SlideShare a Scribd company logo
1 of 15
A Call To Action: RIM and eDiscovery for
the Next Generation
Summary of Key Findings

Michael Salvarezza
LRN


September 24, 2012




                          CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   1
Challenges
                                     Social media
                                     and business
                                    transformation



     Explosive                    Growing urgency                            Rapid expansion
     growth in                                                                 in laws and
     volume of                     to gain control                             compliance
  content creation                 of this dynamic                             regulations




                                         MiFID




                Title 21 CFR 11

                                                  PATRIOT ACT


                                          CONFIDENTIAL          ©2012 LRN Corporation. All Rights Reserved.   2
Records Management vs.
Social Media vs. Business

 Social Media       Records                         Businesses
 promotes:          Management                      care about:
 • Sharing          is about:                       • Agility
 • Collaboration    • Governance                    • Complexity
 • Open                                             • Access to
 • Rapid access                                       information
   to information                                   • Insights
 • Casual,                                            derived from
   informal, spon                                     information
   taneous                                          • Speed and
                                                      results




                           CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   3
Governance Approach

• Legal, IT, business units
  (e.g., sales)
• Define
  roles/responsibilities

• Include
  next-generation
  workers




                    4
                              CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   4
Policy Approach

• Social media, BYOD, mobile
  computing, cloud computing
• No policy can address
  all instances, so focus on principles
  and extend trust
• Focus on what is critical
  to the business to keep
• Recreate vs. capture




                                      CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   5
Set Policies: General Principles

• Lead with trust…and then
  provide guidelines
• Encourage responsible use
• Frame policies to address
  responsibility, not productivity
• Grant equal access
• Provide training




                                     CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   6
Social Media Policies: Elements

• State objectives and purpose
• Include definitions and examples
• Define what is proprietary or confidential and prohibit its use on these sites
  (e.g., customer information, financial data, legal matters)
• Identify what is expressly prohibited (e.g., libelous comments,
  illegal activity, obscenity)
• Specify who may speak on
  behalf of the company
• Specify who will own work
  products created on sites
• Include legal and regulatory
  issues that apply
• Refer to specific security concerns
• Include discipline and ramifications

                                           CONFIDENTIAL     ©2012 LRN Corporation. All Rights Reserved.   7
Sample Guidelines

When on a social media site:
•   Listen first, talk later; pause and reflect before actually posting
•   Identify yourself; avoid anonymity
•   Respond to ideas…not people
•   Be respectful; always seek to add value
•   If you are not authorized to speak for
    the company, specify that opinions
    are your own
• Know the facts and cite sources; do not guess
• Do not go “off the record”
• If you respond to a problem, you must follow up


                                         CONFIDENTIAL    ©2012 LRN Corporation. All Rights Reserved.   8
Records Management of Social Media

• Consider where the business record is created:
  – If the record is created outside of the social media site,
    the copy posted to the social media site could be considered
    a “convenience” copy
  – If transactional information created on a social media site is a
    business record under your policy, then have a mechanism in place
    to capture, store, search, and retrieve those records
• Ensure procedures specify that Records Managers review
  the social media site framework before the site is launched
  – To assess capability for proper handling of business records
• Educate employees through training sessions and communications




                                       CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   9
Mobile Computing and BYOD Policy
Considerations

General Principles:
• Make sure the policy is enforceable.
• Do not rely on device specificity. (Devices become obsolete rapidly).
  Rather, make sure the policy is broad and general.
• Orient the policy from the business value perspective.
• Provide training on appropriate
  use of devices, proper management
  and security of information,
  segregation of personal and
  business data and IT information
  management controls.




                                     CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   10
Mobile Computing Policy Considerations

Policy Considerations:
• Define accountabilities for control (user, IT, business unit, etc.)
• Address the distinction between personal and business data
• Ensure proper controls in the event of theft or loss of the device
• Provide coverage for business provided devices and personally
  owned devices
• Address funding of devices or the
  cost of controls, especially for
  personally owned devices
• Address different geographies
• Focus on both employees and
  contracted resources


                                        CONFIDENTIAL    ©2012 LRN Corporation. All Rights Reserved.   11
Mobile Computing Policy Considerations

Policy Considerations (continued):
• Define the appropriate use of business records on these devices and
  address requirements for retention of records
• Security Awareness/Privacy Awareness/Compliance
  – Awareness should be addressed
• Human Resource considerations
• Use of devices for personal use
• Use of devices after hours and on
  personal time
• Use of devices while engaged in travel
• Inappropriate data and website access


