SlideShare a Scribd company logo
1
Louise Spiteri
School of Information Management
Establishing an Information
Governance Program
Agenda
1. Definition of Information governance
2. Value of Information governance
3. Principles of Information governance
4. Information governance models
5. Information governance council
2March 30, 2017. Kanata, ON.
3
What is information governance?
3
March 30, 2017. Kanata, ON.
How do you define information
governance?
March 30, 2017. Kanata, ON. 4
Some definitions
•Gartner: The specification of decision rights and an
accountability framework to ensure appropriate behavior
in the valuation, creation, storage, use, archiving and
deletion of information. It includes the processes, roles
and policies, standards and metrics that ensure the
effective and efficient use of information in enabling an
organization to achieve its goals (http://gtnr.it/2lE4K2)
•Information governance is the activities and technologies
that organizations employ to maximize the value of their
information while minimizing associated risks and costs
(iginiative.com).
March 30, 2017. Kanata, ON. 5
Activities that are part of IG
•Records management
•Compliance
•Storage and archiving
•Security
•Risk management
•eDiscovery
March 30, 2017. Kanata, ON. 6
Any others?
7
The value of IG
March 30, 2017. Kanata, ON.
7
Why do we need IG?
•Exponential growth of digital data
•Increased complexity of regulatory environment
•Business value and risks are often unknown and
unmanaged
•Increased sharing of information outside the organization
•Prevalence of social networking and mobile applications
•Increased risk of security breaches or data loss
March 30, 2017. Kanata, ON. 8
Data management
•The volume of information continues to explode
exponentially and has become more mobile, making
the job of protecting it even more difficult as
requirements to do so increase.
March 30, 2017. Kanata, ON. 9
Regulatory environment
March 30, 2017. Kanata, ON. 10
Traditional activities, such as
records management, are no
longer sufficient to meet the
demands of the business or the
ever increasing and more
complex legal and regulatory
requirements.
Legal discovery requirements continue to become more
standardized with courts having less tolerance for
noncompliance to established standards.
Business value
• Most organizations are quickly realizing the need to manage
information more effectively on an enterprise basis.
• The evolution of information management governance is an
essential business requirement to mitigate risk, reduce cost, and
increase revenue
• Market pressure for increased revenue is driving efforts to find
creative ways for organizations to leverage the large volumes of
information they retain to increase market share, drive revenue,
and maintain a competitive advantage
March 30, 2017. Kanata, ON. 11
Data breaches, 1
March 30, 2017. Kanata, ON. 12
http://bit.ly/2m303eg
Data breaches, 2
March 30, 2017. Kanata, ON. 13
14
Principles of Information
Governance
March 30, 2017. Kanata, ON.
14
March 30, 2017. Kanata, ON. 15
Guiding principles, 1
•Educate all employees regarding their Information
Governance duties and responsibilities.
•Confirm the authenticity and integrity of information.
•Recognize that the official record is electronic (unless
otherwise specified).
•Store information in an enterprise-approved system or
record-keeping repository.
•Classify information under the correct record code.
March 30, 2017. Kanata, ON. 16
Guiding principles, 2
•Control the unnecessary proliferation of information.
•Dispose of information when it reaches the end of its
legal and operational usefulness.
•Secure customer and enterprise confidential/personally
identifiable information.
•Comply with subpoena, audit, and discovery requests for
information.
March 30, 2017. Kanata, ON. 17
Guiding principles, 3
•Align all lines of business systems and
applications to Information Governance
standards.
•Ensure that third parties that hold customer or
enterprise information comply with your
organization’s Enterprise Information Governance
standards
March 30, 2017. Kanata, ON. 18
19
Information Governance Models
March 30, 2017. Kanata, ON.
19
Information Governance Reference
Model (IGRM)
March 30, 2017. Kanata, ON. 20
http://bit.ly/2m38Qgg
Background to the IGRM
• The IGRM was developed by EDRM, now a part of the Duke Law
Center for Judicial Studies, which creates practical resources to
improve e-discovery and information governance.
• EDRM developed this model to create a framework by which to
bring together the key players in information governance:
• Business users who need information to operate the
organization,
• IT departments who must implement the mechanics of
information management, and
• Legal, risk, and regulatory departments who understand the
organization’s duty to preserve information beyond its
immediate business value.
March 30, 2017. Kanata, ON. 21
Components of IGRM
•IGRM represents the functional areas that are directly
responsible for the governance of information across an
enterprise.
•The model weights the involvement of the functional
constituents: Business and IT have larger, more complex
roles, Legal and RIM slightly less, and Information
Privacy and Security share the smallest component as
they are more specifically focused in their duties.
March 30, 2017. Kanata, ON. 22
Key functions in IGRM, 1
•Legal: responsible for determining the risk profile
of an organization based on litigation exposures,
international privacy requirements, intellectual
property protection, working environment, and
more.
•Discovery: responsible for the communication,
instruction, and coordination with business units
or individuals related to information that must be
located, preserved, and produced to satisfy
litigation requirements
March 30, 2017. Kanata, ON. 23
Key functions in IGRM, 2
•Risk: responsible for the protection of the organization’s
brand, finances, and operations by managing and
mitigating risk exposures. This requires a full
understanding of the organization’s risk profile (litigation,
investigations, regulatory requirements, protection of
private information, and protection of intellectual
property).
•Compliance: responsible for ensuring that the
organization is aware of, and meets the requirements of
rules and regulations imposed by a variety of
authorities (federal, state/provincial, and local
governments; regulatory agencies; data privacy
authorities, and industry groups).
March 30, 2017. Kanata, ON. 24
Key functions in IGRM, 3
•RIM: responsible for the development and publication
of the RIM Program policy for paper and electronic
records.
•IT: responsible for the management of the high volume of
data being created and received, and the reduction of
costs, particularly around redundant technologies and
storage.
•Privacy: responsible for managing the risks and
business impacts of privacy laws and policies, and the
use of personally identifiable information.
March 30, 2017. Kanata, ON. 25
Key functions in IGRM, 4
•Security: responsible for the development,
implementation, and management of the organization’s
security vision, strategy, policy, and programs.
•Information Architecture: responsible for the
organization of information and database development
to support the business needs.
•Business: responsible for compliance with the
Information Governance policies.
March 30, 2017. Kanata, ON. 26
27
Generally Accepted
Recordkeeping Principles
March 30, 2017. Kanata, ON.
27
Scope
• The Generally Accepted Recordkeeping Principles (The
