The document provides an overview of information governance, including definitions, principles, models, and functions. It defines information governance as the specification of decision rights and accountability for information valuation, creation, storage, use, archiving, and deletion. The key principles of information governance outlined are accountability, transparency, integrity, protection, compliance, availability, retention, and disposition. The Information Governance Reference Model is presented as a framework bringing together business, IT, legal, risk, and other functions. The Generally Accepted Recordkeeping Principles are also summarized as a standard for maintaining business records and information.
The document discusses information governance, including its definition, why it is important, who is responsible, and how to implement it. Specifically, it notes that information governance aims to manage information at an enterprise level to support regulatory, risk, and operational requirements. It discusses building a valued information asset, reducing costs and increasing revenue, and optimizing resource use as benefits. Ownership resides with the business, with a governance unit providing authority and control. The "how" section outlines scoping information governance, moving from a current fragmented state to a future state of alignment. It provides examples of projects, maturity models, and next steps to implement information governance.
Challenges & Benefits In Creating An Information Governance ProgramKevin Nugent
An information governance (IG) program specifies decision rights and accountability for managing an organization's information assets. It helps organizations effectively use information to achieve goals while mitigating risks. Key benefits of IG include regulatory compliance, security, efficiency gains, and better decision making. Getting an IG program started requires identifying stakeholders, building support from champions, developing practical technological and process components, and managing change. Long term success requires high-level buy-in, effective internal communication, ensuring the program is workable in practice, managing conflicts, and sustained commitment over time.
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...Nick Inglis
The document provides an overview of how to start an information governance program. It discusses defining information governance and exploring the current state of information management. It recommends starting with a meaningful problem, doing a quick win project to build support, and leveraging a model to build out the program in sections. The document also compares the AHIMA and Information Coalition information governance models and emphasizes understanding an organization's past information management practices to help build its future practices.
Planning Information Governance and Litigation ReadinessRich Medina
The document discusses planning for information governance over the next 3 years. It covers:
1. Introduction and background issues related to information governance.
2. A program framework, roadmap, and recommendations for developing an information governance program, including categories like governance, information organization, processes, architecture and technology, and communications.
3. An example problem of defensible disposition and how to approach it.
4. Next steps in planning for information governance for the years ahead.
The document discusses principles of holistic information governance. It outlines 10 principles: 1) information is an asset, 2) information has purpose, 3) information has sources and targets, 4) information has deadlines, 5) information has consumers, 6) information carries obligations, 7) information carries risks, 8) information has many forms, 9) information isn't immortal, and 10) information demands accountability. The presentation provides explanations and examples for each principle and emphasizes that information governance is important for businesses and allows organizations to get work done effectively.
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
The document discusses best practices for information governance, including how it can help organizations reduce costs and increase customer satisfaction. It provides an overview of SAP and Capgemini's information governance best practices and addresses common questions clients have around data issues. Information governance is important because data is a key organizational asset, and governance helps ensure consistent, accurate data is available for reporting and decision making. Lack of governance can lead to issues like multiple versions of the truth and inefficient processes. The benefits of effective information governance include reduced costs through improved data management, better decisions from leveraging high-quality data, and increased customer satisfaction.
The document discusses information governance, including its definition, why it is important, who is responsible, and how to implement it. Specifically, it notes that information governance aims to manage information at an enterprise level to support regulatory, risk, and operational requirements. It discusses building a valued information asset, reducing costs and increasing revenue, and optimizing resource use as benefits. Ownership resides with the business, with a governance unit providing authority and control. The "how" section outlines scoping information governance, moving from a current fragmented state to a future state of alignment. It provides examples of projects, maturity models, and next steps to implement information governance.
Challenges & Benefits In Creating An Information Governance ProgramKevin Nugent
An information governance (IG) program specifies decision rights and accountability for managing an organization's information assets. It helps organizations effectively use information to achieve goals while mitigating risks. Key benefits of IG include regulatory compliance, security, efficiency gains, and better decision making. Getting an IG program started requires identifying stakeholders, building support from champions, developing practical technological and process components, and managing change. Long term success requires high-level buy-in, effective internal communication, ensuring the program is workable in practice, managing conflicts, and sustained commitment over time.
This presentation explains Information Governance. Learn what it takes to improve the value of information, manage information risks, and reduce information costs.
Learning From IG Experts In Healthcare & Beyond: How To Start An Information ...Nick Inglis
The document provides an overview of how to start an information governance program. It discusses defining information governance and exploring the current state of information management. It recommends starting with a meaningful problem, doing a quick win project to build support, and leveraging a model to build out the program in sections. The document also compares the AHIMA and Information Coalition information governance models and emphasizes understanding an organization's past information management practices to help build its future practices.
Planning Information Governance and Litigation ReadinessRich Medina
The document discusses planning for information governance over the next 3 years. It covers:
1. Introduction and background issues related to information governance.
2. A program framework, roadmap, and recommendations for developing an information governance program, including categories like governance, information organization, processes, architecture and technology, and communications.
3. An example problem of defensible disposition and how to approach it.
4. Next steps in planning for information governance for the years ahead.
The document discusses principles of holistic information governance. It outlines 10 principles: 1) information is an asset, 2) information has purpose, 3) information has sources and targets, 4) information has deadlines, 5) information has consumers, 6) information carries obligations, 7) information carries risks, 8) information has many forms, 9) information isn't immortal, and 10) information demands accountability. The presentation provides explanations and examples for each principle and emphasizes that information governance is important for businesses and allows organizations to get work done effectively.
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
The document discusses best practices for information governance, including how it can help organizations reduce costs and increase customer satisfaction. It provides an overview of SAP and Capgemini's information governance best practices and addresses common questions clients have around data issues. Information governance is important because data is a key organizational asset, and governance helps ensure consistent, accurate data is available for reporting and decision making. Lack of governance can lead to issues like multiple versions of the truth and inefficient processes. The benefits of effective information governance include reduced costs through improved data management, better decisions from leveraging high-quality data, and increased customer satisfaction.
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
Information Governance – What Does a Modern Program Look Like?Winston & Strawn LLP
Corporations are increasingly focused on the importance of information governance, which is the process of managing the creation, flow, storage, and disposition of information from differing perspectives and disciplines. These include: records management; data security; protection of confidential business information; electronic discovery; and privacy.