                                      CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   12
Rethink

           “We can’t solve
           problems by using the
           same kind of thinking
           we used when we
           created them”
Copyright © 2011 LRN Group Inc. All rights reserved
Inspirational Leadership for
Records Management


 • Ambiguity is actually OK
 • Take risks – go on a TRIP
 • Challenge the status quo –
   try something different
 • Find the value proposition
 • Elevate the conversation




                                CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   14
Single or double line title without
division line




                          CONFIDENTIAL   ©2012 LRN Corporation. All Rights Reserved.   15

More Related Content

What's hot

Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Livingstone Advisory
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Livingstone Advisory
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to AsiaConferencias FIST
 
Privacy tipping points 23112
Privacy tipping points 23112Privacy tipping points 23112
Privacy tipping points 23112Yoel Raban
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD Worldmkeane
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to AsiaConferencias FIST
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...William Tanenbaum
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worsecentralohioissa
 

What's hot (8)

Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...Maximising the opportunities offered by emerging technologies within the chan...
Maximising the opportunities offered by emerging technologies within the chan...
 
Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?Cloud: Fuelling the crisis of confidence in corporate IT?
Cloud: Fuelling the crisis of confidence in corporate IT?
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
 
Privacy tipping points 23112
Privacy tipping points 23112Privacy tipping points 23112
Privacy tipping points 23112
 
The Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD WorldThe Accidental Cloud: Privacy and Security Issues in a BYOD World
The Accidental Cloud: Privacy and Security Issues in a BYOD World
 
Business Outsourcing to Asia
Business Outsourcing to AsiaBusiness Outsourcing to Asia
Business Outsourcing to Asia
 
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...William A Tanenbaum   David with Goliath:  How Big Companies Do Business with...
William A Tanenbaum David with Goliath: How Big Companies Do Business with...
 
Harry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get WorseHarry Regan - It's Never So Bad That It Can't Get Worse
Harry Regan - It's Never So Bad That It Can't Get Worse
 

Viewers also liked

Records Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationRecords Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationEverteam
 
theprinciplesmaturitymodel
theprinciplesmaturitymodeltheprinciplesmaturitymodel
theprinciplesmaturitymodelDavid Vickers
 
M43 how to build a winning ig, ecm or rim strategy - keith atteck
M43   how to build a winning ig, ecm or rim strategy - keith atteckM43   how to build a winning ig, ecm or rim strategy - keith atteck
M43 how to build a winning ig, ecm or rim strategy - keith atteckKeith Atteck C.Tech. ERMm
 
Archive service accreditation digital developments for ARA Conference 2016
Archive service accreditation   digital developments for ARA Conference 2016Archive service accreditation   digital developments for ARA Conference 2016
Archive service accreditation digital developments for ARA Conference 2016Melinda Haunton
 
Liquid archives: Background changes and trends in today's Records Management ...
Liquid archives: Background changes and trends in today's Records Management ...Liquid archives: Background changes and trends in today's Records Management ...
Liquid archives: Background changes and trends in today's Records Management ...Jordi Serra Serra
 
SharePoint as a Records Management System
SharePoint as a Records Management SystemSharePoint as a Records Management System
SharePoint as a Records Management SystemAvePoint
 
Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...
Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...
Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...Jordi Serra Serra
 
Gestión documental: vehículo para la transparencia
Gestión documental: vehículo para la transparenciaGestión documental: vehículo para la transparencia
Gestión documental: vehículo para la transparenciaJordi Serra Serra
 
Information Lifecycle Governance Leader Reference Guide
Information Lifecycle Governance Leader Reference GuideInformation Lifecycle Governance Leader Reference Guide
Information Lifecycle Governance Leader Reference GuideDan D'Angelo
 
Building a Compelling Business Case for Boosting your GRC Program
Building a Compelling Business Case for Boosting your GRC ProgramBuilding a Compelling Business Case for Boosting your GRC Program
Building a Compelling Business Case for Boosting your GRC ProgramNAVEX Global
 
Records and Information Governance: where is Records Management going?
Records and Information Governance: where is Records Management going?Records and Information Governance: where is Records Management going?
Records and Information Governance: where is Records Management going?Jordi Serra Serra
 
El mapa de series y sus formas de implantación
El mapa de series y sus formas de implantaciónEl mapa de series y sus formas de implantación
El mapa de series y sus formas de implantaciónJordi Serra Serra
 