Principles), were created by ARMA International as a common set
of principles that describe the conditions under which business
records and related information should be maintained.
• The Principles were designed to guide:
• CEOs in determining how to protect their organizations in the
use of information assets;
• Legislators in crafting legislation meant to hold organizations
accountable; and
• Records management professionals in designing
comprehensive and effective records management programs.
March 30, 2017. Kanata, ON. 28
The Principles, 1
Accountability: A senior executive shall oversee the information
governance program and delegate responsibility for records and
information management to appropriate individuals, The
organization adopts policies and procedures to guide personnel and
ensure that the program can be audited.
Transparency: An organization’s business processes and
activities, including its information governance program, shall be
documented in an open and verifiable manner, and
the documentation shall be available to all personnel
and appropriate interested parties.
Integrity: An information governance program shall be constructed
so the information generated by or managed for the organization
has a reasonable and suitable guarantee of authenticity and
reliability.
March 30, 2017. Kanata, ON. 29
The Principles, 2
Protection: An information governance program shall
be constructed to ensure a reasonable level of protection to records
and information that are private, confidential, privileged, secret,
classified, essential to business continuity, or that otherwise require
protection.
Compliance: An information governance program shall
be constructed to comply with applicable laws and other binding
authorities, as well as with the organization’s policies.
Availability: An organization shall maintain records and information
in a manner that ensures timely, efficient, and accurate retrieval of
needed information.
March 30, 2017. Kanata, ON. 30
The Principles, 3
Retention: An organization shall maintain its records
and information for an appropriate time, taking into
account its legal, regulatory, fiscal, operational,
and historical requirements.
Disposition: An organization shall provide secure
and appropriate disposition for records and information
that are no longer required to be maintained by applicable
laws and the organization’s policies
March 30, 2017. Kanata, ON. 31
The IG Maturity Model
• The Maturity Model for Information Governance is designed to provide
organizations a more complete picture of what effective information
governance looks like.
• The model is based on the eight principles as well as a foundation of
standards, best practices, and legal/regulatory requirements.
• The maturity model defines characteristics of various levels of
recordkeeping programs. For each principle, the maturity model associates
various characteristics that are typical for each of the five levels in the
model
March 30, 2017. Kanata, ON. 32
Levels 1-2
Level 1 (Sub-standard): This level describes an
environment where recordkeeping concerns are either not
addressed at all, or are addressed in a very ad hoc manner.
Organizations that identify primarily with these descriptions
should be concerned that their programs will not meet legal
or regulatory scrutiny.
Level 2 (In Development): This level describes an
environment where there is a developing recognition that
recordkeeping affects the organization, and that the
organization may benefit from a more defined information
governance program. However, in Level 2, the organization
is still vulnerable to legal or regulatory scrutiny since
practices are ill-defined and still largely ad hoc in nature.
March 30, 2017. Kanata, ON. 33
Levels 3-4
Level 3 (Essential): This level describes the essential or minimum
requirements that must be addressed in order to meet the organization's legal
and regulatory requirements. Level 3 is characterized by defined policies and
procedures, and more specific decisions taken to improve recordkeeping.
However, organizations that identify primarily with Level 3 descriptions may still
be missing significant opportunities for streamlining business and controlling
costs.
Level 4 (Proactive): This level describes an organization that is initiating
information governance program improvements throughout its business
operations. Information governance issues and considerations are integrated
into business decisions on a routine basis, and the organization easily meets its
legal and regulatory requirements. Organizations that identify primarily with
these descriptions should begin to consider the business benefits of information
availability in transforming their organizations globally.
March 30, 2017. Kanata, ON. 34
Level 5
Level 5 (Transformational): This level describes an
organization that has integrated information governance
into its overall corporate infrastructure and business
processes to such an extent that compliance with the
program requirements is routine. These organizations
have recognized that effective information governance
plays a critical role in cost containment, competitive
advantage, and client service.
March 30, 2017. Kanata, ON. 35
36
Information Governance Council
March 30, 2017. Kanata, ON.
36
IG oversight
• A senior-level Information Governance Council is important to the
success of any organization-wide IG program. It is important to
include senior representatives of a number of different roles to
ensure that all aspects of IG are understood, championed, and
monitored.
• The Council is responsible for approving an enterprise-
wide Information Governance strategy, developing operating
procedures for the Council, providing guidance about technology
and standards, assisting in the securing of funds, and advocating
the business value of information governance
March 30, 2017. Kanata, ON. 37
Examples of roles in IG Council
March 30, 2017. Kanata, ON. 38
• CIO
• Legal
• Chief Data Officer
• Chief Health Information
Officer
• Discovery or Litigation Officer
• Risk Management
• Compliance Officer
• Records and Information
Manager
• Chief Data Privacy Officer
• Information Technology Security
• Information Technology
Infrastructure
• Critical Line of Business
• International (Regional) Leaders
39
Best Practices for IG Council
March 30, 2017. Kanata, ON.
39
Suggested practices, 1
Senior executive support
• It is important to have a supportive executive sponsor.
Focus on outcomes or targeted action items
• The Council should meet regularly (e.g., quarterly) with a clear
agenda and ensuring that the concerns of each functional area are
addressed. Topics could include the following, with specific targets
or outcomes
• key performance indicator metrics
• consideration of new technology
• change management
• budget
March 30, 2017. Kanata, ON. 40
Suggested practices, 2
Self assessment
•Have a self-assessment program to enable managers to
reflect on good practices, and to identify and address
potential weaknesses in the design or execution of
internal processes that mitigate key operational risks and
costs.
Efficient use of technology
•Use tools such as data analytics, auto-classification tools,
and automated ways in which to monitor progress and to
detect non-compliance.
March 30, 2017. Kanata, ON. 41
42
Questions?
March 30, 2017. Kanata, ON.
42
Contact information
Dr. Louise Spiteri
Louise.Spiteri@dal.ca
http://about.me/louisespiteri
March 30, 2017. Kanata, ON. 43

