SlideShare a Scribd company logo
T W O
The Internment of Anthropology:
Wartime Studies of Japanese Culture
On the one hand we dogmatically insist that anthropology rests
on ethno-
graphic research involving personal, prolonged interaction with
the Other. But
then we pronounce upon the knowledge gained from such
research a discourse
which construes the Other in terms of distance, spatial and
temporal. The Oth-
er’s empirical presence turns into his theoretical absence, a
conjuring trick . . .
to keep the Other outside the Time of anthropology.—Johannes
Fabian, Time
and the Other
In War Without Mercy, historian John Dower’s 1986 book on
the racial
discourses that informed the war between Japan and the United
States,
there is a fleeting but vitally important point about the terms of
the na-
tional perception of Japanese Americans.1 ‘‘The treatment of
Japanese
Americans,’’ Dower begins, ‘‘is a natural starting point for any
study of
the racial aspects of the war, for it reveals not merely the clear-
cut racial
stigmatization of the Japanese, but also the oªcial endorsement
this
received’’ (79). He then concludes that the key to understanding
the
terms of their treatment rests in the oªcial program of
‘‘community
analysis’’ or ethnographic study that the War Relocation
Authority
(wra) ‘‘established in the ten camps in which Japanese-
Americans
were incarcerated’’ (79). Although Dower does not elaborate on
the
possible implications of community analysis, the ambitions of
com-
munity analysts were well documented at the time, and they
revolved
around using interviews with the internees in an e¤ort to
develop theo-
ries of Japanese behavior that would be useful after the war
when the
United States occupied Japan. Thus, anthropology’s central role
in the
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
44 A N A B S E N T P R E S E N C E
‘‘treatment’’ of Japanese American internees begins to suggest
some-
thing of the truth of Johannes Fabian’s argument quoted in the
epi-
graph to this chapter—that anthropology makes its Other (in
this case,
Japanese Americans) by using information gathered from
‘‘personal,
prolonged interaction’’ in an e¤ort to set the Other beyond the
spatial
and temporal realm of the examiner (in occupied Japan) and,
thus,
‘‘keep the Other outside the Time of anthropology.’’2 The work
of the
mostly liberal, white camp anthropologists or ‘‘community
analysts,’’
as they were oªcially known, was beset with problems peculiar
to the
national and institutional politics of the war, a fact that
complicates the
ways in which Japanese Americans were ultimately constructed
as ra-
cial Others. American anthropological studies of internment
became
not just another example of the American propensity for seeing
Japa-
nese Americans as Japanese aliens, but more important, the
studies be-
came a clearinghouse for certain transitions in the deployment
and
power of anthropological theories about Asian Americans that
were to
have serious, long-term e¤ects on the self-concept and political
status
of Japanese Americans. Beneath the circuits of influence and
layers of
obfuscation, community analysis programs allowed liberal,
white an-
thropologists unparalleled power to reconstruct the Nisei in
particular.
Government records indicate that during the early years of
World
War II the wra, which was initially established to administer
intern-
ment or relocation camps housing more than one hundred
thousand
West Coast Japanese Americans, created the community
analysis pro-
gram to assist in the administration of the internment camps.
Termed
the ‘‘community analysis section,’’ it began at Poston camp in
Arizona
and eventually involved the assignment of social scientists as
govern-
ment agents in each of the ten internment camps.3 Most of the
social
scientists involved were anthropologists whose chief
qualification was
their knowledge of and interest in Japanese cultural and
behavioral pat-
terns, although only a handful had ever actually visited Japan.4
As com-
munity analysts they were primarily responsible for ensuring
the
smooth operation of camp life. But while stationed in the camps
they
were also explicitly encouraged to utilize Japanese American
internees
as informants on Japanese culture in the hope that the data
collected
might prove useful not only to the ongoing war e¤ort against
Japan but
also to the postwar e¤ort as well. The government hoped for
insights
useful for the control of both international and domestic
Japanese com-
munities: the reformation of Japan in the postwar period as well
as the
resettlement of Japanese Americans after the war.5 Or, as
Dower puts
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
T H E I N T E R N M E N T O F A N T H R O P O L O G Y 45
it, ‘‘observations based on work with these persecuted and
uprooted
Americans were superimposed upon the growing collective
portrait of
the Japanese enemy, and several social scientists who worked in
the
camps went on to participate directly in psychological-warfare
plan-
ning pertaining to Japan.’’6
In truth, however, the relationship between the data drawn from
community analysis and theories of Japanese character was even
more
complicated. Once the project was underway, some
anthropologists be-
gan to recognize that the recruitment of dispossessed Japanese
Ameri-
cans as informants on Japanese culture occurred under such
unique
domestic conditions of suspicion and uncertainty that the uses
of com-
munity analysis in postwar Japan must, at the very least, be
compro-
mised. The anthropologists’ reservations about simply
transferring
methods of regulating camp life to the occupation of Japan were
often
explicit, especially as they begin to see their job as that of
correcting
misconceptions about Japanese Americans by highlighting their
dif-
ficult ordeal during the war and promoting their chances for
successful
reintegration after the war. Ultimately, the relationship between
Japa-
nese Americans and Japanese cultural studies departed
significantly
from its founding intentions. Rather than simply using the
internees
as a resource for information on Japan, the anthropologists very
quickly became invested in drawing conclusions about Japanese
behav-
ior that could be applied to a program of readjustment for
Japanese
Americans. Community analysts paradoxically found themselves
will-
ing to concede that the population was an ‘‘alien’’ culture in
order to
develop an acceptable argument for their assimilability. Thus,
despite
the obvious dilemmas posed by this loose exchange and
substitution
of data, the anthropologists continued to pursue the assumption
that
theories of Japanese behavior and policies for reforming Japan
after the
war might be confirmed and tested through ‘‘prolonged’’
analyses and
observations of imprisoned Japanese Americans. The
immediate, his-
torical reasons for the liberal anthropologists’ willingness to
view the
terms ‘‘Japanese’’ and ‘‘Japanese American’’ as
interchangeable also
followed in the tradition of early national sociological studies
of ‘‘the
oriental problem,’’ which represented the peculiar American
founda-
tions of managing national anxieties about the ‘‘oriental’’ Other
by
reconstructing this ‘‘inscrutable’’ presence as an American in
the
making.
