SlideShare a Scribd company logo
1 of 19
What is Information Governance?
Rethinking how to manage, organize, and store files
Information Governance encompasses more than traditional
records management and focuses on minimizing risk and
maximizing value
It incorporates: information security and protection, compliance,
data governance, electronic discovery, risk management, privacy,
data storage and archiving, knowledge management, business
operations and management, audit, analytics, IT management,
master data management, enterprise architecture, business
intelligence, big data, data science, and finance
The Conversion to Digital Information Assets
Then and Now:
Storing Paper vs. Digital Records
Physical Files Digital Files
Correspondence file (not in RMS) Folders in a mailbox
Correspondence file (in RMS) Emails/documents in Document
Management System
Folders in drawers/on shelves in an
office
Folders and files on the network drive
Files in a case room or records room Files on a client-matter drive
Files in a cabinet in the hall Files on others drives
Files at the offsite storage vendor Files in the cloud
4
Volume of Digital Records
1 Terabyte =
86 million pages of Word Documents
60 piles of stacked paper as tall as
the Eiffel Tower
Around 600 Terabytes =
Around 20 million boxes
36,000 stacks of paper as tall as the Eiffel Tower
It’s all digital
“Of all the paper formally filed in a law firm, 57 percent is a
printout from the firm’s electronic file in the document
management system (DMS). And that bloated paper matter file
would grow another 39 percent if you gathered up all the other
DMS-printed paper that is scattered around the firm, on lawyers’
desks, in secretaries’ workstations, and in hallway boxes.”
Legal Management Magazine, “How to Solve the Paper Records
Workflow That’s Killing Your Firm” (April 2017)
6
7
File Intake, Release, and Destruction
How are you handling requests to receive, transfer, or delete electronic files?
File Intake
 Does your organization have policies and procedures for receiving files from customers/clients?
 How are you tracking files that your organization receives from customers/clients?
File Release
 Do you have a process for determining what files you might provide to a customer/client?
 How are you transferring files outside of your organization?
 How are you protecting outbound email communications?
 How do you determine which files you would disclose in response to a subpoena?
File Destruction
 Who is deleting electronic files on your systems?
 For deletions resulting from agreements with other parties:
 Are you properly attesting that you purged files from systems? What about echo and cache files?
 Carve out what you will not destroy upfront so you will not be obligated to do so later
8
Establishing Repositories Based on File Type
Sample Organizational Structure for Discussion Purposes
Determine which repositories your organization should use to store certain files, thus ensuring easy
Preservation, Destruction, or Release when requests are submitted, including subpoenas
Document Management System (Move Toward Least Privilege Access)
 Email only from an employee’s mailbox, and employee generated files
 Not client or third party files or any email they provide for review
Email Accounts
 An employee’s mailbox should only contain email that the employee sends and receives
 Not email provided by a client or third party for review, or email pulled from another employee’s
mailbox
Network Volume (Move Toward Least Privilege Access)
 Client and third party files
 Not email from an employee’s mailbox, or employee generated work that should be in the document
management system
Network Drives
 Temporary files that should be moved to the correct repository as soon as possible
Develop Standard Naming Conventions and Guidelines for each Electronic Repository
 For example, filing guidelines and best practices for saving email to the document management system
 Utilize improved electronic records management to decrease the amount of paper retained
In Transit & In the Cloud
General Ethical Rules
Is the information is sensitive? How will you transfer the data? What security measures are
available for that method of transfer?
 Assess the sensitivity of the information and whether to avoid the use of technology
 Mergers and Acquisitions
 Trade Secrets
 Healthcare
 Banking
 Defense
In-House and Outside Counsel - Duty of Competence, Duty of Confidentiality, Duty of
Diligence, Reasonable Care Standard
If your organization is or works with a law firm, consider reviewing the rules set forth in the
American Bar Association Cloud Ethics Opinions
 ABA Formal Opinion 477, Securing Communication of Protected Client Information (11 May 2017)
Guidance re: Cloud Computing
Does your organization have…
a cloud computing policy?
policies blocking access to personal email to limit data leakage
and ensure confidentiality?
policies blocking access to social media sites to limit data
leakage?
policies blocking access to download to media?
limits on where data can be processed and stored, which takes
risk into account?
a plan if your data is unavailable?
Cyber Liability Insurance
Cyber liability insurance has been around for about 20 years, although
many believe it is new
Organizations in certain industries should have cyber liability insurance,
especially if your business stores PII and/or sensitive data
Breaches have occurred in numerous industries (banking,
retail/department stores, film/entertainment, government, and more).
Even if your organization has cyber liability insurance, you still need to
be diligent and exercise care to mitigate and manage cyber risks
13
Guidance re: Encryption
Establish an encryption policy.
Establish an encryption exceptions process.
Carve out exceptions to the policy in advance.
Encourage other parties to send data to your organization in an
encrypted format.
Determine if you have obligations to handle others’ data in a
particular way.
Minimize Risk - maintain confidentiality, avoid loss of reputation,
comply with contractual terms in agreements.
How are vendors handling your files?
How long does your data remain on a vendor’s system?
Do you require vendors to return or destroy your data?
How do your vendors destroy/delete media or data?
Who else may have access to a vendor’s systems?
Do you store removable media at offsite storage facilities? Is that
media encrypted? Who holds they key?
If you provide data to another party or law firm; do you know where
that data and/or copies of that data might be stored?
Service Providers & Vendors – Access to Data
When you store, send, or receive content with certain service
providers or vendors, you may give them the right to use,
reproduce, modify, publish, or distribute your content.
What are you sharing and with whom?
Access and Transfer of Data
What jurisdictional restrictions or data transfer rules might apply
and what can you do to ensure compliance?
General Data Protection Regulation (GDPR)
International Traffic in Arms Regulations (ITAR)
Health Insurance Portability and Accountability Act (HIPAA)
Gramm-Leach-Bliley Act (GLBA)
Department of Justice (DOJ)
Blocking statutes
Where should data be stored?
Who can access the data?
What is Information Governance