Specifically, this presentation provides an in-depth discussion on designing and implementing a modern information governance program, covering the following topics:
Staffing
Policies
Tool sets
Education
Auditing
The document discusses lessons in information governance from a presentation given by John Newton, founder and CTO of Alfresco. Some key lessons are that closed systems are not always the most effective, strong governance is needed to make open collaboration work, zero tolerance policies do not work with users, effective governance should be invisible to users, and governance does not stop at organizational boundaries. Alfresco provides an open source content management platform and has over 180,000 community members, 200 partners, and manages over 10 billion documents for 1,300 customers in 180 countries.
Leveraging Information Lifecycle Governance To Achieve Information SuccessNick Inglis
Understanding how the information lifecycle helps improve information capabilities. Understanding information governance through the lifecycle portion of the information governance model.
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
How the world is changing -- Old paradigms are being stretched to the breaking point
How we usually think about governance -- It’s not just about what you keep
How should we respond? -- Building an action plan for the next 2-3 years
Executing on Information Governance (Learning From Law Firms)Nick Inglis
The document discusses various topics related to information governance, including:
- Defining information governance as maximizing information value while minimizing risks and costs
- Different types of projects and issues that lead organizations to implement information governance, such as data breaches, compliance concerns, and migrations
- Risks of "information governance washing" by vendors promoting non-compliant software solutions
- Using information governance strategies to balance information value and risk
SME- Developing an information governance strategy 2016 Hybrid Cloud
This white paper discusses the variety of challenges focused on information governance and also offers a variety of recommendations about what organizations can do to improve their information governance practices. The paper also provides a brief overview of its sponsor – StorageMadeEasy – and the company’s relevant solutions.
The lack of good information governance has brought us to an inflection point:
decision makers must gain control of their information to enable innovation, profit
and growth; or continue down the current path of information anarchy and
potentially lose out to competitors who are better able to govern their information.
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...DATAVERSITY
“Data privacy,” “data security,” “data protection” –
whatever we call the way we control our data, it isn’t working. Data is as
vulnerable as ever. And this is true for both consumers hoping to keep their
data safe, and for enterprises seeking to govern their corporate and customer
data.
We’re at a crossroads: Governing data and putting data to
use are two dueling objectives, and businesses are stuck in the middle.
Can this problem be solved? In a word: yes.
The answer is through what we call automated Data Governance, which introduces speed, agility, and precision into the process of applying rules on data. Join Immuta for a webinar as we explore these Data Governance challenges and discuss how you can proactively address them with automated Data Governance.
This document discusses how to create an automated information governance (IG) program. It outlines assessing information risk and compliance needs, developing an IG program with key stakeholders and a vision, establishing policies and procedures, monitoring the program, and automating processes with software. The goal is to mitigate risk, automate the information lifecycle from capture to disposition, and ensure adoption and adherence to compliance policies.
A Practical Guide To Information GovernanceMichael Curcio
This document provides guidance on developing an effective information governance program. It defines information governance as an enterprise framework for managing the information lifecycle, including classification, retention, and disposition. It recommends establishing an information governance council, led by an executive sponsor, to oversee the program. The council should include representatives from key functions like legal, IT, records management, and business units. The document also outlines best practices for information governance programs, such as securing executive support, setting clear objectives, and leveraging technology.
This document discusses the relationship between organizations and information systems. It explains that organizations and information systems influence each other in a two-way relationship. Key points about organizations that information systems must account for include their structure, business processes, politics, culture and environment. The document also discusses several models for how organizations can develop competitive strategies using information systems, including Porter's competitive forces model, the value chain model, synergies, core competencies and network economics. It provides examples of how information systems can help companies address competitive threats and take advantage of new opportunities.
The presentation focuses on the information management framework they use at the Parliament of SA to improve information management maturity in a measurable manner. He touches on information requirements management, information quality management, the role of an information architecture, integration layer and analytics in information management.
Download this presentation(and more) at http://opengroup.co.za/presentations
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
The document discusses information governance, defining it as being in control of information within an organization. It outlines 10 principles of information governance and what governance demands of companies, including knowing what information they have, its value, and managing its lifecycle. Governance ensures information is available, secure, and can be used as evidence. It also discusses how records management and compliance relate to governance and the future challenges of information governance in an increasingly digital world.
Higher education institutions experience more data breaches than any other industry. The document discusses privacy and security laws and regulations that apply to higher education such as FERPA, GLB, and state privacy laws. It provides recommendations for developing a comprehensive privacy program including inventorying information assets, assessing risks, reviewing policies, training employees, and monitoring compliance.
Data Stewardship is an approach to Data Governance that formalises accountability for managing information resources on behalf of others and for the best interests of the organization
Data Stewardship consists of the people, organisation, and processes to ensure that the appropriately designated stewards are responsible for the governed data.
Originally Published: Jan 21, 2015
The size and complexity of data make it difficult for companies to unlock the true value of their data. IBM Information Integration Governance can improve data quality, protect sensitive data, and reduce cost and risk. Free up your resources and get more out of your data.
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
Risk management is increasingly becoming a strategic, executive-sponsored solution that many organizations view as providing a competitive advantage. When companies have an aggregated view of all the different kinds of risk and compliance data, they can start to generate insights about how to run the business better. In this presentation, learn why and how to empower business leaders to make more risk-aware decisions with visibility across controls and associated issues and actions throughout the organization.
This document discusses information governance. It defines information governance as a framework of legal and ethical principles for collecting, processing, and sharing sensitive information. Information governance ensures personal information is handled legally, securely, efficiently and effectively. It includes processes, roles, policies, standards and metrics to ensure effective and efficient use of information to help an organization achieve its goals. The document also discusses concepts like data, information, big data, information security governance, benefits of information governance like reducing legal risk and costs, and challenges of information governance like the explosion of data.
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
Information governance, records and information management, and data disposition policies are ways to help lower costs and mitigate risks for organizations. Policies and procedures to actively manage data are not just an IT "problem," they're a collaborative business initiative that is a must in today's "big data" environment. With electronic discovery rules, government regulations and the Sarbanes-Oxley Act, all organizations must proactively take steps to manage their data with well-governed processes and controls, or be willing to face the risks and costs that come along with keeping everything. Organizations must know what information they have, where it is located, the duration data must be retained and what information would be needed when responding to an event.
There have been numerous instances of severe legal penalties for organizations that did not have an electronic data strategy, tools, processes and controls to locate and understand their own data. In addition, the risks of unmanaged data include skyrocketing infrastructure and personnel costs and an increase in attorney time to manage massive amounts of data when a litigation event occurs.
Information governance is needed much like any business continuity and disaster recovery plans, but with an understanding of data: where data are located, how data are managed, event response, and regular testing of processes and procedures for preparedness.