Scholars have only just recently begun to piece together the
elabo-
rate politics of internment anthropology that I synopsize here.
Despite
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
46 A N A B S E N T P R E S E N C E
the fact that the cultural anthropologists’ participation in the
adminis-
tration of the Japanese American internment was public
knowledge
during the war years, it is only in the past decade that this
fraught part
of the history of American anthropology has been deemed a
watershed
in the conceptualization of the Japanese American subject.7
Peter Su-
zuki’s work in the early and mid-1980s was groundbreaking in
this re-
gard, because he was the first to catalog the ethical and
scientific prob-
lems suggested by thewra’s administration of the camps. In a
series of
essays on the role of internment politics in the development of
wartime
anthropology, Suzuki argues, among other things, that
‘‘anthropology
in the wra camp was misapplied because it was largely used to
control
and manipulate the inmates.’’8 Suzuki’s work was followed by
Orin
Starn’s 1986 essay, ‘‘Engineering Internment: Anthropologists
and
the War Relocation Authority,’’ a thoughtful and comprehensive
over-
view of the motivations, processes, and results of the
anthropologists’
misguided attempts to help Japanese American internees.
Although
Starn acknowledges that the analysts were stationed in the
camps in
order to gather data against Japan and to identify potential
problems,
he also focuses on the paradoxical means by which the
anthropologists
tried to use their positions to speak on behalf of the
incarcerated. He
concludes that despite ‘‘their good intentions of improving
camp con-
ditions and defusing anti-Japanese public opinion,’’ (700),wra
anthro-
pologists ultimately produced work and followed policies that
‘‘unin-
tentionally’’ promoted racial stereotypes about the Japanese
and, by
implication, the Japanese Americans as well. Starn’s impressive
analy-
sis remains indispensable for its synthesis of the evolution of
the an-
thropologists’ work in the internment camps. In his essay he
also reit-
erates Suzuki’s contention that the scholarly neglect of the
meaning of
camp analysis has deprived American anthropologists of the
opportu-
nity for important insights into the development of postwar
theories of
culture and behavior:
It continually struck me how little the basic views of wra
ethnographers
about their role in relocation have altered over the years.
Historical
changes have not inspired the kind of public self-examination
found, for
example, in the discussions of British anthropologists about
their rela-
tion to colonialism. . . . Continued convictions of having
contributed to
Japanese-American well-being in troubled times and to the war
e¤ort
more generally would have to be the starting points for such an
analysis.
(717)
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
T H E I N T E R N M E N T O F A N T H R O P O L O G Y 47
Echoes of Dower resound in Starn’s description of the
anthropologists’
treatment of Japanese Americans as ‘‘starting points’’ for the
under-
standing of American attitudes about the Japanese. Starn seems
to sug-
gest that Americans must come to grips with the extent of the
anthro-
pologists’ participation in projecting Japanese Americans as an
‘‘alien’’
ethnic group in need of reformation, an enterprise that evokes
an ear-
lier, Western colonial paternalism.
Around the same time that Starn’s work was published, Yuji
Ichioka
organized a two-day conference on the internment titled ‘‘Views
From
Within: The Japanese American Wartime Internment
Experience,’’
held at the University of California at Berkeley, the center for
the origi-
nal Japanese Evacuation and Resettlement Study (jers). The
book that
came out of the conference gathered a wide-ranging series of
essays on
the politics of camp anthropology, essays that testify to the fact
that the
impact of community analysis is still being felt, although it is
not by
any means fully accounted for.9 Like Dower, Suzuki, and Starn,
Ichioka
and the conference participants found themselves focused on the
an-
thropological studies conducted in the camps as ‘‘the basis of a
rich so-
cial history of concentration camp life’’ (22), but they also
revealed the
diªculty of categorizing the e¤ects of community analysis. ‘‘It
goes
without saying,’’ Ichioka concludes, with his characteristic
cynicism,
‘‘that jers was not a research project in the service of a political
cause
on behalf of Japanese-Americans. To say that it should have
been is to
engage in wishful thinking; to criticize it for not having been is
to be
naı̈ ve’’ (23). Although the disastrous e¤ects of the tendency to
view
Japanese American culture as Japanese have been widely noted
and
have enriched numerous histories and memoirs of the period of
Japa-
nese American internment, postwar and Asian American critics
have
clearly just started to address the impact of anthropology’s
study of Jap-
anese Americans’ internment and resettlement.10
Still, as noted earlier by Dower, the underlying implications of
the
fact that theories of Japanese behavior were explicitly
confirmed or
tested by the administration of Japanese American internees
remain
unspoken. It is time to explain how the liberal anthropologists’
confla-
tion of Japanese American and Japanese culture allowed them
not just
to use an imprisoned population as a scientific resource but also
to
show how their reports from the camps reiterated earlier notions
about
Asians as ‘‘oriental Others’’ in America in an e¤ort to revitalize
the be-
lief in an assimilable Japanese Other. More specifically,
scrutiny of the
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
48 A N A B S E N T P R E S E N C E
work of the camp anthropologists suggests parallels between the
ear-
lier focus on Asian Americans as ‘‘marginal men’’ and the
wartime ob-
session with the split character of the Japanese American Nisei.