More Related Content

What's hot

Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
AIIM International
 
Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?
Winston & Strawn LLP
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
John Newton
 
Leveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information SuccessLeveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information Success
Nick Inglis
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
John Mancini
 
Executing on Information Governance (Learning From Law Firms)
Executing on Information Governance (Learning From Law Firms)Executing on Information Governance (Learning From Law Firms)
Executing on Information Governance (Learning From Law Firms)
Nick Inglis
 
Information Governance Quick Wins
Information Governance Quick WinsInformation Governance Quick Wins
Information Governance Quick Wins
Nick Inglis
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016
Hybrid Cloud
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Eryk Budi Pratama
 
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
DATAVERSITY
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
Jim Merrifield, IGP, CIP
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
Michael Curcio
 
Information systems, organizations, and strategy
Information systems,  organizations, and strategyInformation systems,  organizations, and strategy
Enterprise Information management
Enterprise Information managementEnterprise Information management
Enterprise Information management
The Open Group SA
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
AIIM International
 
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
PROJECT CONSULT Unternehmensberatung Dr. Ulrich Kampffmeyer GmbH
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
Raymond Cunningham
 
Successful stewardship Presentation
Successful stewardship PresentationSuccessful stewardship Presentation
Successful stewardship Presentation
Certus Solutions
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
IBM Analytics
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
IBM Analytics
 

What's hot (20)

Building the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your CompanyBuilding the Information Governance Business Case Within Your Company
Building the Information Governance Business Case Within Your Company
 
Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?Information Governance – What Does a Modern Program Look Like?
Information Governance – What Does a Modern Program Look Like?
 
Lessons in Information Governance
Lessons in Information GovernanceLessons in Information Governance
Lessons in Information Governance
 
Leveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information SuccessLeveraging Information Lifecycle Governance To Achieve Information Success
Leveraging Information Lifecycle Governance To Achieve Information Success
 
Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?Information Governance -- Necessary Evil or a Bridge to the Future?
Information Governance -- Necessary Evil or a Bridge to the Future?
 
Executing on Information Governance (Learning From Law Firms)
Executing on Information Governance (Learning From Law Firms)Executing on Information Governance (Learning From Law Firms)
Executing on Information Governance (Learning From Law Firms)
 
Information Governance Quick Wins
Information Governance Quick WinsInformation Governance Quick Wins
Information Governance Quick Wins
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
 
Information systems, organizations, and strategy
Information systems,  organizations, and strategyInformation systems,  organizations, and strategy
Information systems, organizations, and strategy
 
Enterprise Information management
Enterprise Information managementEnterprise Information management
Enterprise Information management
 
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...
 