More Related Content

What's hot

3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoidHRMantra Software Pvt. Ltd
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentationjohnjamesahearn
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17Everteam
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Collabor8now Ltd
 
DocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its bestDocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its bestDocuLynx
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOAtlantic Training, LLC.
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoEd Ahl
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital businessUlf Mattsson
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyStorage Switzerland
 
Information Asset Registers: A Short Guide
Information Asset Registers: A Short GuideInformation Asset Registers: A Short Guide
Information Asset Registers: A Short GuideJanet Brimson
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftDavid J Rosenthal
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeBloombase
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeBloombase
 
Data management for proposal writing
Data management for proposal writingData management for proposal writing
Data management for proposal writingOlatunbosun Obileye
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup ProtectionCrystaLink Inc.
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...Ulf Mattsson
 
Nathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPCNathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPCNathan Winters
 

What's hot (19)

Chapter 11
Chapter 11Chapter 11
Chapter 11
 
3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid3 cliches about the Data Protection Act you should not avoid
3 cliches about the Data Protection Act you should not avoid
 
Ahearn Cloud Presentation
Ahearn Cloud PresentationAhearn Cloud Presentation
Ahearn Cloud Presentation
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17
 
Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009Information Management in a Web 2.0 World May 2009
Information Management in a Web 2.0 World May 2009
 
DocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its bestDocuClassify - AutoClassification at its best
DocuClassify - AutoClassification at its best
 
Security and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPOSecurity and Safe Keeping of Official Information by DPO
Security and Safe Keeping of Official Information by DPO
 
Data_Protection_WP - Jon Toigo
Data_Protection_WP - Jon ToigoData_Protection_WP - Jon Toigo
Data_Protection_WP - Jon Toigo
 
Data centric security key to cloud and digital business
Data centric security key to cloud and digital businessData centric security key to cloud and digital business
Data centric security key to cloud and digital business
 