De-
spite their stress on presentism and their suspicion of
historicism,
cultural anthropologists recast the concept of the Asian
American as
the ‘‘marginal man’’ as one of Japanese ‘‘duality.’’ According
to Robert
Park, who coined his definition in 1928, the ‘‘marginal man’’
was the
result of global movement and cross-cultural contact, which
created the
conditions for the emergence of the alienated immigrant
individual
caught between two distinct cultures.11 This concept
metamorphosed
into the wartime anthropologists’ concerns with Japanese
‘‘duality,’’
[the peculiar presence of warring impulses in an individual,] as
they
tried to show how the dualistic Japanese American might be
pushed
further toward the American pole. Community analysts argued
that
the presence of a tense generational struggle between Issei and
Nisei
internees was caused by the vestiges of a lingering, archaic
Japanese
character typified by the Issei, which the Nisei had to turn away
from
in order to progress toward full assimilation. As a result, the
anthropol-
ogists determined to utilize the ancient filial piety of Japanese
culture
as a means of spatially and temporally fixing the problem of
Japanese
Americans, a problem that, thus parsed, inevitably necessitated
their
forced movement toward another more modern and thus
American ex-
istence. Not coincidentally, this process of othering a group in
space
and time in order to create the imperative of colonial
reformation was
similarly deployed in occupied Japan, where the aim was to
break the
old, patriarchal Japanese traditions and replace them with a
model of
American democratic capitalism. In the end, however, the
community
analysis project was ultimately responsible for extending the
‘‘prob-
lem’’ of Japanese American di¤erence by aªrming the resilience
of
Japanese culture and, thus, maintaining the constructed
alienation of
the Nisei.
‘‘Experience in Such Colonies’’:
Establishing the Camp Analysis Project
Mass hysteria in the wake of Pearl Harbor provoked widespread
sus-
picion of Japanese Americans. Historian Michi Weglyn reveals
that
in February 1942, President Roosevelt signed Executive Order
9066,
thereby acting against the findings of the prewar Munson
Report,
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
T H E I N T E R N M E N T O F A N T H R O P O L O G Y 49
which had determined that ‘‘there is no Japanese problem on the
Coast.’’ This order designated much of the West Coast a
‘‘military
area,’’ and hence extended to the military carte blanche the
power to
remove any and all individuals of ‘‘a potentially dangerous’’
nature.
Even though the order did not specify Japanese Americans for
special
scrutiny, they emerged as the order’s intended target and remain
the
only ethnic group evacuated en masse under suspicion of
disloyalty.12
Ronald Takaki concludes that in signing Executive Order 9066
Roose-
velt had in e¤ect ‘‘signed a blank check, giving full authority to
General
DeWitt to evacuate the Japanese and place them in assembly
centers
and eventually in internment camps.’’13 Despite the fact that
almost
two-thirds of the evacuees were U.S. citizens—Nisei who had
been
born and, in many cases, reared on the West Coast—a number of
high-
ranking government oªcials urged Roosevelt forward in the
belief
that, as Secretary of War Harry Stimson put it, ‘‘their racial
characteris-
tics are such that we cannot understand or trust even the citizen
Japa-
nese.’’14 Within a year, virtually every West Coast Japanese
American
was sent to one of several remote relocation centers where he or
she
was oªcially quarantined and questioned to determine if
imprison-
ment in even more isolated internment camps, reserved for those
deemed disloyal and a threat to national security, was
warranted. Ten
relocation centers, often called ‘‘camps’’ even though they were
sup-
posed to be merely holding centers, were eventually established.
A central part of the task of assessing and containing Japanese
American internees fell to the group of government social
scientists
who became part of the wra’s administration of the camps. As
com-
munity analysts and as part of the Camp Analysts Section, or
cas, their
explicit duties in the camps were to assess levels of residual
‘‘Japanese
attitudes,’’ including and especially the evacuated population’s
varying
levels of loyalty to the United States; to recommend and direct
govern-
ment administration of the camps, including future plans for
perma-
nently relocating evacuees away from their lifelong homes in
the West;
and, later, to study the viability of training and using Japanese
Ameri-
cans as go-betweens in occupied areas of the Pacific.15
Archival evi-
dence reveals that the decision to place analysts in the camps
was ratio-
nalized not only as a domestic necessity for the purposes of
discovering
how to deal with the unique problems represented by Japanese
Ameri-
cans, but also as a means of studying and confirming theories of
Japa-
nese behavioral patterns.
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
50 A N A B S E N T P R E S E N C E
In an early memorandum from John Embree, the anthropologist
who ran the cas from Washington, D.C., to General J. L.