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
[EN] Information Governance | Article by Dr. Ulrich Kampffmeyer | PROJECT CON...
 
Protecting Donor Privacy
Protecting Donor PrivacyProtecting Donor Privacy
Protecting Donor Privacy
 
Successful stewardship Presentation
Successful stewardship PresentationSuccessful stewardship Presentation
Successful stewardship Presentation
 
Why You Need to Govern Big Data
Why You Need to Govern Big DataWhy You Need to Govern Big Data
Why You Need to Govern Big Data
 
Advantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environmentAdvantages of an integrated governance, risk and compliance environment
Advantages of an integrated governance, risk and compliance environment
 

Similar to Establishing an information governance program

INFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptxINFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptx
Smitachetia1
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
David Kearney
 
Big Data and Goverment Analytics
Big Data and Goverment AnalyticsBig Data and Goverment Analytics
Big Data and Goverment Analytics
Khaled Ghadban
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdf
Yihune Ephrem
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Sirius
 
Data Governance and Marketing
Data Governance and MarketingData Governance and Marketing
Data Governance and Marketing
Stephanie Miller (@StephanieSAM)
 
Practical Guide to Data Governance Success
Practical Guide to Data Governance SuccessPractical Guide to Data Governance Success
Practical Guide to Data Governance Success
Ample Insight Inc
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
Marc Vael
 
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
International Journal of Modern Research in Engineering and Technology
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
IT-Toolkits.org
 
What is Data Governance?
What is Data Governance?What is Data Governance?
What is Data Governance?
CSpring
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
IT-Toolkits.org
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Soumodeep Nanee Kundu
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
noraelstela1
 
Master data management gfoa
Master data management gfoaMaster data management gfoa
Master data management gfoa
Harry Black
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Heru Ramadhon
 
ch02.pdf
ch02.pdfch02.pdf
ch02.pdf
surahyo2
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
KeenboonAsaffaa
 
[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support
AriantoMuditomo
 
IMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxIMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docx
write4
 

Similar to Establishing an information governance program (20)

INFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptxINFORMATION GOVERNANCE.pptx
INFORMATION GOVERNANCE.pptx
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Big Data and Goverment Analytics
Big Data and Goverment AnalyticsBig Data and Goverment Analytics
Big Data and Goverment Analytics
 
MIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdfMIS lecture notes by Yihune Ephrem Kassahun.pdf
MIS lecture notes by Yihune Ephrem Kassahun.pdf
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Data Governance and Marketing
Data Governance and MarketingData Governance and Marketing
Data Governance and Marketing
 
Practical Guide to Data Governance Success
Practical Guide to Data Governance SuccessPractical Guide to Data Governance Success
Practical Guide to Data Governance Success
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
 
Fundamentals of data security policy in i.t. management it-toolkits
Fundamentals of data security policy in i.t. management   it-toolkitsFundamentals of data security policy in i.t. management   it-toolkits
Fundamentals of data security policy in i.t. management it-toolkits
 
What is Data Governance?
What is Data Governance?What is Data Governance?
What is Data Governance?
 
Protecting business interests with policies for it asset management it-tool...
Protecting business interests with policies for it asset management   it-tool...Protecting business interests with policies for it asset management   it-tool...
Protecting business interests with policies for it asset management it-tool...
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
RuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptxRuleBookForTheFairDataEconomy.pptx
RuleBookForTheFairDataEconomy.pptx
 
Master data management gfoa
Master data management gfoaMaster data management gfoa
Master data management gfoa
 
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...Article mis, hapzi ali, nur    rizqiana, nanda suharti, nurul, anisa dwi, vin...
Article mis, hapzi ali, nur rizqiana, nanda suharti, nurul, anisa dwi, vin...
 
ch02.pdf
ch02.pdfch02.pdf
ch02.pdf
 
Chapter 1.pptx
Chapter 1.pptxChapter 1.pptx
Chapter 1.pptx
 
[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support[MU630] 004. Business Intelligence & Decision Support
[MU630] 004. Business Intelligence & Decision Support
 
IMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docxIMT500 Foundations Of Information Management.docx
IMT500 Foundations Of Information Management.docx
 

More from Louise Spiteri

Exploring how user-generated content in Canadian public libraries can impact ...
Exploring how user-generated content in Canadian public libraries can impact ...Exploring how user-generated content in Canadian public libraries can impact ...
Exploring how user-generated content in Canadian public libraries can impact ...
Louise Spiteri
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & security
Louise Spiteri
 
Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
Louise Spiteri
 
Student activities in the Master of Library & Information Management program....
Student activities in the Master of Library & Information Management program....Student activities in the Master of Library & Information Management program....
Student activities in the Master of Library & Information Management program....
Louise Spiteri
 