Building the Information Governance Business Case Within Your CompanyAIIM International
Information Governance is a critical component in today’s business world to ensure that ALL information is visible, organized, and compliant. This solution can help your business to gain a competitive edge through the strategic and economic use of information. Despite the critical need, many companies still struggle to get funding and buy-in from upper management to move initiatives forward. This presentation will highlight key focus points for IG advocates to get internal stakeholders on board.
Information Governance – What Does a Modern Program Look Like?Winston & Strawn LLP
Corporations are increasingly focused on the importance of information governance, which is the process of managing the creation, flow, storage, and disposition of information from differing perspectives and disciplines. These include: records management; data security; protection of confidential business information; electronic discovery; and privacy.
Specifically, this presentation provides an in-depth discussion on designing and implementing a modern information governance program, covering the following topics:
Staffing
Policies
Tool sets
Education
Auditing
The document discusses lessons in information governance from a presentation given by John Newton, founder and CTO of Alfresco. Some key lessons are that closed systems are not always the most effective, strong governance is needed to make open collaboration work, zero tolerance policies do not work with users, effective governance should be invisible to users, and governance does not stop at organizational boundaries. Alfresco provides an open source content management platform and has over 180,000 community members, 200 partners, and manages over 10 billion documents for 1,300 customers in 180 countries.
Leveraging Information Lifecycle Governance To Achieve Information SuccessNick Inglis
Understanding how the information lifecycle helps improve information capabilities. Understanding information governance through the lifecycle portion of the information governance model.
Information Governance -- Necessary Evil or a Bridge to the Future?John Mancini
How the world is changing -- Old paradigms are being stretched to the breaking point
How we usually think about governance -- It’s not just about what you keep
How should we respond? -- Building an action plan for the next 2-3 years
Executing on Information Governance (Learning From Law Firms)Nick Inglis
The document discusses various topics related to information governance, including:
- Defining information governance as maximizing information value while minimizing risks and costs
- Different types of projects and issues that lead organizations to implement information governance, such as data breaches, compliance concerns, and migrations
- Risks of "information governance washing" by vendors promoting non-compliant software solutions
- Using information governance strategies to balance information value and risk
SME- Developing an information governance strategy 2016 Hybrid Cloud
This white paper discusses the variety of challenges focused on information governance and also offers a variety of recommendations about what organizations can do to improve their information governance practices. The paper also provides a brief overview of its sponsor – StorageMadeEasy – and the company’s relevant solutions.
The lack of good information governance has brought us to an inflection point:
decision makers must gain control of their information to enable innovation, profit
and growth; or continue down the current path of information anarchy and
potentially lose out to competitors who are better able to govern their information.
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
Presented on PHPID Online Learning 35.
Komunitas PHP Indonesia
Title: Enabling Data Governance - The Journey through Data Trust, Ethics, and Quality
Eryk B. Pratama
Global IT & Cybersecurity Advisor
Automated Data Governance 101 - A Guide to Proactively Addressing Your Privac...DATAVERSITY
“Data privacy,” “data security,” “data protection” –
whatever we call the way we control our data, it isn’t working. Data is as
vulnerable as ever. And this is true for both consumers hoping to keep their
data safe, and for enterprises seeking to govern their corporate and customer
data.
We’re at a crossroads: Governing data and putting data to
use are two dueling objectives, and businesses are stuck in the middle.
Can this problem be solved? In a word: yes.
The answer is through what we call automated Data Governance, which introduces speed, agility, and precision into the process of applying rules on data. Join Immuta for a webinar as we explore these Data Governance challenges and discuss how you can proactively address them with automated Data Governance.
This document discusses how to create an automated information governance (IG) program. It outlines assessing information risk and compliance needs, developing an IG program with key stakeholders and a vision, establishing policies and procedures, monitoring the program, and automating processes with software. The goal is to mitigate risk, automate the information lifecycle from capture to disposition, and ensure adoption and adherence to compliance policies.
A Practical Guide To Information GovernanceMichael Curcio
This document provides guidance on developing an effective information governance program. It defines information governance as an enterprise framework for managing the information lifecycle, including classification, retention, and disposition. It recommends establishing an information governance council, led by an executive sponsor, to oversee the program. The council should include representatives from key functions like legal, IT, records management, and business units. The document also outlines best practices for information governance programs, such as securing executive support, setting clear objectives, and leveraging technology.
This document discusses the relationship between organizations and information systems. It explains that organizations and information systems influence each other in a two-way relationship. Key points about organizations that information systems must account for include their structure, business processes, politics, culture and environment. The document also discusses several models for how organizations can develop competitive strategies using information systems, including Porter's competitive forces model, the value chain model, synergies, core competencies and network economics. It provides examples of how information systems can help companies address competitive threats and take advantage of new opportunities.
The presentation focuses on the information management framework they use at the Parliament of SA to improve information management maturity in a measurable manner. He touches on information requirements management, information quality management, the role of an information architecture, integration layer and analytics in information management.
Download this presentation(and more) at http://opengroup.co.za/presentations
[Webinar Slides] Data Explosion in Your Organization? Harness It with a Compr...AIIM International
Check out these webinar slides to learn the latest ways Office 365 is providing the tools to develop and implement a modern records management strategy to take charge of the data explosion.
Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/data-explosion-in-your-organization-harness-it-with-a-comprehensive-records-management-strategy
The document discusses information governance, defining it as being in control of information within an organization. It outlines 10 principles of information governance and what governance demands of companies, including knowing what information they have, its value, and managing its lifecycle. Governance ensures information is available, secure, and can be used as evidence. It also discusses how records management and compliance relate to governance and the future challenges of information governance in an increasingly digital world.
Higher education institutions experience more data breaches than any other industry. The document discusses privacy and security laws and regulations that apply to higher education such as FERPA, GLB, and state privacy laws. It provides recommendations for developing a comprehensive privacy program including inventorying information assets, assessing risks, reviewing policies, training employees, and monitoring compliance.
Data Stewardship is an approach to Data Governance that formalises accountability for managing information resources on behalf of others and for the best interests of the organization
Data Stewardship consists of the people, organisation, and processes to ensure that the appropriately designated stewards are responsible for the governed data.
Originally Published: Jan 21, 2015
The size and complexity of data make it difficult for companies to unlock the true value of their data. IBM Information Integration Governance can improve data quality, protect sensitive data, and reduce cost and risk. Free up your resources and get more out of your data.
Advantages of an integrated governance, risk and compliance environmentIBM Analytics
Risk management is increasingly becoming a strategic, executive-sponsored solution that many organizations view as providing a competitive advantage. When companies have an aggregated view of all the different kinds of risk and compliance data, they can start to generate insights about how to run the business better. In this presentation, learn why and how to empower business leaders to make more risk-aware decisions with visibility across controls and associated issues and actions throughout the organization.
