempting to choose the most appropriate and
qualified person for the job; the
10. means by which the employer obtains that information,
however, may be suspect.
The right to privacy is not only balanced with the arguably
legitimate interests of the employer
but also with the employer’s responsibility to protect
employees’ and customers’ personal
information. Theft of computerized customer and employee
records has increased dramatically
over the last decade; and the costs associated can be enormous.
The hacking of Sony’s
PlayStation Network in 2011 cost the company more than $71
million in direct clean-up costs;
and analysts estimate that the cumulative costs of
investigations, compensation, additional data
security investments, and lost business could exceed a billion
dollars. By one estimate, in 2011,
there were 1,037 publicly reported incidents of the loss, theft,
or exposure of personally
identifiable information, a 30 percent increase on the previous
year, and up from only 21 in
2003.10 Yet, the fact that only the largest and most audacious
data breaches are reported in the
media means that publicly reported breaches greatly
underestimate the extent of the problem. A
2012 survey of over 1,200 U.S. small businesses (with annual
revenues of less than $10 million)
found that 55 percent had experienced a data breach, and of
those only 33 percent notified the
people affected, although 46 states require that individuals are
notified when their private
information is exposed.11 As of 2015, there were 34,529 known
computer security incidents per
day in the United States, with each breach costing around
$690,000 in legal fees.12
11. Whereas erosion of at-will employment was the dominant issue
of the 1980s, scholars
predicted that privacy would be the main theme for the 1990s
and beyond. This chapter will
address the employee’s rights regarding personal information
page 714and the employer’s
responsibilities regarding that information, as well as the
employer’s right to find out both job-
related and nonrelated personal information about its
employees. Chapter 4 previously
addressed other issues regarding the legality of information
gathering through testing procedures.
This chapter will not address issues relating to consumer
privacy since they fall outside the scope
of the chapter’s and the text’s primary focus.
Background
LO2
There are three ways in which privacy may be legally protected:
by the Constitution (federal or
state), by federal and/or state statutes, and by the common law.
The U.S. Constitution does not
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn6
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn7
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn8
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn9
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn10
12. https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn11
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn12
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter04.xhtml
actually mention privacy, but privacy has been inferred as a
necessary adjunct of other
constitutional rights we hold. The right to privacy was first
recognized by the Supreme Court
in Griswold v. Connecticut,13 when the Court held that a
Connecticut statute restricting a married
couple’s use of birth control devices unconstitutionally
infringed on the right to marital privacy.
The Court held a constitutional guarantee of various zones of
privacy as a part of
the fundamental rights guaranteed by the Constitution, such as
the right to free speech and the
right to be free from unreasonable searches and seizures. The
latter right is that on which many
claims for privacy rights are based; the Court has held that
under certain circumstances the
required disclosure of certain types of personal information
should be considered an
unreasonable search. It has protected against the mandatory
disclosure of personal papers, and
it decided in favor of the right to make procreation decisions
privately.
fundamental right
A right that is guaranteed by the Constitution, whether stated or
not.
While baseless or unjustified intrusions, at first blush, may
13. appear to be completely abhorrent
in our society, proponents of the argument that employers can
ask whatever they please argue
that if an employee does not want to offer a piece of
information, there is something the employee
is trying to hide. For example, why would an employee refuse to
submit to a drug test if that
employee is not abusing drugs? Do private-sector employers
have the right to ask their
employees any question they choose and take adverse
employment actions against the employee
if she or he refuses to answer since they are not necessarily
constrained by constitutional
protections? (See Exhibit 14.1, “Realities about Employee
Privacy Rights.”)
private sector
That segment of the workforce represented by private
companies (companies that are not owned or managed
by the government or one of its agencies).
Exhibit 14.1 Realities about Employee Privacy Rights
1. Employees do not have an absolute right to privacy in their
workplace.
2. It is not a breach of an employee’s right to privacy for an
employer to ask with whom the employee lives.
3. In the private sector, the Constitution does not protect
employees’ right to be free from unreasonable searches and
seizures.
4. Without constitutional protection, employees are safeguarded
to some extent by common-law protections against
invasions of privacy.