[AIIM16] Implementing Automated Retention at the European Central Bank
[AIIM16] Implementing Automated Retention at the European Central Bank[AIIM16] Implementing Automated Retention at the European Central Bank
[AIIM16] Implementing Automated Retention at the European Central BankAIIM International
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017LinkedIn
 

Viewers also liked (16)

Records Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your InformationRecords Governance, Part 1: Preserve the Value of Your Information
Records Governance, Part 1: Preserve the Value of Your Information
 
theprinciplesmaturitymodel
theprinciplesmaturitymodeltheprinciplesmaturitymodel
theprinciplesmaturitymodel
 
M43 how to build a winning ig, ecm or rim strategy - keith atteck
M43   how to build a winning ig, ecm or rim strategy - keith atteckM43   how to build a winning ig, ecm or rim strategy - keith atteck
M43 how to build a winning ig, ecm or rim strategy - keith atteck
 
Archive service accreditation digital developments for ARA Conference 2016
Archive service accreditation   digital developments for ARA Conference 2016Archive service accreditation   digital developments for ARA Conference 2016
Archive service accreditation digital developments for ARA Conference 2016
 
Liquid archives: Background changes and trends in today's Records Management ...
Liquid archives: Background changes and trends in today's Records Management ...Liquid archives: Background changes and trends in today's Records Management ...
Liquid archives: Background changes and trends in today's Records Management ...
 
[DE] Records Management & Information Governance | Keynote | Ulrich Kampffmey...
[DE] Records Management & Information Governance | Keynote | Ulrich Kampffmey...[DE] Records Management & Information Governance | Keynote | Ulrich Kampffmey...
[DE] Records Management & Information Governance | Keynote | Ulrich Kampffmey...
 
SharePoint as a Records Management System
SharePoint as a Records Management SystemSharePoint as a Records Management System
SharePoint as a Records Management System
 
Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...
Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...
Documento y archivo electrónicos: cuestiones abiertas en el marco de la eAdmi...
 
Gestión documental: vehículo para la transparencia
Gestión documental: vehículo para la transparenciaGestión documental: vehículo para la transparencia
Gestión documental: vehículo para la transparencia
 
Information Lifecycle Governance Leader Reference Guide
Information Lifecycle Governance Leader Reference GuideInformation Lifecycle Governance Leader Reference Guide
Information Lifecycle Governance Leader Reference Guide
 
Building a Compelling Business Case for Boosting your GRC Program
Building a Compelling Business Case for Boosting your GRC ProgramBuilding a Compelling Business Case for Boosting your GRC Program
Building a Compelling Business Case for Boosting your GRC Program
 
Records and Information Governance: where is Records Management going?
Records and Information Governance: where is Records Management going?Records and Information Governance: where is Records Management going?
Records and Information Governance: where is Records Management going?
 
El mapa de series y sus formas de implantación
El mapa de series y sus formas de implantaciónEl mapa de series y sus formas de implantación
El mapa de series y sus formas de implantación
 
[AIIM16] Implementing Automated Retention at the European Central Bank
[AIIM16] Implementing Automated Retention at the European Central Bank[AIIM16] Implementing Automated Retention at the European Central Bank
[AIIM16] Implementing Automated Retention at the European Central Bank
 
[DE] Keynote: Die Zukunft der elektronischen Archivierung | Dr. Ulrich Kampff...
[DE] Keynote: Die Zukunft der elektronischen Archivierung | Dr. Ulrich Kampff...[DE] Keynote: Die Zukunft der elektronischen Archivierung | Dr. Ulrich Kampff...
[DE] Keynote: Die Zukunft der elektronischen Archivierung | Dr. Ulrich Kampff...
 
The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017The Top Skills That Can Get You Hired in 2017
The Top Skills That Can Get You Hired in 2017
 

Similar to Records and information management presentation 2012

Preparing for Crisis - 5 Essentials to Survive Intact
Preparing for Crisis - 5 Essentials to Survive IntactPreparing for Crisis - 5 Essentials to Survive Intact
Preparing for Crisis - 5 Essentials to Survive IntactBuzzMgr
 
M12S01 - The Information Tsunami: Where We Are and How to Move Forward
M12S01 - The Information Tsunami: Where We Are and How to Move ForwardM12S01 - The Information Tsunami: Where We Are and How to Move Forward
M12S01 - The Information Tsunami: Where We Are and How to Move ForwardMER Conference
 
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiA Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiAnup Narayanan
 
How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...
How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...
How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...Business Development Institute
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing itnewsafrica
 
Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Denim Group
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBrent Spencer
 