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data StrategyWebinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
Webinar: Endpoint Backup is not Enough - You Need an End-user Data Strategy
 
Data mapping
Data mappingData mapping
Data mapping
 
Information Asset Registers: A Short Guide
Information Asset Registers: A Short GuideInformation Asset Registers: A Short Guide
Information Asset Registers: A Short Guide
 
Classifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoftClassifying Data to Help Secure Business Information - Template fromMicrosoft
Classifying Data to Help Secure Business Information - Template fromMicrosoft
 
Hitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafeHitachi datasheet-hcp-and-bloombase-storesafe
Hitachi datasheet-hcp-and-bloombase-storesafe
 
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafeDs 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
Ds 354-a hitachi-datasheet-hcp-and-bloombase-storesafe
 
Data management for proposal writing
Data management for proposal writingData management for proposal writing
Data management for proposal writing
 
Remote Data Backup Protection
Remote Data Backup ProtectionRemote Data Backup Protection
Remote Data Backup Protection
 
Isaca journal - bridging the gap between access and security in big data...
Isaca journal  - bridging the gap between access and security in big data...Isaca journal  - bridging the gap between access and security in big data...
Isaca journal - bridging the gap between access and security in big data...
 
Nathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPCNathan Winters TechDays UK Exchange 2010 IPC
Nathan Winters TechDays UK Exchange 2010 IPC
 

Similar to What is Information Governance

Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Productbdirking
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Managementbdirking
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your InformationAIIM International
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligenceMichael Burgess
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
One name unify them all
One name unify them allOne name unify them all
One name unify them allBizTalk360
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009asundaram1
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfAgusto Sipahutar
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
ICT HRM Internet MIS
ICT HRM Internet MISICT HRM Internet MIS
ICT HRM Internet MISSayeef Khan
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss PreventionGary Bahadur
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository XeniT Solutions nv
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction BriefNováccent
 
Document management strategy 2015
Document management strategy 2015Document management strategy 2015
Document management strategy 2015Michael Burgess
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewDavid J Rosenthal
 

Similar to What is Information Governance (20)

Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A ProductBrian Dirking Knowing Your Organizations Goals Before Choosing A Product
Brian Dirking Knowing Your Organizations Goals Before Choosing A Product
 
Encrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdfEncrypt-Everything-eB.pdf
Encrypt-Everything-eB.pdf
 
Brian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records ManagementBrian Dirking Software Selection For Records Management
Brian Dirking Software Selection For Records Management
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
 
Unit 5 v2
Unit 5 v2Unit 5 v2
Unit 5 v2
 
Lkm 2011
Lkm 2011Lkm 2011
Lkm 2011
 
Data Security Explained
Data Security ExplainedData Security Explained
Data Security Explained
 
From data storage to digital intelligence
From data storage to digital intelligenceFrom data storage to digital intelligence
From data storage to digital intelligence
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
One name unify them all
One name unify them allOne name unify them all
One name unify them all
 
2009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-20092009 iapp-the corpprivacydeptmar13-2009
2009 iapp-the corpprivacydeptmar13-2009
 
Data security
Data securityData security
Data security
 
Data Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdfData Lost Prevention (DLP).pdf
Data Lost Prevention (DLP).pdf
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
ICT HRM Internet MIS
ICT HRM Internet MISICT HRM Internet MIS
ICT HRM Internet MIS
 
5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention5 Myths About Data Loss Prevention
5 Myths About Data Loss Prevention
 
How to implement gdpr in your document repository
How to implement gdpr in your document repository How to implement gdpr in your document repository
How to implement gdpr in your document repository
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 
Document management strategy 2015
Document management strategy 2015Document management strategy 2015
Document management strategy 2015
 
Microsoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security OverviewMicrosoft 365 Compliance and Security Overview
Microsoft 365 Compliance and Security Overview
 