14. 5. Though an employee may give information to an employer,
the employer is still bound to use that information only for
the purpose for which it was collected.
page 715Additionally, employees are concerned about the type
of information gathered in the
course of applying for and holding a job. Who has access to that
information? What information
may be deemed “confidential,” and what does that mean to the
employee? Evidently, employers
perceive challenging issues among these and others with regard
to privacy. According to a 2016
survey, 54 percent of firms now report that they have appointed
a chief data officer. This figure
represents an increase from just 12 percent in 2012; and the
International Society of Chief Data
Officers launched their inaugural kickoff in January 2016, with
a strong commitment to carry this
momentum forward on a global basis.14
Workplace Privacy, Generally
LO3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn13
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#rch14_key1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#exh14-1
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
15. PS/chapter14.xhtml?favre=brett#rch14_key2
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn14
Privacy protections in the workplace are a completely different
animal than other types of
workplace protections, such as those against discrimination on
the basis of gender, disability, and
age. Simply put, employees in the private-sector workplace do
not have broad rights to personal
privacy. Why? To begin, unlike the other areas, no
comprehensive federal workplace privacy
legislation exists. The protections that do exist, as discussed
previously, arise from a motley
collection of inferences from the Constitution, limited-purpose
federal laws, assorted state laws,
and some common law (court-created through case law).
common law
Law made and applied by judges, based on precedent (prior case
law).
Second, in almost every state, employees are hired at will,
which means that employers can
fire them for good reasons, for bad reasons, or for no reason at
all (but not for an illegal reason),
as we shall discuss in more detail later. If an employer
legitimately can fire an employee for “bad
reasons,” you can see quite clearly why an employee is not
going to be successful in stating a
case against the employer for violating the employee’s privacy
unless the employee can fit his or
her complaint specifically into one of the protections
guaranteed by the federal, state, and
common laws, thus turning a “bad reason” into an “illegal
reason.”
16. Perhaps the most effective way to understand workplace privacy
protections is to examine
where the protections do exist. Courts have recognized an
employee’s right to privacy in the
workplace where there is a “reasonable expectation of
privacy.”15 However, they have also held
that a work area, unlike, for instance, a bedroom, is not a place
of solitude or seclusion; so, there
is no expectation of privacy in that environment.16 In addition,
anything that the employer provides
to employees—a telephone, computer, desk, chair, or other
business-related instrument—
contains no expectation of privacy because it belongs to the
employer, not to the employees.
Thus, the content of emails, telephone calls, and computer
activity conducted on employer-
provided equipment is not private.
Is there any reasonable expectation of privacy in the workplace?
(See Exhibit 14.2,
“‘Reasonable’ Areas in Which to Expect Privacy in the
Workplace, Subject to Exceptions.”) Yes,
employees have an expectation of privacy with regard to their
body, including what they carry in
their pockets. Their employer generally does not have the right
to frisk them or to require them to
disclose what they are carrying in their pockets; although, as we
shall see later, there are
situations in which such as invasion of privacy would be
appropriate. This expectation
extends page 716to company-provided bathrooms, changing
rooms, and showers. But, should this
expectation cover drug testing? We will explore that question
later in this chapter.
17. Exhibit 14.2 “Reasonable” Areas in Which to Expect Privacy in
the Workplace, Subject
to Exceptions
Second, employees have an expectation of privacy in connection
with items that are contained
in other normally private locations, such as a purse or briefcase;
however, these locations, also,
are subject to exceptions under certain circumstances. For
example, if an employee puts a purse
in a company-provided desk drawer, the employer generally has
the right to examine the desk
drawer but likely not the contents of their purse. Similarly,
employees have an expectation of
privacy in the contents of their car that sits in the company
parking lot, assuming that it is not a
company car or that they are not using the car for company
purposes other than to go to and from
work. Their employer generally cannot go and search their car,
with some exceptions.
Third, employees have an expectation of privacy in their
personal (not personnel) records and
information. For example, they have the right to assume that
their employer has no right to access
their credit history, their driving record, or their family’s
medical records without their permission;
but, we can all imagine situations in which that rule may not
apply or may be excepted. Their
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key3
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
19. employee privacy never before
imagined (iris scans, voice prints, and face geometry, to name
three).
page 717Now we shall examine the specifics, first exploring
public-sector employee privacy,
then continuing to private-sector employee privacy.
Public-Sector Employee Privacy
With regard to the public sector, the Constitution protects
individuals from wrongful invasions by
the state or by anyone acting on behalf of the government. The
personal privacy of federal, state,
and local employees is therefore protected from governmental
intrusion and excess. As we will
see later in this chapter, private-sector employees are subject to
different—and often fewer—
protections.
public sector
That segment of the workforce represented by governmental
employers and governmental agency employers.
In some situations, this term may include federal contractors.
Constitutional Protection
The Fourth Amendment and Its Exceptions
For the Fourth Amendment’s protection against unreasonable
search and seizure to be applicable
to a given situation, there must first exist a “search or seizure.”
The Supreme Court has liberally
interpreted “search” to include a wide variety of activities such
as the retrieval of blood samples
and other bodily invasions, including urinalyses, as well as the
collection of other personal
information. One might imagine how this umbrella gets wider as
20. technology advances.