Opacs users and readers’ advisory
Opacs users and readers’ advisoryOpacs users and readers’ advisory
Opacs users and readers’ advisory
Louise Spiteri
 
Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17
Louise Spiteri
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
Louise Spiteri
 
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
Louise Spiteri
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
Louise Spiteri
 
The role of causality and conceptual coherence in assessments of similarity
The role of causality and conceptual coherence in assessments of similarityThe role of causality and conceptual coherence in assessments of similarity
The role of causality and conceptual coherence in assessments of similarity
Louise Spiteri
 
Faceted navigation of social tagging applications
Faceted navigation of social tagging applicationsFaceted navigation of social tagging applications
Faceted navigation of social tagging applications
Louise Spiteri
 
Records continuum model
Records continuum modelRecords continuum model
Records continuum model
Louise Spiteri
 
User-generated metadata: Boon or bust for indexing and controlled vocabularies?
User-generated metadata: Boon or bust for indexing and controlled vocabularies?User-generated metadata: Boon or bust for indexing and controlled vocabularies?
User-generated metadata: Boon or bust for indexing and controlled vocabularies?
Louise Spiteri
 
Community engagement: The new social media mantra for academic libraries
Community engagement: The new social media mantra for academic librariesCommunity engagement: The new social media mantra for academic libraries
Community engagement: The new social media mantra for academic libraries
Louise Spiteri
 
Social discovery tools: Cataloguing meets user convenience
Social discovery tools: Cataloguing meets user convenienceSocial discovery tools: Cataloguing meets user convenience
Social discovery tools: Cataloguing meets user convenience
Louise Spiteri
 
Social cataloguing sites: Features and implications for cataloguing practice ...
Social cataloguing sites: Features and implications for cataloguing practice ...Social cataloguing sites: Features and implications for cataloguing practice ...
Social cataloguing sites: Features and implications for cataloguing practice ...
Louise Spiteri
 
Social tagging, facets, and social spaces
Social tagging, facets, and social spacesSocial tagging, facets, and social spaces
Social tagging, facets, and social spaces
Louise Spiteri
 
RDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsRDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dots
Louise Spiteri
 
The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...
Louise Spiteri
 

More from Louise Spiteri (19)

Exploring how user-generated content in Canadian public libraries can impact ...
Exploring how user-generated content in Canadian public libraries can impact ...Exploring how user-generated content in Canadian public libraries can impact ...
Exploring how user-generated content in Canadian public libraries can impact ...
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & security
 
Your organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and securityYour organization and Big Data: Managing access, privacy, and security
Your organization and Big Data: Managing access, privacy, and security
 
Student activities in the Master of Library & Information Management program....
Student activities in the Master of Library & Information Management program....Student activities in the Master of Library & Information Management program....
Student activities in the Master of Library & Information Management program....
 
Opacs users and readers’ advisory
Opacs users and readers’ advisoryOpacs users and readers’ advisory
Opacs users and readers’ advisory
 
Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17Social media’s role in tenure and promotion 2014 03-17
Social media’s role in tenure and promotion 2014 03-17
 
Governance & Ediscovery
Governance & EdiscoveryGovernance & Ediscovery
Governance & Ediscovery
 
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
 
Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
The role of causality and conceptual coherence in assessments of similarity
The role of causality and conceptual coherence in assessments of similarityThe role of causality and conceptual coherence in assessments of similarity
The role of causality and conceptual coherence in assessments of similarity
 
Faceted navigation of social tagging applications
Faceted navigation of social tagging applicationsFaceted navigation of social tagging applications
Faceted navigation of social tagging applications
 
Records continuum model
Records continuum modelRecords continuum model
Records continuum model
 
User-generated metadata: Boon or bust for indexing and controlled vocabularies?
User-generated metadata: Boon or bust for indexing and controlled vocabularies?User-generated metadata: Boon or bust for indexing and controlled vocabularies?
User-generated metadata: Boon or bust for indexing and controlled vocabularies?
 
Community engagement: The new social media mantra for academic libraries
Community engagement: The new social media mantra for academic librariesCommunity engagement: The new social media mantra for academic libraries
Community engagement: The new social media mantra for academic libraries
 
Social discovery tools: Cataloguing meets user convenience
Social discovery tools: Cataloguing meets user convenienceSocial discovery tools: Cataloguing meets user convenience
Social discovery tools: Cataloguing meets user convenience
 
Social cataloguing sites: Features and implications for cataloguing practice ...
Social cataloguing sites: Features and implications for cataloguing practice ...Social cataloguing sites: Features and implications for cataloguing practice ...
Social cataloguing sites: Features and implications for cataloguing practice ...
 
Social tagging, facets, and social spaces
Social tagging, facets, and social spacesSocial tagging, facets, and social spaces
Social tagging, facets, and social spaces
 
RDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsRDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dots
 
The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...The public library catalogue as a social space: A case study of social discov...
The public library catalogue as a social space: A case study of social discov...
 