More from ARMA International

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)ARMA International
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other DocumentsARMA International
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA International
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherARMA International
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...ARMA International
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...ARMA International
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...ARMA International
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackARMA International
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)ARMA International
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryARMA International
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsARMA International
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...ARMA International
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceARMA International
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...ARMA International
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesARMA International
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseARMA International
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyARMA International
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceARMA International
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RIARMA International
 

More from ARMA International (20)

Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)Information Governance in the Cloud: Compare and Contrast (2020 update)
Information Governance in the Cloud: Compare and Contrast (2020 update)
 
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
“7 "Reasonable Steps" for Legal Holds of ESI and Other Documents
 
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
ARMA's Information Governance Implementation Model (IGIM): The Way Forward Fo...
 
Jocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines TogetherJocelyn Gunter - Bringing The Information Disciplines Together
Jocelyn Gunter - Bringing The Information Disciplines Together
 
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
Nick Inglis - A Complete Circle (Open Source Knowledge, The Hubble Telescope,...
 
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
Morgan Templar - Connecting IT Strategy To Business Operations For Seamless C...
 
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
Ty Molchany - Information Remediation After Mergers & Acquisitions: An Auto-C...
 
Brent Gatewood - Technologies Attack
Brent Gatewood - Technologies AttackBrent Gatewood - Technologies Attack
Brent Gatewood - Technologies Attack
 
Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)Tod Chernikoff - Conducting large scale records inventory (handout)
Tod Chernikoff - Conducting large scale records inventory (handout)
 
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done IndustryKathryn Rattigan - Cybersecurity & The Commercial Done Industry
Kathryn Rattigan - Cybersecurity & The Commercial Done Industry
 
Steve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information InvestmentsSteve Weissman - Maximizing The Value Of Your Information Investments
Steve Weissman - Maximizing The Value Of Your Information Investments
 
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
Randy Moeller - Mitigating Application Risk Upfront (Without Increased Hair L...
 
Jim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information GovernanceJim Koziol - The Sport of Information Governance
Jim Koziol - The Sport of Information Governance
 
Gene Stakhov - Taxonology
Gene Stakhov - TaxonologyGene Stakhov - Taxonology
Gene Stakhov - Taxonology
 
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
Steve Weissman, Patrick O'Guinn, Kevin Parker, Donda Young - Planning For Inf...
 
Dr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be MachinesDr. Stephanie Carter - Training Humans To Be Machines
Dr. Stephanie Carter - Training Humans To Be Machines
 
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed EnterpriseMichael Fillion - Data Governance In The Digitally Transformed Enterprise
Michael Fillion - Data Governance In The Digitally Transformed Enterprise
 
Kevin Parker - The Leadership Journey
Kevin Parker - The Leadership JourneyKevin Parker - The Leadership Journey
Kevin Parker - The Leadership Journey
 
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information GovernanceAli Daneshmand - How Does Institutional Culture Influence Information Governance
Ali Daneshmand - How Does Institutional Culture Influence Information Governance
 
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RINick Inglis - Welcome To #InfoGov17 & Providence, RI
Nick Inglis - Welcome To #InfoGov17 & Providence, RI
 

Recently uploaded

Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementShubhiSharma858417
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书Fir L
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesHome Tax Saver
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxsrikarna235
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书Fs Las
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书FS LS
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaNafiaNazim
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaAbheet Mangleek
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书SD DS
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesritwikv20
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书Fir sss
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书SD DS
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书Fs Las
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Dr. Oliver Massmann
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSDr. Oliver Massmann
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》o8wvnojp
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书srst S
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书SD DS
 

Recently uploaded (20)

Special Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreementSpecial Accounting Areas - Hire purchase agreement
Special Accounting Areas - Hire purchase agreement
 
如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书如何办理提赛德大学毕业证(本硕)Teesside学位证书
如何办理提赛德大学毕业证(本硕)Teesside学位证书
 
Key Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax RatesKey Factors That Influence Property Tax Rates
Key Factors That Influence Property Tax Rates
 
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptxConstitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
Constitutional Values & Fundamental Principles of the ConstitutionPPT.pptx
 