DeWitt, Em-
bree writes: ‘‘It is believed that various evacuees in the
Japanese reloca-
tion centers possess information regarding Japanese social,
political,
economic and labor conditions which can be of great value in
the prose-
cution of the war.’’16 Although Embree clearly refers to Kibei,
those Jap-
anese Americans who had been born in the United States but
educated
in Japan, camp analysts regularly dealt with and depended on
others in
the camps as well. By 1944, Embree had broadened the initial
focus on
the Kibei to state simply that the evacuees were used as
resources for
camp analysts from ‘‘the time the administration was first set
up.’’ He
also became more specific about the general uses of the data
collected
in the camps, saying, ‘‘the section was expected not only to be
informed
on social conditions in relocation centers but also on the social
organi-
zation of the West Coast Japanese before the war, and on that
abstruse
phenomenon called ‘Japanese psychology’ ’’ (278).
Here, the emphasis on historical context, on the specific social
con-
ditions a¤ecting Japanese Americans, is in large measure the
enduring
legacy of Franz Boas, who established the terms for cross-
cultural
analysis as early as 1887 when, in response to Otis Mason’s
Social Dar-
winist view of the evolution of all cultures as governed by
natural or
biological laws, Boas argued for the necessity of historical
specificity in
assessing the culture of any people.17 It is interesting to note
that even
Boas was not immune to such views. He entertained the validity
of the
physiological basis for comparison of cultures in his early
theories of
race and culture, even once acknowledging that some races
were, at
least in the then present day, ‘‘inherently’’ inferior to others. At
the
close of his career, however, he would adamantly insist that
cultural
di¤erences were ‘‘dependent upon historical causes, regardless
of
race.’’18 Although Boas and those who studied with him
accepted that
historical and social forces were the ultimate source of cultural
di¤er-
ences, the debate did not entirely eliminate the resort to racial
stereo-
typing in some cases. Embree’s and perhaps others’ willingness
to con-
sider that Japanese Americans might represent both a unique
culture
and yet remain direct symbols of a distant Japanese culture was
indi-
rectly influenced by this tendency in American social scientists’
work
on race and culture. John Embree saw no conflict between his
Boasnian
adherence to the historical foundations of culture and his casual
asser-
tion that with Japanese Americans ‘‘recommendations on labor
rela-
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
T H E I N T E R N M E N T O F A N T H R O P O L O G Y 51
tions, mess operations, etc., to be accepted, usually had to be
made in
terms of Japanese psychology rather than of prosaic labor-
management
relations.’’19 The implementation of Japanese Americans as a
resource
for the study of Japan continued to develop under the auspices
of Em-
bree and anthropologist Alexander Leighton, the very first
analyst in-
stalled at one of the camps. When unrest broke out in the
Poston, Ari-
zona, camp in 1942, it was decided that cultural anthropologists
might
be useful in resolving the di¤erences between camp
administrators
and camp residents.20 Thus, Embree’s approach to the so-called
prob-
lem of Japanese American status was shaped by his
unselfconscious
application of Boas’s earlier arguments about racial di¤erences.
Yet Embree, and Alexander Leighton in particular, were also
com-
pelled by the work of those social scientists who followed in
Boas’s
wake to develop new theories that further explained the social
and cul-
tural origins of interracial contact and also suggested how
solutions to
the problem might be achieved. Chief among these problems
was the
question of the future role of Asian immigrants in American
society.
In a recent work, historian Henry Yu points out that ‘‘the
‘oriental prob-
lem’ in the 1920s created a set of ideas that structured the way
that
Asians were understood and the way they were given a
meaningful
place in American society.’’21 Robert Park was the most
influential pro-
ponent of ‘‘the oriental problem,’’ which he perceived as a
prob-
lem of assimilation because ‘‘the ‘oriental’ in America was still
an ex-
otic oddity, foreign and seemingly unassimilated.’’22 According
to Yu,
Park theorized that such ‘‘an enormous cultural distance
separated
Western culture from ‘Oriental’ culture’’ that the universal
cycle of
contact, competition, conflict, accommodation, and assimilation
was
not allowed to develop.23 Thus, the greatest task facing the
social scien-
tist was to determine how to move the ‘‘oriental’’ Other further
along
in the cycle so that he or she might achieve full assimilation.
More than any other single camp analyst, Alexander Leighton
was
vital to enunciating a set of strategies for dealing with the
perceived
‘‘assimilation problem’’ of the Japanese American subject. He
spent
fifteen months, from June 1942 to September 1943, at Poston, a
camp
in Arizona in the Colorado River Valley, which was the first to
use social
scientists to observe Japanese American camp behavior. Not
surpris-
ingly, Leighton was also among the first to suggest publicly that
ana-
lysts’ experiences in the camps should play a major role in the
nation’s
administration of the postwar reconstruction of Asia. John
Embree, as
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz user
on 29 May 2019
52 A N A B S E N T P R E S E N C E
head of the wra, viewed Leighton’s anthropological project at
Poston
as the model for the installation of community analysts in every
one of
the camps housing evacuated Japanese Americans.24 Because
commu-
nity analysis in the camps hinged on the presumption of the
direct use-
fulness of Japanese Americans as informants on Japanese
culture, Em-
bree and Leighton were often compelled to focus on the
similarities
between internment and the expected postwar dislocation of
Japa-
nese citizens. Any conclusions they might draw about the
cultural dif-
ferences that Park had theorized as preventing Asian
Americans’ as-
similation in America had to be applicable to the occupation
e¤ort in
postwar Japan. Although camp analysts did not in practice
mistake Jap-
anese Americans for Japanese, in theory they did rely from the
start on
viewing the government’s administration of Japanese American
dis-
placement as a direct analogue for the military’s later
occupation of Ja-
pan. As a result of this reliance, the anthropologists’
observations and
opinions regarding the administration of internment were later
quite
influential in developing and confirming theories of the best
way to
manage Japanese di¤erences and, as a ‘‘natural’’ extension, the
best
means of restructuring Japanese American subjectivity to
achieve
Park’s final stage of assimilation.