Recently uploaded

UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
Energy for One World
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
taqyea
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
teeaszt
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
JSchaus & Associates
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
narinav14
 
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
afsebu
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
Bharat Mata
 
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
vfefek
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
dj1cx4ex
 
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
zvpwjpty
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
odmqk
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
9d5c8i83
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
Scribe
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
JuanFelipeHerrera4
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
Congressional Budget Office
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
Cheong Man Keong
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
narinav14
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
JSchaus & Associates
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
Aggregage
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Congressional Budget Office
 

Recently uploaded (20)

UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024UN SDSN Sustainable Development Report 2024
UN SDSN Sustainable Development Report 2024
 
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
一比一原版(utas学位证书)澳洲塔斯马尼亚大学毕业证成绩单一模一样
 
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
一比一原版(Adelaide毕业证)阿德莱德大学毕业证如何办理
 
2024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 422024: The FAR - Federal Acquisition Regulations, Part 42
2024: The FAR - Federal Acquisition Regulations, Part 42
 
karnataka housing board schemes . all schemes
karnataka housing board schemes . all schemeskarnataka housing board schemes . all schemes
karnataka housing board schemes . all schemes
 
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
一比一原版英国阿伯丁大学毕业证(AU毕业证书)学历如何办理
 
Bharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdfBharat Mata - History of Indian culture.pdf
Bharat Mata - History of Indian culture.pdf
 
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
一比一原版(uoit毕业证书)加拿大安大略理工大学毕业证如何办理
 
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
在线办理(西班牙UPV毕业证书)瓦伦西亚理工大学毕业证毕业完成信一模一样
 
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
在线制作(umich毕业证书)美国密歇根大学毕业证学位证书原版一模一样
 
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
一比一原版(theauckland毕业证书)新西兰奥克兰大学毕业证成绩单如何办理
 
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
在线办理美国乔治华盛顿大学毕业证(gwu毕业证书)学历学位证书原版一模一样
 
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...
 
ColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomicsColombiaPresentation.pptx macroeconomics
ColombiaPresentation.pptx macroeconomics
 
CBO's Immigration Projections - Presentation
CBO's Immigration Projections - PresentationCBO's Immigration Projections - Presentation
CBO's Immigration Projections - Presentation
 
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRISTTRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
TRUE BOOK OF LIFE 1.15 OF TRUE JESUS CHRIST
 
Indira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAYIndira awas yojana housing scheme renamed as PMAY
Indira awas yojana housing scheme renamed as PMAY
 
2024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 412024: The FAR - Federal Acquisition Regulations, Part 41
2024: The FAR - Federal Acquisition Regulations, Part 41
 
How To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity JourneyHow To Cultivate Community Affinity Throughout The Generosity Journey
How To Cultivate Community Affinity Throughout The Generosity Journey
 
Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034Health Insurance Coverage for the U.S. Population, 2024 to 2034
Health Insurance Coverage for the U.S. Population, 2024 to 2034
 