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
如何办理(SFSta文凭证书)美国旧金山州立大学毕业证学位证书
 
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
如何办理密德萨斯大学毕业证(本硕)Middlesex学位证书
 
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in  Pusa Road🔝 9953330565 🔝 escort Serviceyoung Call Girls in  Pusa Road🔝 9953330565 🔝 escort Service
young Call Girls in Pusa Road🔝 9953330565 🔝 escort Service
 
Arbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in IndiaArbitration, mediation and conciliation in India
Arbitration, mediation and conciliation in India
 
Rights of under-trial Prisoners in India
Rights of under-trial Prisoners in IndiaRights of under-trial Prisoners in India
Rights of under-trial Prisoners in India
 
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
如何办理(ISU毕业证书)爱荷华州立大学毕业证学位证书
 
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Haqiqat Nagar Delhi reach out to us at 🔝8264348440🔝
 
Comparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use casesComparison of GenAI benchmarking models for legal use cases
Comparison of GenAI benchmarking models for legal use cases
 
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 如何办理威斯康星大学密尔沃基分校毕业证学位证书 如何办理威斯康星大学密尔沃基分校毕业证学位证书
如何办理威斯康星大学密尔沃基分校毕业证学位证书
 
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
如何办理(UCD毕业证书)加州大学戴维斯分校毕业证学位证书
 
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
如何办理(USF文凭证书)美国旧金山大学毕业证学位证书
 
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
Legal Alert - Vietnam - First draft Decree on mechanisms and policies to enco...
 
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTSVIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
VIETNAM – LATEST GUIDE TO CONTRACT MANUFACTURING AND TOLLING AGREEMENTS
 
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
国外大学毕业证《奥克兰大学毕业证办理成绩单GPA修改》
 
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
如何办理(UoM毕业证书)曼彻斯特大学毕业证学位证书
 
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书如何办理(Rice毕业证书)莱斯大学毕业证学位证书
如何办理(Rice毕业证书)莱斯大学毕业证学位证书
 