This document discusses information governance. It defines information governance as a framework of legal and ethical principles for collecting, processing, and sharing sensitive information. Information governance ensures personal information is handled legally, securely, efficiently and effectively. It includes processes, roles, policies, standards and metrics to ensure effective and efficient use of information to help an organization achieve its goals. The document also discusses concepts like data, information, big data, information security governance, benefits of information governance like reducing legal risk and costs, and challenges of information governance like the explosion of data.
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
Information governance, records and information management, and data disposition policies are ways to help lower costs and mitigate risks for organizations. Policies and procedures to actively manage data are not just an IT "problem," they're a collaborative business initiative that is a must in today's "big data" environment. With electronic discovery rules, government regulations and the Sarbanes-Oxley Act, all organizations must proactively take steps to manage their data with well-governed processes and controls, or be willing to face the risks and costs that come along with keeping everything. Organizations must know what information they have, where it is located, the duration data must be retained and what information would be needed when responding to an event.
There have been numerous instances of severe legal penalties for organizations that did not have an electronic data strategy, tools, processes and controls to locate and understand their own data. In addition, the risks of unmanaged data include skyrocketing infrastructure and personnel costs and an increase in attorney time to manage massive amounts of data when a litigation event occurs.
Information governance is needed much like any business continuity and disaster recovery plans, but with an understanding of data: where data are located, how data are managed, event response, and regular testing of processes and procedures for preparedness.
This document summarizes an upcoming two-day workshop on big data and government analytics to be held in Ottawa on March 24-25, 2015. The workshop will cover topics such as leveraging big data to improve government services, maximizing data sharing across departments, incorporating big data into overall data strategies, using big data for security purposes, and making data-driven decisions. It lists the workshop leaders and participating organizations, and provides an overview of the scheduled sessions and speakers.
MIS lecture notes by Yihune Ephrem Kassahun.pdfYihune Ephrem
The lecture notes on Management Information Systems (MIS) provide an in-depth understanding of the role of information systems in modern organizations. The notes cover a range of topics, including the basics of information systems, the types of information systems, the role of information systems in decision-making, and the impact of information systems on organizational performance.
The notes begin by introducing the concept of information systems and their importance in modern organizations. They then cover the different types of information systems, including transaction processing systems, management information systems, decision support systems, and executive information systems. The notes also discuss the role of information systems in decision-making, including the use of data analytics and business intelligence tools.
The lecture notes also cover the impact of information systems on organizational performance. This includes the benefits of information systems, such as increased efficiency, improved decision-making, and enhanced communication. The notes also discuss the challenges of implementing information systems, such as the need for training and support, and the potential for security breaches.
Throughout the lecture notes, real-world examples and case studies are used to illustrate the concepts and theories discussed. This helps students to understand how information systems are used in practice and how they can be applied in different organizational contexts.
Overall, the lecture notes on Management Information Systems provide a comprehensive overview of the role of information systems in modern organizations. They are an essential resource for students studying business, management, and information technology, as well as for professionals looking to enhance their knowledge and skills in this area.
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
The EU Global Data Protection Regulation (GDPR) and New York State Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500) represent a landmark change in the global data protection space. While they originate in different countries and apply to different organizations, their primary message is the same:
Protect your data, or pay a steep price. More specifically, protect the sensitive data you collect from customers.
With deadlines looming, is your organization ready?
The time to act is now. Read more to learn:
--Key mandates and minimum requirements for compliance
--Why a comprehensive data-centric security strategy is invaluable to all data protection and data privacy efforts
--How you can gauge your organization’s incident response capabilities
--How to extend your focus beyond the organization’s figurative four walls to ensure requirements are met throughout your supply chain
The first New York requirements deadline has arrived. With the next deadline of mandates only 6 months away, you don't want to fall behind and leave your organization at risk for potential penalties and fines.
This document summarizes a panel discussion on responsible data stewardship and its importance for business leadership. The panel discusses how data drives the marketing economy, with access to consumer data being a privilege requiring strong data governance. Effective data stewardship builds customer trust through purposeful data management and ensures accurate, safe and responsible data use. The panel warns of threats to the data economy from data breaches, misuse and overregulation, stressing that self-regulation is key. Recommendations include mapping customer data, developing unified data policies, training staff, and establishing a "data culture" of continuous learning.
The right approach to data governance plays a crucial role in the success of AI and analytics initiatives within an organization. This is especially true for small to medium-sized companies that must harness the power of data to drive growth, innovation and competitiveness.
This guide aims to provide SMB organizations with a practical roadmap to successfully implement a data governance strategy that ensures data quality, security and compliance. Use it to unlock the full potential of your data assets.
My keynote speech at the ISACA IIA Belgium software watch day in October 2014 in Brussels on the value of big data and data analytics for auditors and other assurance professionals
Over the past several years, companies are pairing diversity efforts with inclusion initiatives and roles
surrounding innovations that promote diversity of thought [13]. However, much return on investment (ROI) focus
has been on business and corporate functioning in general, but not on specifics related to information governance
(IG). We address this research gap byconsidering various return on investment (ROI) metrics and what might
ground the benefits of diversity and inclusion initiatives related to IG policy. Then, wesuggest what the results
mean in terms of changing and influencing current industry practices.:
Fundamentals of data security policy in i.t. management it-toolkitsIT-Toolkits.org
We all know that I.T. stands for “information technology” and that’s no accident. In fact, it’s a reflection of the primary mission of every I.T. organization – to provide the means and methods for creating, storing, transmitting, printing and retrieving business related information. By design, this operational mission is driven by the need to “protect”, which also includes preventing unauthorized access, uncontrolled modification and unwarranted destruction. The priorities are self evident – data integrity is vital, and vital needs must be met with purpose and committment. The tricky part is to balance vital interests with the associated costs and operational overhead. This is the higher purpose of data security and the goal of related policy development.
This document discusses data governance and provides definitions, statistics, and best practices. It notes that while 39% of organizations have little data governance, 72% of CIOs plan to implement enterprise-wide governance in the next three years. Data governance refers to the overall management of data availability, usability, integrity, and security. It involves establishing policies, processes, roles, and technologies to ensure data is used strategically and as a business asset. The five pillars of effective data governance are policies, processes, business rules, people and roles, and technologies.
Protecting business interests with policies for it asset management it-tool...IT-Toolkits.org
This document discusses the importance of developing a data security policy and provides guidance on key components to include. It explains that a data security policy should define the goals, scope, stakeholders, means of securing data, compliance guidelines, and enforcement. The document emphasizes taking an inclusive approach to policy development by getting input from all relevant stakeholders.