In hindsight, the disastrous e¤ects of such a fundamental
oversight
seem glaring, and it is important to recall that these
ramifications were
barely considered in the first public description of the camp
analysis
project and its aims. Although the project may now appear a
rather ob-
vious instance of social engineering, one that seems stamped
with the
imperialism of an earlier age, Leighton—perhaps also reflecting
impe-
rialist rationalizations—believed his work would ultimately
achieve
the liberation of his subjects. In July 1942, Leighton published
an essay
titled ‘‘Training Social Scientists for Post-War Conditions,’’
just as he
was assuming his position at Poston. In this work, he outlines
an opti-
mistic plan for the use of social scientists during and after the
war, in
which he cites the invaluable benefits of the ‘‘practical
application’’ of
their results.25 After providing a synopsis of his experiences in
‘‘an Es-
kimo village in Alaska’’ as an example of how the social
scientist could
be ‘‘both an observer and a social doctor to a community’’ and
utilize
the information gathered toward ‘‘the development of better
living and
better relations,’’ he suggests that ‘‘there are many similar
opportuni-
ties in the United States under the widespread administration of
the
Oªce of Indian A¤airs’’ (27–29). His statement refers to the
Poston
Downloaded from https://read.dukeupress.edu/books/chapter-
pdf/88386/9780822380832-003.pdf
by University of California Santa Cruz …
INFORMATION
GOVERNANCE
Founded in 1807, John Wiley & Sons is the oldest independent
publishing company in
the United States. With offi ces in North America, Europe,
Asia, and Australia, Wiley
is globally committed to developing and marketing print and
electronic products and
services for our customers’ professional and personal
knowledge and understanding.
The Wiley CIO series provides information, tools, and insights
to IT executives
and managers. The products in this series cover a wide range of
topics that supply
strategic and implementation guidance on the latest technology
trends, leadership, and
emerging best practices.
Titles in the Wiley CIO series include:
The Agile Architecture Revolution: How Cloud Computing,
REST-Based SOA, and
Mobile Computing Are Changing Enterprise IT by Jason
BloombergT
Big Data, Big Analytics: Emerging Business Intelligence and
Analytic Trends for Today’s
Businesses by Michael Minelli, Michele Chambers, and Ambiga
Dhiraj
The Chief Information Offi cer’s Body of Knowledge: People,
Process, and Technology by
Dean Lane
CIO Best Practices: Enabling Strategic Value with Information
Technology (Second
Edition) by Joe Stenzel, Randy Betancourt, Gary Cokins, Alyssa
Farrell, Bill
Flemming, Michael H. Hugos, Jonathan Hujsak, and Karl
Schubert
The CIO Playbook: Strategies and Best Practices for IT Leaders
to Deliver Value by
Nicholas R. Colisto
Enterprise Performance Management Done Right: An Operating
System for Your
Organization by Ron Dimon
Executive’s Guide to Virtual Worlds: How Avatars Are
Transforming Your Business and
Your Brand by Lonnie Bensond
IT Leadership Manual: Roadmap to Becoming a Trusted
Business Partner by Alan R. r
Guibord
Managing Electronic Records: Methods, Best Practices, and
Technologies by Robert F. s
Smallwood
On Top of the Cloud: How CIOs Leverage New Technologies to
Drive Change and Build
Value Across the Enterprise by Hunter Muller
Straight to the Top: CIO Leadership in a Mobile, Social, and
Cloud-based World (Second
Edition) by Gregory S. Smith
Strategic IT: Best Practices for Managers and Executives by
Arthur M. Langer ands
Lyle Yorks
Transforming IT Culture: How to Use Social Intelligence,
Human Factors, and
Collaboration to Create an IT Department That Outperforms by
Frank Wanders
Unleashing the Power of IT: Bringing People, Business, and
Technology Together by Dan
Roberts
The U.S. Technology Skills Gap: What Every Technology
Executive Must Know to Save
America’s Future by Gary J. Beach
Information Governance: Concepts, Strategies and Best
Practices by Robert F. Smallwoods
Robert F. Smallwood
INFORMATION
GOVERNANCE
CONCEPTS, STRATEGIES AND
BEST PRACTICES
Cover image: © iStockphoto / IgorZh
Cover design: Wiley
Copyright © 2014 by Robert F. Smallwood. All rights reserved.
Chapter 7 © 2014 by Barclay Blair
Portions of Chapter 8 © 2014 by Randolph Kahn
Published by John Wiley & Sons, Inc., Hoboken, New Jersey.
Published simultaneously in Canada.
No part of this publication may be reproduced, stored in a
retrieval system, or transmitted in any form
or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise, except as
permitted under Section 107 or 108 of the 1976 United States
Copyright Act, without either the prior
written permission of the Publisher, or authorization through
payment of the appropriate per-copy fee
to the Copyright Clearance Center, Inc., 222 Rosewood Drive,
Danvers, MA 01923, (978) 750-8400, fax
(978) 646-8600, or on the Web at www.copyright.com. Requests
to the Publisher for permission should
be addressed to the Permissions Department, John Wiley &
Sons, Inc., 111 River Street, Hoboken, NJ
07030, (201) 748-6011, fax (201) 748-6008, or online at
http://www.wiley.com/go/permissions.