What is Information Governance

  • 1.
  • 2. What is Information Governance? Rethinking how to manage, organize, and store files Information Governance encompasses more than traditional records management and focuses on minimizing risk and maximizing value It incorporates: information security and protection, compliance, data governance, electronic discovery, risk management, privacy, data storage and archiving, knowledge management, business operations and management, audit, analytics, IT management, master data management, enterprise architecture, business intelligence, big data, data science, and finance
  • 3. The Conversion to Digital Information Assets
  • 4. Then and Now: Storing Paper vs. Digital Records Physical Files Digital Files Correspondence file (not in RMS) Folders in a mailbox Correspondence file (in RMS) Emails/documents in Document Management System Folders in drawers/on shelves in an office Folders and files on the network drive Files in a case room or records room Files on a client-matter drive Files in a cabinet in the hall Files on others drives Files at the offsite storage vendor Files in the cloud 4
  • 5. Volume of Digital Records 1 Terabyte = 86 million pages of Word Documents 60 piles of stacked paper as tall as the Eiffel Tower Around 600 Terabytes = Around 20 million boxes 36,000 stacks of paper as tall as the Eiffel Tower
  • 6. It’s all digital “Of all the paper formally filed in a law firm, 57 percent is a printout from the firm’s electronic file in the document management system (DMS). And that bloated paper matter file would grow another 39 percent if you gathered up all the other DMS-printed paper that is scattered around the firm, on lawyers’ desks, in secretaries’ workstations, and in hallway boxes.” Legal Management Magazine, “How to Solve the Paper Records Workflow That’s Killing Your Firm” (April 2017) 6
  • 7. 7
  • 8. File Intake, Release, and Destruction How are you handling requests to receive, transfer, or delete electronic files? File Intake  Does your organization have policies and procedures for receiving files from customers/clients?  How are you tracking files that your organization receives from customers/clients? File Release  Do you have a process for determining what files you might provide to a customer/client?  How are you transferring files outside of your organization?  How are you protecting outbound email communications?  How do you determine which files you would disclose in response to a subpoena? File Destruction  Who is deleting electronic files on your systems?  For deletions resulting from agreements with other parties:  Are you properly attesting that you purged files from systems? What about echo and cache files?  Carve out what you will not destroy upfront so you will not be obligated to do so later 8
  • 9. Establishing Repositories Based on File Type Sample Organizational Structure for Discussion Purposes Determine which repositories your organization should use to store certain files, thus ensuring easy Preservation, Destruction, or Release when requests are submitted, including subpoenas Document Management System (Move Toward Least Privilege Access)  Email only from an employee’s mailbox, and employee generated files  Not client or third party files or any email they provide for review Email Accounts  An employee’s mailbox should only contain email that the employee sends and receives  Not email provided by a client or third party for review, or email pulled from another employee’s mailbox Network Volume (Move Toward Least Privilege Access)  Client and third party files  Not email from an employee’s mailbox, or employee generated work that should be in the document management system Network Drives  Temporary files that should be moved to the correct repository as soon as possible Develop Standard Naming Conventions and Guidelines for each Electronic Repository  For example, filing guidelines and best practices for saving email to the document management system  Utilize improved electronic records management to decrease the amount of paper retained
  • 10. In Transit & In the Cloud
  • 11. General Ethical Rules Is the information is sensitive? How will you transfer the data? What security measures are available for that method of transfer?  Assess the sensitivity of the information and whether to avoid the use of technology  Mergers and Acquisitions  Trade Secrets  Healthcare  Banking  Defense In-House and Outside Counsel - Duty of Competence, Duty of Confidentiality, Duty of Diligence, Reasonable Care Standard If your organization is or works with a law firm, consider reviewing the rules set forth in the American Bar Association Cloud Ethics Opinions  ABA Formal Opinion 477, Securing Communication of Protected Client Information (11 May 2017)
  • 12. Guidance re: Cloud Computing Does your organization have… a cloud computing policy? policies blocking access to personal email to limit data leakage and ensure confidentiality? policies blocking access to social media sites to limit data leakage? policies blocking access to download to media? limits on where data can be processed and stored, which takes risk into account? a plan if your data is unavailable?
  • 13. Cyber Liability Insurance Cyber liability insurance has been around for about 20 years, although many believe it is new Organizations in certain industries should have cyber liability insurance, especially if your business stores PII and/or sensitive data Breaches have occurred in numerous industries (banking, retail/department stores, film/entertainment, government, and more). Even if your organization has cyber liability insurance, you still need to be diligent and exercise care to mitigate and manage cyber risks 13
  • 14. Guidance re: Encryption Establish an encryption policy. Establish an encryption exceptions process. Carve out exceptions to the policy in advance. Encourage other parties to send data to your organization in an encrypted format. Determine if you have obligations to handle others’ data in a particular way. Minimize Risk - maintain confidentiality, avoid loss of reputation, comply with contractual terms in agreements.
  • 15. How are vendors handling your files? How long does your data remain on a vendor’s system? Do you require vendors to return or destroy your data? How do your vendors destroy/delete media or data? Who else may have access to a vendor’s systems? Do you store removable media at offsite storage facilities? Is that media encrypted? Who holds they key? If you provide data to another party or law firm; do you know where that data and/or copies of that data might be stored?
  • 16. Service Providers & Vendors – Access to Data When you store, send, or receive content with certain service providers or vendors, you may give them the right to use, reproduce, modify, publish, or distribute your content. What are you sharing and with whom?
  • 17.
  • 18. Access and Transfer of Data What jurisdictional restrictions or data transfer rules might apply and what can you do to ensure compliance? General Data Protection Regulation (GDPR) International Traffic in Arms Regulations (ITAR) Health Insurance Portability and Accountability Act (HIPAA) Gramm-Leach-Bliley Act (GLBA) Department of Justice (DOJ) Blocking statutes Where should data be stored? Who can access the data?