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfSoumodeep Nanee Kundu
Data governance is a critical framework in the world of data analysis. This essay delves into the concept of data governance, exploring its fundamental principles, components, and significance in data analysis. We discuss the importance of data governance in ensuring data quality, security, compliance, and transparency, as well as its role in fostering a data-driven culture within organizations. This comprehensive examination illuminates the intricate web of data governance and its pivotal role in effective and responsible data analysis.
In the digital age, data is often referred to as the "new oil." Its value is undeniable, driving insights, innovation, and informed decision-making across various domains. However, the efficient and responsible utilization of data depends on a critical foundation: data governance. In the realm of data analysis, data governance plays a central role in ensuring the quality, security, compliance, and transparency of data, while also fostering a data-driven culture within organizations. This essay delves into the concept of data governance, elucidating its principles, components, and significance in the context of data analysis.
This presentation highlights the fair data economy rulebook, covering its importance, application in data network construction, and content with contract templates for secure data sharing.
Rooted in Sitra's IHAN project, it envisions responsible and human-centric data utilization.
1001Lakes is your trusted companion in fair data sharing ecosystem collaborations.
Data analytics, data management, and master data
management are part of an overall imperative
for public-sector organizations. They are central to
organizational competitiveness and relevancy. The City of
Cincinnati, Ohio, has developed a robust master data management
process, and any government can use the city’s
achievements as a best practices model for their own master
data management strategy. This article looks at several
administrative regulations, touching on reasons why master
data management is essential, the benefits it can confer, how
Cincinnati got started, the city’s framework, and the lessons
the city learned along the way
This document discusses the implementation of a management information system at PT Indofood, a large Indonesian food and beverage company. It describes how Indofood uses SAP software across various divisions to integrate planning, production, and distribution functions. Key benefits highlighted include improved forecasting and production planning based on detailed sales data analysis, and the ability to distribute tailored management reports across different levels of the organization. The implementation of an enterprise-wide information system is said to support Indofood's strategic goals and competitive advantage through efficient operations and responsiveness to customer demands.
This document summarizes key concepts from Chapter 2 of the textbook "IT for Management: On-Demand Strategies for Performance, Growth, and Sustainability". It discusses information systems, IT architecture, data governance, and cloud computing. Specifically, it defines data centers, cloud computing, virtualization, and different cloud service models. It also explains the benefits of technologies like virtualization, data virtualization, and software-defined data centers.
The document defines key concepts in management information systems including management, information, data, and information systems. It describes an MIS as an integrated system that provides information to support operations, management, and decision-making in an organization. The basic objectives of an MIS are to capture, process, store, retrieve, and disseminate relevant information. An MIS is characterized as being based on long-term planning, providing a holistic organizational view, and working as a comprehensive system covering all interconnected subsystems. Information systems support business processes, operations, and decision-making at various levels of the organization.
[MU630] 004. Business Intelligence & Decision SupportAriantoMuditomo
Copyright Notice:
This presentation is prepared by Author for Perbanas Institute as a part of Author Lecture Series. It is to be used for educational and non-commercial purposes only and is not to be changed, altered, or used for any commercial endeavor without the express written permission from Author and/or Perbanas Institute. Appropriate legal action may be taken against any person, organization, or entity attempting to misrepresent, charge, or profit from the educational materials contained here.
Authors are allowed to use their own articles without seeking permission from any person, organization, or entity.
IMT500 Foundations Of Information Management.docxwrite4
This document discusses information management and security. It begins with an introduction to information security and data management. It then provides theoretical background on topics like information management, information technology, information security, data management, data quality management, data governance, and data architecture. It describes Walmart's management information system and how it oversees organizational activities and data confidentiality. It discusses the research method, including a post-positivist philosophy, deductive approach, and descriptive research design. It presents findings from interviews with two Walmart managers about the importance of information systems and security. It concludes that Walmart runs its business successfully through efficient use of its management information system and EDI model.
Similar to Establishing an information governance program (20)
Your organization and big data: Managing access, privacy, & securityLouise Spiteri
Louise Spiteri gave a presentation on managing big data for organizations. She defined big data as high-volume, high-velocity, and high-variety information that requires new technologies to process and analyze. Spiteri discussed the four V's of big data - volume, variety, velocity, and veracity. She also covered how organizations can analyze big data through techniques like text analytics, audio analytics, video analytics, social media analytics, and predictive analytics. Finally, Spiteri addressed privacy and security considerations for big data, emphasizing the need for information security, data privacy, and principles of choice, consent, collection and use, and retention.
Your organization and Big Data: Managing access, privacy, and securityLouise Spiteri
This document summarizes a presentation about managing big data in organizations. It defines big data as high-volume, high-velocity, and high-variety information assets that require new processing techniques. The value of big data comes from insights that enable better decision-making. Big data is characterized by the four Vs - volume, velocity, variety, and veracity. The document discusses how organizations can mine and analyze big data through techniques like text analytics, audio analytics, video analytics, social media analytics, and predictive analytics. It also covers privacy and security considerations for big data, noting the need for strong governance to avoid privacy risks with large and diverse datasets.
Student activities in the Master of Library & Information Management program....Louise Spiteri
The document discusses opportunities for MLIS students to get involved in their community and professional associations through various student chapters, conferences, networking events, and social activities. It lists several specific student associations, professional organizations, and conferences that MLIS students can participate in. Contact information is provided to learn more.
This document summarizes research on how user-generated content in online public access catalogues (OPACs) can strengthen readers' advisory services in Canadian public libraries. User tags and reviews of fiction titles were analyzed from 43 library catalogues. The analysis found that tags and reviews provided more affective and experiential descriptions than traditional subject headings. User content also categorized titles based on elements like tone, readability, and personal recommendations, in addition to factual categories like characters and settings. The research suggests that social discovery tools allow users to belong to a wider reading community and provide more complete depictions of works' contents and emotional impacts.
Social media’s role in tenure and promotion 2014 03-17Louise Spiteri
The document discusses social media's role in tenure and promotion considerations for academics. It summarizes a report on researchers' use of social media, finding the top three tools are for collaboration, conferencing and scheduling. Younger researchers and innovators are more likely to use social media. Some universities now consider social media use in tenure guidelines. While attitudes vary, many see benefits to using social media for disseminating research. Alternative metrics ("altmetrics") are emerging to measure social media impact, but concerns around their use for tenure remain.