Limit of Liability/Disclaimer of Warranty: While the publisher
and author have used their best
efforts in preparing this book, they make no representations or
warranties with respect to the accuracy
or completeness of the contents of this book and specifi cally
disclaim any implied warranties of
merchantability or fi tness for a particular purpose. No
warranty may be created or extended by sales
representatives or written sales materials. The advice and
strategies contained herein may not be suitable
for your situation. You should consult with a professional
where appropriate. Neither the publisher nor
author shall be liable for any loss of profi t or any other
commercial damages, including but not limited to
special, incidental, consequential, or other damages.
For general information on our other products and services or
for technical support, please contact our
Customer Care Department within the United States at (800)
762-2974, outside the United States at (317)
572-3993 or fax (317) 572-4002.
Wiley publishes in a variety of print and electronic formats and
by print-on-demand. Some material included
with standard print versions of this book may not be included in
e-books or in print-on-demand. If this book
refers to media such as a CD or DVD that is not included in the
version you purchased, you may download this
material at http://booksupport.wiley.com. For more information
about Wiley products, visit www.wiley.com.
Library of Congress Cataloging-in-Publication Data:
Smallwood, Robert F., 1959-
Information governance : concepts, strategies, and best
practices / Robert F. Smallwood.
pages cm. — (Wiley CIO series)
ISBN 978-1-118-21830-3 (cloth); ISBN 978-1-118-41949-6
(ebk); ISBN 978-1-118-42101-7 (ebk)
1. Information technology—Management. 2. Management
information systems. 3. Electronic
records—Management. I. Title.
HD30.2.S617 2014
658.4’038—dc23
2013045072
Printed in the United States of America
10 9 8 7 6 5 4 3 2 1
http://www.copyright.com
http://www.wiley.com/go/permissions
http://booksupport.wiley.com
http://www.wiley.com
For my sons
and the next generation of tech-savvy managers
vii
CONTENTS
PREFACE xv
ACKNOWLEDGMENTS xvii
PA RT O N E — Information Governance Concepts,
Defi nitions, and Principles 1p
C H A P T E R 1 The Onslaught of Big Data and the
Information Governance
Imperative 3
Defi ning Information Governance 5
IG Is Not a Project, But an Ongoing Program 7
Why IG Is Good Business 7
Failures in Information Governance 8
Form IG Policies, Then Apply Technology for Enforcement 10
Notes 12
C H A P T E R 2 Information Governance, IT Governance, Data
Governance: What’s the Difference? 15
Data Governance 15
IT Governance 17
Information Governance 20
Impact of a Successful IG Program 20
Summing Up the Differences 21
Notes 22
C H A P T E R 3 Information Governance Principles 25
Accountability Is Key 27
Generally Accepted Recordkeeping Principles® 27
Contributed by Charmaine Brooks, CRM
Assessment and Improvement Roadmap 34
Who Should Determine IG Policies? 35
Notes 38
PA RT T W O — Information Governance Risk Assessment
and Strategic Planning 41g g
C H A P T E R 4 Information Risk Planning and Management
43
Step 1: Survey and Determine Legal and Regulatory
Applicability
and Requirements 43
viii CONTENTS
Step 2: Specify IG Requirements to Achieve Compliance 46
Step 3: Create a Risk Profi le 46
Step 4: Perform Risk Analysis and Assessment 48
Step 5: Develop an Information Risk Mitigation Plan 49
Step 6: Develop Metrics and Measure Results 50
Step 7: Execute Your Risk Mitigation Plan 50
Step 8: Audit the Information Risk Mitigation Program 51
Notes 51
C H A P T E R 5 Strategic Planning and Best Practices for
Information Governance 53
Crucial Executive Sponsor Role 54
Evolving Role of the Executive Sponsor 55
Building Your IG Team 56
Assigning IG Team Roles and Responsibilities 56
Align Your IG Plan with Organizational Strategic Plans 57
Survey and Evaluate External Factors 58
Formulating the IG Strategic Plan 65
Notes 69
C H A P T E R 6 Information Governance Policy Development
71
A Brief Review of Generally Accepted Recordkeeping
Principles® 71
IG Reference Model 72
Best Practices Considerations 75
Standards Considerations 76
Benefi ts and Risks of Standards 76
Key Standards Relevant to IG Efforts 77
Major National and Regional ERM Standards 81
Making Your Best Practices and Standards Selections to Inform
Your IG Framework 87
Roles and Responsibilities 88
Program Communications and Training 89
Program Controls, Monitoring, Auditing and Enforcement 89
Notes 91
PA RT T H R E E — Information Governance Key
Impact Areas Based on the IG Reference Model 95p
C H A P T E R 7 Business Considerations for a Successful IG
Program 97
By Barclay T. Blair
Changing Information Environment 97
CONTENTS ix
Calculating Information Costs 99
Big Data Opportunities and Challenges 100
Full Cost Accounting for Information 101
Calculating the Cost of Owning Unstructured Information 102
The Path to Information Value 105
Challenging the Culture 107
New Information Models 107
Future State: What Will the IG-Enabled Organization Look
Like? 110
Moving Forward 111
Notes 113
C H A P T E R 8 Information Governance and Legal Functions
115
By Robert Smallwood with Randy Kahn, Esq., and Barry
Murphy
Introduction to e-Discovery: The Revised 2006 Federal Rules of
Civil Procedure Changed Everything 115
Big Data Impact 117
More Details on the Revised FRCP Rules 117
Landmark E-Discovery Case: Zubulake v. UBS Warburg 119
E-Discovery Techniques 119
E-Discovery Reference Model 119
The Intersection of IG and E-Discovery 122
By Barry Murphy
Building on Legal Hold Programs to Launch Defensible
Disposition 125
By Barry Murphy
Destructive Retention of E-Mail 126
Newer Technologies That Can Assist in E-Discovery 126
Defensible Disposal: The Only Real Way To Manage Terabytes
and Petabytes 130
By Randy Kahn, Esq.