Establishing an information governance program

  • 1. 1 Louise Spiteri School of Information Management Establishing an Information Governance Program
  • 2. Agenda 1. Definition of Information governance 2. Value of Information governance 3. Principles of Information governance 4. Information governance models 5. Information governance council 2March 30, 2017. Kanata, ON.
  • 3. 3 What is information governance? 3 March 30, 2017. Kanata, ON.
  • 4. How do you define information governance? March 30, 2017. Kanata, ON. 4
  • 5. Some definitions •Gartner: The specification of decision rights and an accountability framework to ensure appropriate behavior in the valuation, creation, storage, use, archiving and deletion of information. It includes the processes, roles and policies, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals (http://gtnr.it/2lE4K2) •Information governance is the activities and technologies that organizations employ to maximize the value of their information while minimizing associated risks and costs (iginiative.com). March 30, 2017. Kanata, ON. 5
  • 6. Activities that are part of IG •Records management •Compliance •Storage and archiving •Security •Risk management •eDiscovery March 30, 2017. Kanata, ON. 6 Any others?
  • 7. 7 The value of IG March 30, 2017. Kanata, ON. 7
  • 8. Why do we need IG? •Exponential growth of digital data •Increased complexity of regulatory environment •Business value and risks are often unknown and unmanaged •Increased sharing of information outside the organization •Prevalence of social networking and mobile applications •Increased risk of security breaches or data loss March 30, 2017. Kanata, ON. 8
  • 9. Data management •The volume of information continues to explode exponentially and has become more mobile, making the job of protecting it even more difficult as requirements to do so increase. March 30, 2017. Kanata, ON. 9
  • 10. Regulatory environment March 30, 2017. Kanata, ON. 10 Traditional activities, such as records management, are no longer sufficient to meet the demands of the business or the ever increasing and more complex legal and regulatory requirements. Legal discovery requirements continue to become more standardized with courts having less tolerance for noncompliance to established standards.
  • 11. Business value • Most organizations are quickly realizing the need to manage information more effectively on an enterprise basis. • The evolution of information management governance is an essential business requirement to mitigate risk, reduce cost, and increase revenue • Market pressure for increased revenue is driving efforts to find creative ways for organizations to leverage the large volumes of information they retain to increase market share, drive revenue, and maintain a competitive advantage March 30, 2017. Kanata, ON. 11
  • 12. Data breaches, 1 March 30, 2017. Kanata, ON. 12 http://bit.ly/2m303eg
  • 13. Data breaches, 2 March 30, 2017. Kanata, ON. 13
  • 15. March 30, 2017. Kanata, ON. 15
  • 16. Guiding principles, 1 •Educate all employees regarding their Information Governance duties and responsibilities. •Confirm the authenticity and integrity of information. •Recognize that the official record is electronic (unless otherwise specified). •Store information in an enterprise-approved system or record-keeping repository. •Classify information under the correct record code. March 30, 2017. Kanata, ON. 16
  • 17. Guiding principles, 2 •Control the unnecessary proliferation of information. •Dispose of information when it reaches the end of its legal and operational usefulness. •Secure customer and enterprise confidential/personally identifiable information. •Comply with subpoena, audit, and discovery requests for information. March 30, 2017. Kanata, ON. 17
  • 18. Guiding principles, 3 •Align all lines of business systems and applications to Information Governance standards. •Ensure that third parties that hold customer or enterprise information comply with your organization’s Enterprise Information Governance standards March 30, 2017. Kanata, ON. 18
  • 19. 19 Information Governance Models March 30, 2017. Kanata, ON. 19
  • 20. Information Governance Reference Model (IGRM) March 30, 2017. Kanata, ON. 20 http://bit.ly/2m38Qgg
  • 21. Background to the IGRM • The IGRM was developed by EDRM, now a part of the Duke Law Center for Judicial Studies, which creates practical resources to improve e-discovery and information governance. • EDRM developed this model to create a framework by which to bring together the key players in information governance: • Business users who need information to operate the organization, • IT departments who must implement the mechanics of information management, and • Legal, risk, and regulatory departments who understand the organization’s duty to preserve information beyond its immediate business value. March 30, 2017. Kanata, ON. 21
  • 22. Components of IGRM •IGRM represents the functional areas that are directly responsible for the governance of information across an enterprise. •The model weights the involvement of the functional constituents: Business and IT have larger, more complex roles, Legal and RIM slightly less, and Information Privacy and Security share the smallest component as they are more specifically focused in their duties. March 30, 2017. Kanata, ON. 22
  • 23. Key functions in IGRM, 1 •Legal: responsible for determining the risk profile of an organization based on litigation exposures, international privacy requirements, intellectual property protection, working environment, and more. •Discovery: responsible for the communication, instruction, and coordination with business units or individuals related to information that must be located, preserved, and produced to satisfy litigation requirements March 30, 2017. Kanata, ON. 23
  • 24. Key functions in IGRM, 2 •Risk: responsible for the protection of the organization’s brand, finances, and operations by managing and mitigating risk exposures. This requires a full understanding of the organization’s risk profile (litigation, investigations, regulatory requirements, protection of private information, and protection of intellectual property). •Compliance: responsible for ensuring that the organization is aware of, and meets the requirements of rules and regulations imposed by a variety of authorities (federal, state/provincial, and local governments; regulatory agencies; data privacy authorities, and industry groups). March 30, 2017. Kanata, ON. 24
  • 25. Key functions in IGRM, 3 •RIM: responsible for the development and publication of the RIM Program policy for paper and electronic records. •IT: responsible for the management of the high volume of data being created and received, and the reduction of costs, particularly around redundant technologies and storage. •Privacy: responsible for managing the risks and business impacts of privacy laws and policies, and the use of personally identifiable information. March 30, 2017. Kanata, ON. 25
  • 26. Key functions in IGRM, 4 •Security: responsible for the development, implementation, and management of the organization’s security vision, strategy, policy, and programs. •Information Architecture: responsible for the organization of information and database development to support the business needs. •Business: responsible for compliance with the Information Governance policies. March 30, 2017. Kanata, ON. 26