Using LinkedIn to Increase Bank Sales
Using LinkedIn to Increase Bank SalesUsing LinkedIn to Increase Bank Sales
Using LinkedIn to Increase Bank SalesMark Zmarzly
 
iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...
iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...
iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...iStrategy
 
The Social Enterprise
The Social EnterpriseThe Social Enterprise
The Social EnterpriseJohn Maloney
 
In-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social NetworkIn-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social NetworkMHCLawyers
 
Understanding Web and Intranet Users Through Personas
Understanding Web and Intranet Users Through PersonasUnderstanding Web and Intranet Users Through Personas
Understanding Web and Intranet Users Through PersonasPrescient Digital Media
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Anup Narayanan
 
Social Media in Texas Government
Social Media in Texas GovernmentSocial Media in Texas Government
Social Media in Texas GovernmentJon Lee
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2dbarton944
 
Information governance process & technology
Information governance process & technologyInformation governance process & technology
Information governance process & technologyGNetadmin
 
ALA region 2 - conference wrapup
ALA region 2  - conference wrapupALA region 2  - conference wrapup
ALA region 2 - conference wrapupCraig Price
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsImperva
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseThe Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseDenim Group
 

Similar to Records and information management presentation 2012 (20)

Commerce bank st louis solutions series april 2012
Commerce bank st louis solutions series  april 2012Commerce bank st louis solutions series  april 2012
Commerce bank st louis solutions series april 2012
 
Preparing for Crisis - 5 Essentials to Survive Intact
Preparing for Crisis - 5 Essentials to Survive IntactPreparing for Crisis - 5 Essentials to Survive Intact
Preparing for Crisis - 5 Essentials to Survive Intact
 
M12S01 - The Information Tsunami: Where We Are and How to Move Forward
M12S01 - The Information Tsunami: Where We Are and How to Move ForwardM12S01 - The Information Tsunami: Where We Are and How to Move Forward
M12S01 - The Information Tsunami: Where We Are and How to Move Forward
 
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, DubaiA Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
A Model for Reducing Security Risks due to Human Error - iSafe 2010, Dubai
 
How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...
How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...
How Wealth Managers are Building Business Through Social - BDI 4.2.13 Wealth ...
 
Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing Corporate Governance And Cloud Computing
Corporate Governance And Cloud Computing
 
Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?Software Security for Project Managers: What Do You Need To Know?
Software Security for Project Managers: What Do You Need To Know?
 
Bring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective programBring Your Own Device - Key Steps for an effective program
Bring Your Own Device - Key Steps for an effective program
 
Using LinkedIn to Increase Bank Sales
Using LinkedIn to Increase Bank SalesUsing LinkedIn to Increase Bank Sales
Using LinkedIn to Increase Bank Sales
 
iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...
iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...
iStrategy London - Social Media: Making it Work Globally and Locally Gemma Tr...
 
The Social Enterprise
The Social EnterpriseThe Social Enterprise
The Social Enterprise
 
In-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social NetworkIn-house counsel Masterclass: Navigating the Social Network
In-house counsel Masterclass: Navigating the Social Network
 
Understanding Web and Intranet Users Through Personas
Understanding Web and Intranet Users Through PersonasUnderstanding Web and Intranet Users Through Personas
Understanding Web and Intranet Users Through Personas
 
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
 
Social Media in Texas Government
Social Media in Texas GovernmentSocial Media in Texas Government
Social Media in Texas Government
 
Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2Security And Legal In The Cloud Ats V2
Security And Legal In The Cloud Ats V2
 
Information governance process & technology
Information governance process & technologyInformation governance process & technology
Information governance process & technology
 
ALA region 2 - conference wrapup
ALA region 2  - conference wrapupALA region 2  - conference wrapup
ALA region 2 - conference wrapup
 
Shaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 StepsShaping-Up SharePoint Security in 5 Steps
Shaping-Up SharePoint Security in 5 Steps
 
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the EnterpriseThe Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
The Permanent Campaign: Driving a Secure Software Initiative in the Enterprise
 