Retention Policies and Schedules 137
By Robert Smallwood, edited by Paula Lederman, MLS
Notes 144
C H A P T E R 9 Information Governance and Records and
Information Management Functions 147
Records Management Business Rationale 149
Why Is Records Management So Challenging? 150
Benefi ts of Electronic Records Management 152
Additional Intangible Benefi ts 153
Inventorying E-Records 154
Generally Accepted Recordkeeping Principles® 155
E-Records Inventory Challenges 155
x CONTENTS
Records Inventory Purposes 156
Records Inventorying Steps 157
Ensuring Adoption and Compliance of RM Policy 168
General Principles of a Retention Scheduling 169
Developing a Records Retention Schedule 170
Why Are Retention Schedules Needed? 171
What Records Do You Have to Schedule? Inventory and Classifi
cation 173
Rationale for Records Groupings 174
Records Series Identifi cation and Classifi cation 174
Retention of E-Mail Records 175
How Long Should You Keep Old E-Mails? 176
Destructive Retention of E-Mail 177
Legal Requirements and Compliance Research 178
Event-Based Retention Scheduling for Disposition of E-Records
179
Prerequisites for Event-Based Disposition 180
Final Disposition and Closure Criteria 181
Retaining Transitory Records 182
Implementation of the Retention Schedule and Disposal of
Records 182
Ongoing Maintenance of the Retention Schedule 183
Audit to Manage Compliance with the Retention Schedule 183
Notes 186
C H A P T E R 10 Information Governance and Information
Technology Functions 189
Data Governance 191
Steps to Governing Data Effectively 192
Data Governance Framework 193
Information Management 194
IT Governance 196
IG Best Practices for Database Security and Compliance 202
Tying It All Together 204
Notes 205
C H A P T E R 11 Information Governance and Privacy and
Security Functions 207
Cyberattacks Proliferate 207
Insider Threat: Malicious or Not 208
Privacy Laws 210
Defense in Depth 212
Controlling Access Using Identity Access Management 212
Enforcing IG: Protect Files with Rules and Permissions 213
CONTENTS xi
Challenge of Securing Confi dential E-Documents 213
Apply Better Technology for Better Enforcement in the
Extended Enterprise 215
E-Mail Encryption 217
Secure Communications Using Record-Free E-Mail 217
Digital Signatures 218
Document Encryption 219
Data Loss Prevention (DLP) Technology 220
Missing Piece: Information Rights Management (IRM) 222
Embedded Protection 226
Hybrid Approach: Combining DLP and IRM Technologies 227
Securing Trade Secrets after Layoffs and Terminations 228
Persistently Protecting Blueprints and CAD Documents 228
Securing Internal Price Lists 229
Approaches for Securing Data Once It Leaves the Organization
230
Document Labeling 231
Document Analytics 232
Confi dential Stream Messaging 233
Notes 236
PA RT F O U R — Information Governance for
Delivery Platforms 239y
C H A P T E R 12 Information Governance for E-Mail and
Instant Messaging 241
Employees Regularly Expose Organizations to E-Mail Risk 242
E-Mail Polices Should Be Realistic and Technology Agnostic
243
E-Record Retention: Fundamentally a Legal Issue 243
Preserve E-Mail Integrity and Admissibility with Automatic
Archiving 244
Instant Messaging 247
Best Practices for Business IM Use 247
Technology to Monitor IM 249
Tips for Safer IM 249
Notes 251
C H A P T E R 13 Information Governance for Social Media
253
By Patricia Franks, Ph.D, CRM, and Robert Smallwood
Types of Social Media in Web 2.0 253
Additional Social Media Categories 255
Social Media in the Enterprise 256
Key Ways Social Media Is Different from E-Mail and Instant
Messaging 257
Biggest Risks of Social Media 257
Legal Risks of Social Media Posts 259
xii CONTENTS
Tools to Archive Social Media 261
IG Considerations for Social Media 262
Key Social Media Policy Guidelines 263
Records Management and Litigation Considerations for Social
Media 264
Emerging Best Practices for Managing Social Media Records
267
Notes 269
C H A P T E R 14 Information Governance for Mobile Devices
271
Current Trends in Mobile Computing 273
Security Risks of Mobile Computing 274
Securing Mobile Data 274
Mobile Device Management 275
IG for Mobile Computing 276
Building Security into Mobile Applications 277
Best Practices to Secure Mobile Applications 280
Developing Mobile Device Policies 281
Notes 283
C H A P T E R 15 Information Governance for Cloud
Computing 285
By Monica Crocker CRM, PMP, CIP, and Robert Smallwood
Defi ning Cloud Computing 286
Key Characteristics of Cloud Computing 287
What Cloud Computing Really Means 288
Cloud Deployment Models 289
Security Threats with Cloud Computing 290
Benefi ts of the Cloud 298
Managing Documents and Records in the Cloud 299
IG Guidelines for Cloud Computing
Solution
s 300
Notes 301
C H A P T E R 16 SharePoint Information Governance 303
By Monica Crocker, CRM, PMP, CIP, edited by Robert
Smallwood
Process Change, People Change 304
Where to Begin the Planning Process 306
Policy Considerations 310