  • 28. Scope • The Generally Accepted Recordkeeping Principles (The Principles), were created by ARMA International as a common set of principles that describe the conditions under which business records and related information should be maintained. • The Principles were designed to guide: • CEOs in determining how to protect their organizations in the use of information assets; • Legislators in crafting legislation meant to hold organizations accountable; and • Records management professionals in designing comprehensive and effective records management programs. March 30, 2017. Kanata, ON. 28
  • 29. The Principles, 1 Accountability: A senior executive shall oversee the information governance program and delegate responsibility for records and information management to appropriate individuals, The organization adopts policies and procedures to guide personnel and ensure that the program can be audited. Transparency: An organization’s business processes and activities, including its information governance program, shall be documented in an open and verifiable manner, and the documentation shall be available to all personnel and appropriate interested parties. Integrity: An information governance program shall be constructed so the information generated by or managed for the organization has a reasonable and suitable guarantee of authenticity and reliability. March 30, 2017. Kanata, ON. 29
  • 30. The Principles, 2 Protection: An information governance program shall be constructed to ensure a reasonable level of protection to records and information that are private, confidential, privileged, secret, classified, essential to business continuity, or that otherwise require protection. Compliance: An information governance program shall be constructed to comply with applicable laws and other binding authorities, as well as with the organization’s policies. Availability: An organization shall maintain records and information in a manner that ensures timely, efficient, and accurate retrieval of needed information. March 30, 2017. Kanata, ON. 30
  • 31. The Principles, 3 Retention: An organization shall maintain its records and information for an appropriate time, taking into account its legal, regulatory, fiscal, operational, and historical requirements. Disposition: An organization shall provide secure and appropriate disposition for records and information that are no longer required to be maintained by applicable laws and the organization’s policies March 30, 2017. Kanata, ON. 31
  • 32. The IG Maturity Model • The Maturity Model for Information Governance is designed to provide organizations a more complete picture of what effective information governance looks like. • The model is based on the eight principles as well as a foundation of standards, best practices, and legal/regulatory requirements. • The maturity model defines characteristics of various levels of recordkeeping programs. For each principle, the maturity model associates various characteristics that are typical for each of the five levels in the model March 30, 2017. Kanata, ON. 32
  • 33. Levels 1-2 Level 1 (Sub-standard): This level describes an environment where recordkeeping concerns are either not addressed at all, or are addressed in a very ad hoc manner. Organizations that identify primarily with these descriptions should be concerned that their programs will not meet legal or regulatory scrutiny. Level 2 (In Development): This level describes an environment where there is a developing recognition that recordkeeping affects the organization, and that the organization may benefit from a more defined information governance program. However, in Level 2, the organization is still vulnerable to legal or regulatory scrutiny since practices are ill-defined and still largely ad hoc in nature. March 30, 2017. Kanata, ON. 33
  • 34. Levels 3-4 Level 3 (Essential): This level describes the essential or minimum requirements that must be addressed in order to meet the organization's legal and regulatory requirements. Level 3 is characterized by defined policies and procedures, and more specific decisions taken to improve recordkeeping. However, organizations that identify primarily with Level 3 descriptions may still be missing significant opportunities for streamlining business and controlling costs. Level 4 (Proactive): This level describes an organization that is initiating information governance program improvements throughout its business operations. Information governance issues and considerations are integrated into business decisions on a routine basis, and the organization easily meets its legal and regulatory requirements. Organizations that identify primarily with these descriptions should begin to consider the business benefits of information availability in transforming their organizations globally. March 30, 2017. Kanata, ON. 34
  • 35. Level 5 Level 5 (Transformational): This level describes an organization that has integrated information governance into its overall corporate infrastructure and business processes to such an extent that compliance with the program requirements is routine. These organizations have recognized that effective information governance plays a critical role in cost containment, competitive advantage, and client service. March 30, 2017. Kanata, ON. 35
  • 36. 36 Information Governance Council March 30, 2017. Kanata, ON. 36
  • 37. IG oversight • A senior-level Information Governance Council is important to the success of any organization-wide IG program. It is important to include senior representatives of a number of different roles to ensure that all aspects of IG are understood, championed, and monitored. • The Council is responsible for approving an enterprise- wide Information Governance strategy, developing operating procedures for the Council, providing guidance about technology and standards, assisting in the securing of funds, and advocating the business value of information governance March 30, 2017. Kanata, ON. 37
  • 38. Examples of roles in IG Council March 30, 2017. Kanata, ON. 38 • CIO • Legal • Chief Data Officer • Chief Health Information Officer • Discovery or Litigation Officer • Risk Management • Compliance Officer • Records and Information Manager • Chief Data Privacy Officer • Information Technology Security • Information Technology Infrastructure • Critical Line of Business • International (Regional) Leaders
  • 39. 39 Best Practices for IG Council March 30, 2017. Kanata, ON. 39
  • 40. Suggested practices, 1 Senior executive support • It is important to have a supportive executive sponsor. Focus on outcomes or targeted action items • The Council should meet regularly (e.g., quarterly) with a clear agenda and ensuring that the concerns of each functional area are addressed. Topics could include the following, with specific targets or outcomes • key performance indicator metrics • consideration of new technology • change management • budget March 30, 2017. Kanata, ON. 40
  • 41. Suggested practices, 2 Self assessment •Have a self-assessment program to enable managers to reflect on good practices, and to identify and address potential weaknesses in the design or execution of internal processes that mitigate key operational risks and costs. Efficient use of technology •Use tools such as data analytics, auto-classification tools, and automated ways in which to monitor progress and to detect non-compliance. March 30, 2017. Kanata, ON. 41
  • 43. Contact information Dr. Louise Spiteri Louise.Spiteri@dal.ca http://about.me/louisespiteri March 30, 2017. Kanata, ON. 43