Records and information management presentation 2012

  • 1. A Call To Action: RIM and eDiscovery for the Next Generation Summary of Key Findings Michael Salvarezza LRN September 24, 2012 CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 1
  • 2. Challenges Social media and business transformation Explosive Growing urgency Rapid expansion growth in in laws and volume of to gain control compliance content creation of this dynamic regulations MiFID Title 21 CFR 11 PATRIOT ACT CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 2
  • 3. Records Management vs. Social Media vs. Business Social Media Records Businesses promotes: Management care about: • Sharing is about: • Agility • Collaboration • Governance • Complexity • Open • Access to • Rapid access information to information • Insights • Casual, derived from informal, spon information taneous • Speed and results CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 3
  • 4. Governance Approach • Legal, IT, business units (e.g., sales) • Define roles/responsibilities • Include next-generation workers 4 CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 4
  • 5. Policy Approach • Social media, BYOD, mobile computing, cloud computing • No policy can address all instances, so focus on principles and extend trust • Focus on what is critical to the business to keep • Recreate vs. capture CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 5
  • 6. Set Policies: General Principles • Lead with trust…and then provide guidelines • Encourage responsible use • Frame policies to address responsibility, not productivity • Grant equal access • Provide training CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 6
  • 7. Social Media Policies: Elements • State objectives and purpose • Include definitions and examples • Define what is proprietary or confidential and prohibit its use on these sites (e.g., customer information, financial data, legal matters) • Identify what is expressly prohibited (e.g., libelous comments, illegal activity, obscenity) • Specify who may speak on behalf of the company • Specify who will own work products created on sites • Include legal and regulatory issues that apply • Refer to specific security concerns • Include discipline and ramifications CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 7
  • 8. Sample Guidelines When on a social media site: • Listen first, talk later; pause and reflect before actually posting • Identify yourself; avoid anonymity • Respond to ideas…not people • Be respectful; always seek to add value • If you are not authorized to speak for the company, specify that opinions are your own • Know the facts and cite sources; do not guess • Do not go “off the record” • If you respond to a problem, you must follow up CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 8
  • 9. Records Management of Social Media • Consider where the business record is created: – If the record is created outside of the social media site, the copy posted to the social media site could be considered a “convenience” copy – If transactional information created on a social media site is a business record under your policy, then have a mechanism in place to capture, store, search, and retrieve those records • Ensure procedures specify that Records Managers review the social media site framework before the site is launched – To assess capability for proper handling of business records • Educate employees through training sessions and communications CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 9
  • 10. Mobile Computing and BYOD Policy Considerations General Principles: • Make sure the policy is enforceable. • Do not rely on device specificity. (Devices become obsolete rapidly). Rather, make sure the policy is broad and general. • Orient the policy from the business value perspective. • Provide training on appropriate use of devices, proper management and security of information, segregation of personal and business data and IT information management controls. CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 10
  • 11. Mobile Computing Policy Considerations Policy Considerations: • Define accountabilities for control (user, IT, business unit, etc.) • Address the distinction between personal and business data • Ensure proper controls in the event of theft or loss of the device • Provide coverage for business provided devices and personally owned devices • Address funding of devices or the cost of controls, especially for personally owned devices • Address different geographies • Focus on both employees and contracted resources CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 11
  • 12. Mobile Computing Policy Considerations Policy Considerations (continued): • Define the appropriate use of business records on these devices and address requirements for retention of records • Security Awareness/Privacy Awareness/Compliance – Awareness should be addressed • Human Resource considerations • Use of devices for personal use • Use of devices after hours and on personal time • Use of devices while engaged in travel • Inappropriate data and website access CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 12
  • 13. Rethink “We can’t solve problems by using the same kind of thinking we used when we created them” Copyright © 2011 LRN Group Inc. All rights reserved
  • 14. Inspirational Leadership for Records Management • Ambiguity is actually OK • Take risks – go on a TRIP • Challenge the status quo – try something different • Find the value proposition • Elevate the conversation CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 14
  • 15. Single or double line title without division line CONFIDENTIAL ©2012 LRN Corporation. All Rights Reserved. 15

Editor's Notes

  1. Corporate ChallengesCorporations are facing serious challenges when it comes to the management of their information and content.These challenges are related to the rapid increase in the volume of content that is produced and consumed within the organization. This content is also scattered geographically and across multiple jurisdictions. At the same time, there is a growing emphasis on the need to comply with an increasing array of laws and regulations. We refer to this as the “Information Governance (IG) challenge”. This challenge has created urgency at the executive level in every enterprise. Initial efforts to “tame the beast” have resulted in inadequate results. This is because current solutions have been designed for a simpler and more modest missions. Indeed, content continues to proliferation in scattered and unmanaged repositories resulting in skyrocketing management and administration overhead costs.
  2. Slide 3: Bullet Slide FormatFont sizes may be adjusted as needed. Please keep in mind that font smaller than 24 is very difficult to read.
  3. Slide 3: Bullet Slide FormatFont sizes may be adjusted as needed. Please keep in mind that font smaller than 24 is very difficult to read.