This document discusses electronic discovery (eDiscovery) which refers to the discovery of electronically stored information in legal cases. It notes that eDiscovery costs are skyrocketing, averaging over $1.5 million per corporate lawsuit. The document outlines typical eDiscovery costs including collecting, processing, reviewing data which can cost thousands or millions depending on the size of the case. It emphasizes that proactive information management is key to addressing eDiscovery by developing policies to help employees manage information and only retain necessary records.
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...Louise Spiteri
This document outlines a research project exploring how social discovery tools in public library catalogs can complement traditional readers' advisory services. The researchers will analyze user-generated tags and reviews for fiction titles in BiblioCommons and Encore catalogs to see what types of access points readers provide and how these compare to traditional RA categories. They will then examine how social tools can help readers find connections and provide grassroots recommendations, and how libraries can use this information. The goal is to better understand readers' needs and perspectives in catalog records for fiction.
Managing social software applications in the corporate and public sector envi...Louise Spiteri
This document discusses managing social software applications in corporate and public sector environments. It defines social software as tools for collaboration and networking within and beyond the enterprise. It also discusses how social software is pushing for more bottom-up and flexible collaboration using tools like wikis, blogs, social bookmarking and tagging. However, it notes there must be policies and compliance with standards to ensure security, accuracy and integrity of information generated through these tools.
The role of causality and conceptual coherence in assessments of similarityLouise Spiteri
1) The document discusses theories of concept formation and how concepts are understood. It focuses on the roles of similarity, conceptual coherence, and causality in how concepts are formed and understood.
2) Similarity-based theories of concepts posit that concepts are defined by shared attributes among members, but the document argues similarity alone does not fully explain conceptual coherence.
3) Knowledge-based theories argue conceptual understanding depends on causal relationships between attributes and people's knowledge of these causal links.
Faceted navigation of social tagging applicationsLouise Spiteri
This document summarizes a study on using facets to organize tags in social tagging applications. It discusses several key challenges:
1) There is no agreed upon definition of what constitutes a facet. Most definitions emphasize facets as mutually exclusive categories, but definitions vary.
2) Studies disagree on how to choose facets. Few explain how they derived their own facet lists or tested them with users. Choosing facets that apply broadly is difficult given diverse subject matter.
3) There is no consensus on the optimal number of facets. Too few may be restrictive, but too many could confuse users in distinguishing facets.
4) It is unclear who should choose facets - users, site editors with taxonomy experience, or researchers.
The Records Continuum Model proposes that records management and archives management should be viewed as a continuum rather than as separate stages. It was developed in response to criticisms of the traditional Records Life Cycle Model, which treats records management and archival management as distinct phases divided between records managers and archivists. The Records Continuum Model emphasizes that records have ongoing transactional, evidential and memory value throughout their lifespan. It promotes cooperation between records managers and archivists to ensure the proper creation, organization, access, and long-term preservation of records.
User-generated metadata: Boon or bust for indexing and controlled vocabularies?Louise Spiteri
This document discusses user-generated metadata through social tagging and its impact on indexing and controlled vocabularies. It begins by describing traditional metadata created by authorities and how user tagging allows for customization. Social tagging sites like Delicious allow users to organize bookmarks with their own tags and see recommendations. Limitations of folksonomies include ambiguity and lack of standardization. However, social tagging lowers barriers to cooperation and reflects users' needs. The ideal is to combine controlled vocabularies with user tags to leverage both. New forms of tagging include hashtags and geotags. Overall, social tagging is here to stay so information professionals should embrace it and find ways to integrate it with traditional indexing.
Community engagement: The new social media mantra for academic librariesLouise Spiteri
This document discusses strategies for effectively managing social media in organizations. It emphasizes the importance of an integrated approach and having governance policies in place. Key challenges mentioned include differentiating your organization, crisis management, assessing effectiveness, and creating strategies that work for your specific needs. Guidelines provided for social media policies include clarifying what is expected of employees, respecting privacy and other laws, and reserving the right to remove inappropriate posts. Overall, the document stresses the need for organizations to strategically adopt social media and tie its use to measurable outcomes.
Social discovery tools: Cataloguing meets user convenienceLouise Spiteri
The document discusses how social discovery tools can help reconcile traditional library catalogues with user needs and cultural values. It explores how allowing users to contribute metadata through tagging, reviews, and ratings gives them a voice to express their perspectives. This user-generated content can help library staff better understand their communities and create more culturally relevant collections and services. While user contributions may not be as objective as cataloguer-created records, they provide insight into how people interact with information and can inform updates to controlled vocabularies. Overall, social discovery systems provide a way for cataloguers to continue ensuring accurate records while also prioritizing user convenience and cultural representation.
Social cataloguing sites: Features and implications for cataloguing practice ...Louise Spiteri
The document discusses social cataloguing sites and their potential implications for library catalogues. It finds that while social cataloguing sites lack comprehensive bibliographic data, they incorporate useful social features like reviews, ratings, tags and recommendations. The study examines 16 sites and compares their records and social features. It suggests libraries could link to social catalog sites and consider integrating social features into catalogues, like user reviews and ratings, discussions boards and tags, to make them more interactive and community-oriented. This may better meet user expectations and help libraries learn from the models of social sites.
This document discusses four areas of research related to social tagging applications. The first focuses on using facets to organize tags in social tagging systems. The second examines how user-generated metadata like tags and reviews can transform library catalogs into social spaces. The third aims to understand user motivations for social tagging. The fourth looks at how social tags could help design library catalogs to meet different cultural community needs.
This document provides an overview of RDA (Resource Description and Access), FRBR (Functional Requirements for Bibliographic Records), and FRAD (Functional Requirements for Authority Data). It discusses how RDA is based on FRBR and aims to improve resource discovery by focusing on user tasks and clarifying relationships between works, expressions, manifestations and items. Key differences between RDA and AACR2 include RDA being more principles-based, user-focused, and designed for the digital environment. Major libraries plan to implement RDA in early 2013.
The public library catalogue as a social space: A case study of social discov...Louise Spiteri
This study analyzed transaction logs from the social discovery systems AquaBrowser and BiblioCommons to evaluate how public library users interact with these systems. Key findings include: 1) searches by title, keyword, and item details were most common, while searches using tags or user-generated content were rare; 2) faceted browsing of results focused heavily on format with other facets like tags underused; and 3) little user-generated content like tags, ratings or reviews was added to catalog records over four months. The study concludes social features are not extensively used and future research should examine why and how users do or don't contribute content.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
karnataka housing board schemes . all schemesnarinav14
The Karnataka government, along with the central government’s Pradhan Mantri Awas Yojana (PMAY), offers various housing schemes to cater to the diverse needs of citizens across the state. This article provides a comprehensive overview of the major housing schemes available in the Karnataka housing board for both urban and rural areas in 2024.