LO4
For the search to violate the Fourth Amendment, that search
must be deemed unreasonable,
unjustified at its inception, and impermissible in scope. You
will read in the seminal Supreme
Court case, O’Connor v. Ortega,17 included at the end of the
chapter, that a search is justified “at
its inception” where the employer has reasonable grounds for
suspecting that the search will turn
up evidence that the employee is guilty of work-related
misconduct, or where the search is
necessary for a noninvestigatory work-related purpose such as
to retrieve a file.
It is critical to review the O’Connor case at the end of the
chapter to understand both the
fundamental basis of public-sector search and seizure law as it
applies to the workplace as well
as much of current case law today. The Court held that a search
is permissible in scope where
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_key4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#rch14_key4
https://jigsaw.vitalsource.com/books/9781260031805/epub/OEB
PS/chapter14.xhtml?favre=brett#ch14_fn17
“the measures adopted are reasonably related to the objectives
of the search and not excessively …
21. ITS 833 – INFORMATION GOVERNANCE
Chapter 1 – The Onslaught of Big Data and Information
Governance Imperative
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Define or identify what is meant by “Big Data”
What is the practical effects and problems associated with Big
Data
Solution
to the Big Data problem
Defining Information Governance (“IG”)
Why we do not incorporate IG into everyday business
Advantage of IG
Effects of not incorporating IG
General approach to implementing IG
22. Copyright Omar Mohamed 2019
2
2
What is “Big Data”?
It is a business asset capable of being leveraged.
“High-volume, high-velocity and high-variety information that
demands cost-effective innovative forms of information
processing for enhanced insight and decision making”
A combination of both structured and unstructured data that is
so massive that it cannot be processed using today’s database
tools and analytical software techniques.
Copyright Omar Mohamed 2019
3
3
23. What is the practical effect of “Big Data”?
Whether or not a business enterprise will be able to sustain a
competitive advantage will depend on the business’ ability to
manipulate the large amount of data in a way that it to
differentiate itself.
Estimates are that 90% of the data existing today was created
over the pat two years.
Big Data and related technology and services are projected to
grow at a compound annual rate of approximately 27% - leading
to new opportunities for data mining and business intelligence.
Copyright Omar Mohamed 2019
4
4
Issues Related to Big Data
Expense –Only about 25% of data stored has real business
value, 5% more is required to be maintained for legal reasons,
1% retained due to litigation hold, leaving about 69% with no
real value.
A great deal of irrelevant information
24. Increased storage costs
System failures
Legal costs
Conversion costs
Copyright Omar Mohamed 2019
5
5
SOLUTION TO BIG DATA PROBLEMS?
Information Governance
Rigid
Enforced
Creates a smaller “information footprint”
Allows business to more easily find what they need and derive
business value from it
Copyright Omar Mohamed 2019
6
25. 6
So…What is “Information Governance”?
It is discipline that emerged out of necessity…
Subset of corporate governance
Merged from records management, content management,
information technology, data governance, information security,
data privacy, risk management, litigation readiness, regulatory
compliance, data preservation and business intelligence
It is the way by which an organization manages the totality of
its information
A strategic framework composed of standards, processes, roles,
and metrics that hold organizations and individuals accountable
to create, organize, secure, maintain, use and dispose of
information in ways that align with and contribute to the
organizations goals. (Association of Records Management and
Administrators)Glossary of Records and Information
Management Terms, 4th Ed., 2012, TR 22-2012)
Copyright Omar Mohamed 2019
7
26. 7
WHY INCORPORATE “IG”?
We can’t keep everything forever
We can’t throw everything away
E-discovery
Employees want it
It improves information delivery and improves productivity
It does not get easier to do over time
Legal requirements
Helps mitigate information management risk
E-mail
Copyright Omar Mohamed 2019
8
8
WHY DON’T WE INCORPORATE “IG”?
Cost
Lack of understanding
27. Lack of support from top
Copyright Omar Mohamed 2019
9
9
FAILURES OF INFORMATION GOVERNANCE?
Theft of valuable information
Inability to protect personal, private information
Breaches in legal requirements
Loss of trade secrets
Public reputation damage
Copyright Omar Mohamed 2019
10
10
Approaches to Implementing IG
28. Form proper IG policies first
Review existing policy…if any
Implement an awareness policy
Develop an approach
Project approach vs. Strategic program
Identify governance body or steering committee
Apply appropriate technologies for enforcement
Copyright Omar Mohamed 2019
11
11
Thank You
Copyright Omar Mohamed 2019
12
12
29. ITS 833 – INFORMATION GOVERNANCE
Chapter 1 – The Onslaught of Big Data and Information
Governance Imperative
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Define or identify what is meant by “Big Data”
What is the practical effects and problems associated with Big
Data