Bharat Mata - History of Indian culture.pdfBharat Mata
Bharat Mata Channel is an initiative towards keeping the culture of this country alive. Our effort is to spread the knowledge of Indian history, culture, religion and Vedas to the masses.
The Power of Community Newsletters: A Case Study from Wolverton and Greenleys...Scribe
YOU WILL DISCOVER:
The engaging history and evolution of Wolverton and Greenleys Town Council's newsletter
Strategies for producing a successful community newsletter and generating income through advertising
The decision-making process behind moving newsletter design from in-house to outsourcing and its impacts
Dive into the success story of Wolverton and Greenleys Town Council's newsletter in this insightful webinar. Hear from Mandy Shipp and Jemma English about the newsletter's journey from its inception to becoming a vital part of their community's communication, including its history, production process, and revenue generation through advertising. Discover the reasons behind outsourcing its design and the benefits this brought. Ideal for anyone involved in community engagement or interested in starting their own newsletter.
Presentation by Julie Topoleski, CBO’s Director of Labor, Income Security, and Long-Term Analysis, at the 16th Annual Meeting of the OECD Working Party of Parliamentary Budget Officials and Independent Fiscal Institutions.
Indira awas yojana housing scheme renamed as PMAYnarinav14
Indira Awas Yojana (IAY) played a significant role in addressing rural housing needs in India. It emerged as a comprehensive program for affordable housing solutions in rural areas, predating the government’s broader focus on mass housing initiatives.
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
How To Cultivate Community Affinity Throughout The Generosity JourneyAggregage
This session will dive into how to create rich generosity experiences that foster long-lasting relationships. You’ll walk away with actionable insights to redefine how you engage with your supporters — emphasizing trust, engagement, and community!
2. Agenda
1. Definition of Information governance
2. Value of Information governance
3. Principles of Information governance
4. Information governance models
5. Information governance council
2March 30, 2017. Kanata, ON.
4. How do you define information
governance?
March 30, 2017. Kanata, ON. 4
5. Some definitions
•Gartner: The specification of decision rights and an
accountability framework to ensure appropriate behavior
in the valuation, creation, storage, use, archiving and
deletion of information. It includes the processes, roles
and policies, standards and metrics that ensure the
effective and efficient use of information in enabling an
organization to achieve its goals (http://gtnr.it/2lE4K2)
•Information governance is the activities and technologies
that organizations employ to maximize the value of their
information while minimizing associated risks and costs
(iginiative.com).
March 30, 2017. Kanata, ON. 5
6. Activities that are part of IG
•Records management
•Compliance
•Storage and archiving
•Security
•Risk management
•eDiscovery
March 30, 2017. Kanata, ON. 6
Any others?
8. Why do we need IG?
•Exponential growth of digital data
•Increased complexity of regulatory environment
•Business value and risks are often unknown and
unmanaged
•Increased sharing of information outside the organization
•Prevalence of social networking and mobile applications
•Increased risk of security breaches or data loss
March 30, 2017. Kanata, ON. 8
9. Data management
•The volume of information continues to explode
exponentially and has become more mobile, making
the job of protecting it even more difficult as
requirements to do so increase.
March 30, 2017. Kanata, ON. 9
10. Regulatory environment
March 30, 2017. Kanata, ON. 10
Traditional activities, such as
records management, are no
longer sufficient to meet the
demands of the business or the
ever increasing and more
complex legal and regulatory
requirements.
Legal discovery requirements continue to become more
standardized with courts having less tolerance for
noncompliance to established standards.
11. Business value
• Most organizations are quickly realizing the need to manage
information more effectively on an enterprise basis.
• The evolution of information management governance is an
essential business requirement to mitigate risk, reduce cost, and
increase revenue
• Market pressure for increased revenue is driving efforts to find
creative ways for organizations to leverage the large volumes of
information they retain to increase market share, drive revenue,
and maintain a competitive advantage
March 30, 2017. Kanata, ON. 11
16. Guiding principles, 1
•Educate all employees regarding their Information
Governance duties and responsibilities.
•Confirm the authenticity and integrity of information.
•Recognize that the official record is electronic (unless
otherwise specified).
•Store information in an enterprise-approved system or
record-keeping repository.
•Classify information under the correct record code.
March 30, 2017. Kanata, ON. 16
17. Guiding principles, 2
•Control the unnecessary proliferation of information.
•Dispose of information when it reaches the end of its
legal and operational usefulness.
•Secure customer and enterprise confidential/personally
identifiable information.
•Comply with subpoena, audit, and discovery requests for
information.
March 30, 2017. Kanata, ON. 17
18. Guiding principles, 3
•Align all lines of business systems and
applications to Information Governance
standards.
•Ensure that third parties that hold customer or
enterprise information comply with your
organization’s Enterprise Information Governance
standards
March 30, 2017. Kanata, ON. 18
21. Background to the IGRM
• The IGRM was developed by EDRM, now a part of the Duke Law
Center for Judicial Studies, which creates practical resources to
improve e-discovery and information governance.
• EDRM developed this model to create a framework by which to
bring together the key players in information governance:
• Business users who need information to operate the
organization,
• IT departments who must implement the mechanics of
information management, and
• Legal, risk, and regulatory departments who understand the
organization’s duty to preserve information beyond its
immediate business value.
March 30, 2017. Kanata, ON. 21
22. Components of IGRM
•IGRM represents the functional areas that are directly
responsible for the governance of information across an
enterprise.
•The model weights the involvement of the functional
constituents: Business and IT have larger, more complex
roles, Legal and RIM slightly less, and Information
Privacy and Security share the smallest component as
they are more specifically focused in their duties.
March 30, 2017. Kanata, ON. 22
23. Key functions in IGRM, 1
•Legal: responsible for determining the risk profile
of an organization based on litigation exposures,
international privacy requirements, intellectual
property protection, working environment, and
more.
•Discovery: responsible for the communication,
instruction, and coordination with business units
or individuals related to information that must be
located, preserved, and produced to satisfy
litigation requirements
March 30, 2017. Kanata, ON. 23
24. Key functions in IGRM, 2
•Risk: responsible for the protection of the organization’s
brand, finances, and operations by managing and
mitigating risk exposures. This requires a full
understanding of the organization’s risk profile (litigation,
investigations, regulatory requirements, protection of
private information, and protection of intellectual
property).
•Compliance: responsible for ensuring that the
organization is aware of, and meets the requirements of
rules and regulations imposed by a variety of
authorities (federal, state/provincial, and local
governments; regulatory agencies; data privacy
authorities, and industry groups).
March 30, 2017. Kanata, ON. 24
25. Key functions in IGRM, 3
•RIM: responsible for the development and publication
of the RIM Program policy for paper and electronic
records.
•IT: responsible for the management of the high volume of
data being created and received, and the reduction of
costs, particularly around redundant technologies and
storage.
•Privacy: responsible for managing the risks and
business impacts of privacy laws and policies, and the
use of personally identifiable information.
March 30, 2017. Kanata, ON. 25
26. Key functions in IGRM, 4
•Security: responsible for the development,
implementation, and management of the organization’s
security vision, strategy, policy, and programs.
•Information Architecture: responsible for the
organization of information and database development
to support the business needs.
•Business: responsible for compliance with the
Information Governance policies.
March 30, 2017. Kanata, ON. 26
28. Scope
• The Generally Accepted Recordkeeping Principles (The
Principles), were created by ARMA International as a common set
of principles that describe the conditions under which business
records and related information should be maintained.
• The Principles were designed to guide:
• CEOs in determining how to protect their organizations in the
use of information assets;
• Legislators in crafting legislation meant to hold organizations
accountable; and
• Records management professionals in designing
comprehensive and effective records management programs.
March 30, 2017. Kanata, ON. 28
29. The Principles, 1
Accountability: A senior executive shall oversee the information
governance program and delegate responsibility for records and
information management to appropriate individuals, The
organization adopts policies and procedures to guide personnel and
ensure that the program can be audited.
Transparency: An organization’s business processes and
activities, including its information governance program, shall be
documented in an open and verifiable manner, and
the documentation shall be available to all personnel
and appropriate interested parties.
Integrity: An information governance program shall be constructed
so the information generated by or managed for the organization
has a reasonable and suitable guarantee of authenticity and
reliability.
March 30, 2017. Kanata, ON. 29
30. The Principles, 2
Protection: An information governance program shall
be constructed to ensure a reasonable level of protection to records
and information that are private, confidential, privileged, secret,
classified, essential to business continuity, or that otherwise require
protection.
Compliance: An information governance program shall
be constructed to comply with applicable laws and other binding
authorities, as well as with the organization’s policies.
Availability: An organization shall maintain records and information
in a manner that ensures timely, efficient, and accurate retrieval of
needed information.
March 30, 2017. Kanata, ON. 30
31. The Principles, 3
Retention: An organization shall maintain its records
and information for an appropriate time, taking into
account its legal, regulatory, fiscal, operational,
and historical requirements.
Disposition: An organization shall provide secure
and appropriate disposition for records and information
that are no longer required to be maintained by applicable
laws and the organization’s policies
March 30, 2017. Kanata, ON. 31
32. The IG Maturity Model
• The Maturity Model for Information Governance is designed to provide
organizations a more complete picture of what effective information
governance looks like.
• The model is based on the eight principles as well as a foundation of
standards, best practices, and legal/regulatory requirements.
• The maturity model defines characteristics of various levels of
recordkeeping programs. For each principle, the maturity model associates
various characteristics that are typical for each of the five levels in the
model
March 30, 2017. Kanata, ON. 32
33. Levels 1-2
Level 1 (Sub-standard): This level describes an
environment where recordkeeping concerns are either not
addressed at all, or are addressed in a very ad hoc manner.
Organizations that identify primarily with these descriptions
should be concerned that their programs will not meet legal
or regulatory scrutiny.
Level 2 (In Development): This level describes an
environment where there is a developing recognition that
recordkeeping affects the organization, and that the
organization may benefit from a more defined information
governance program. However, in Level 2, the organization
is still vulnerable to legal or regulatory scrutiny since
practices are ill-defined and still largely ad hoc in nature.
March 30, 2017. Kanata, ON. 33
34. Levels 3-4
Level 3 (Essential): This level describes the essential or minimum
requirements that must be addressed in order to meet the organization's legal
and regulatory requirements. Level 3 is characterized by defined policies and
procedures, and more specific decisions taken to improve recordkeeping.
However, organizations that identify primarily with Level 3 descriptions may still
be missing significant opportunities for streamlining business and controlling
costs.
Level 4 (Proactive): This level describes an organization that is initiating
information governance program improvements throughout its business
operations. Information governance issues and considerations are integrated
into business decisions on a routine basis, and the organization easily meets its
legal and regulatory requirements. Organizations that identify primarily with
these descriptions should begin to consider the business benefits of information
availability in transforming their organizations globally.
March 30, 2017. Kanata, ON. 34
35. Level 5
Level 5 (Transformational): This level describes an
organization that has integrated information governance
into its overall corporate infrastructure and business
processes to such an extent that compliance with the
program requirements is routine. These organizations
have recognized that effective information governance
plays a critical role in cost containment, competitive
advantage, and client service.
March 30, 2017. Kanata, ON. 35
37. IG oversight
• A senior-level Information Governance Council is important to the
success of any organization-wide IG program. It is important to
include senior representatives of a number of different roles to
ensure that all aspects of IG are understood, championed, and
monitored.
• The Council is responsible for approving an enterprise-
wide Information Governance strategy, developing operating
procedures for the Council, providing guidance about technology
and standards, assisting in the securing of funds, and advocating
the business value of information governance
March 30, 2017. Kanata, ON. 37
38. Examples of roles in IG Council
March 30, 2017. Kanata, ON. 38
• CIO
• Legal
• Chief Data Officer
• Chief Health Information
Officer
• Discovery or Litigation Officer
• Risk Management
• Compliance Officer
• Records and Information
Manager
• Chief Data Privacy Officer
• Information Technology Security
• Information Technology
Infrastructure
• Critical Line of Business
• International (Regional) Leaders
40. Suggested practices, 1
Senior executive support
• It is important to have a supportive executive sponsor.
Focus on outcomes or targeted action items
• The Council should meet regularly (e.g., quarterly) with a clear
agenda and ensuring that the concerns of each functional area are
addressed. Topics could include the following, with specific targets
or outcomes
• key performance indicator metrics
• consideration of new technology
• change management
• budget
March 30, 2017. Kanata, ON. 40
41. Suggested practices, 2
Self assessment
•Have a self-assessment program to enable managers to
reflect on good practices, and to identify and address
potential weaknesses in the design or execution of
internal processes that mitigate key operational risks and
costs.
Efficient use of technology
•Use tools such as data analytics, auto-classification tools,
and automated ways in which to monitor progress and to
detect non-compliance.
March 30, 2017. Kanata, ON. 41