Roles and Responsibilities 311
Establish Processes 312
Training Plan 313
Communication Plan 313
Note 314
CONTENTS xiii
PA RT F I V E — Long-Term Program Issues 315g g
C H A P T E R 17 Long-Term Digital Preservation 317
By Charles M. Dollar and Lori J. Ashley
Defi ning Long-Term Digital Preservation 317
Key Factors in Long-Term Digital Preservation 318
Threats to Preserving Records 320
Digital Preservation Standards 321
PREMIS Preservation Metadata Standard 328
Recommended Open Standard Technology-Neutral Formats 329
Digital Preservation Requirements 333
Long-Term Digital Preservation Capability Maturity Model®
334
Scope of the Capability Maturity Model 336
Digital Preservation Capability Performance Metrics 341
Digital Preservation Strategies and Techniques 341
Evolving Marketplace 344
Looking Forward 344
Notes 346
C H A P T E R 18 Maintaining an Information Governance
Program
and Culture of Compliance 349
Monitoring and Accountability 349
Staffi ng Continuity Plan 350
Continuous Process Improvement 351
Why Continuous Improvement Is Needed 351
Notes 353
A P P E N D I X A Information Organization and Classifi
cation:
Taxonomies and Metadata 355
By Barb Blackburn, CRM, with Robert Smallwood; edited by
Seth Earley
Importance of Navigation and Classifi cation 357
When Is a New Taxonomy Needed? 358
Taxonomies Improve Search Results 358
Metadata and Taxonomy 359
Metadata Governance, Standards, and Strategies 360
Types of Metadata 362
Core Metadata Issues 363
International Metadata Standards and Guidance 364
Records Grouping Rationale 368
Business Classifi cation Scheme, File Plans, and Taxonomy 368
Classifi cation and Taxonomy 369
xiv CONTENTS
Prebuilt versus Custom Taxonomies 370
Thesaurus Use in Taxonomies 371
Taxonomy Types 371
Business Process Analysis 377
Taxonomy Testing: A Necessary Step 379
Taxonomy Maintenance 380
Social Tagging and Folksonomies 381
Notes 383
A P P E N D I X B Laws and Major Regulations Related to
Records Management 385
United States 385
Canada 387
By Ken Chasse, J.D., LL.M.
United Kingdom 389
Australia 391
Notes 394
A P P E N D I X C Laws and Major Regulations
Related to Privacy 397
United States 397
Major Privacy Laws Worldwide, by Country 398
Notes 400
GLOSSARY 401
ABOUT THE AUTHOR 417
ABOUT THE MAJOR CONTRIBUTORS 419
INDEX 421
xv
PREFACE
I
nformation governance (IG) has emerged as a key concern for
business executives
and managers in today’s environment of Big Data, increasing
information risks, co-
lossal leaks, and greater compliance and legal demands. But few
seem to have a clear
understanding of what IG is; that is, how you defi ne what it is
and is not, and how to
implement it. This book clarifi es and codifi es these defi
nitions and provides key in-
sights as to how to implement and gain value from IG programs.
Based on exhaustive
research, and with the contributions of a number of industry
pioneers and experts, this
book lays out IG as a complete discipline in and of itself for the
fi rst time.
IG is a super-discipline that includes components of several
key fi elds: law, records
management, information technology (IT), risk management,
privacy and security,
and business operations. This unique blend calls for a new breed
of information pro-
fessional who is competent across these established and quite
complex fi elds. Training
and education are key to IG success, and this book provides the
essential underpinning
for organizations to train a new generation of IG professionals.
Those who are practicing professionals in the component fi
elds of IG will fi nd
the book useful in expanding their knowledge from traditional fi
elds to the emerging
tenets of IG. Attorneys, records and compliance managers, risk
managers, IT manag-
ers, and security and privacy professionals will fi nd this book a
particularly valuable
resource.
The book strives to offer clear IG concepts, actionable
strategies, and proven best
practices in an understandable and digestible way; a concerted
effort was made to
simplify language and to offer examples. There are summaries
of key points through-
out and at the end of each chapter to help the reader retain
major points. The text
is organized into fi ve parts: (1) Information Governance
Concepts, Defi nitions, and
Principles; (2) IG Risk Assessment and Strategic Planning; (3)
IG Key Impact Areas;
(4) IG for Delivery Platforms; and (5) Long-Term Program
Issues. Also included are
appendices with detailed information on taxonomy and metadata
design and on re-
cords management and privacy legislation.
One thing that is sure is that the complex fi eld of IG is
evolving. It will continue
to change and solidify. But help is here: No other book offers
the kind of compre-
hensive coverage of IG contained within these pages.
Leveraging the critical advice
provided here will smooth your path to understanding and
implementing successful
IG programs.
Robert F. Smallwood
xvii
ACKNOWLEDGMENTS
I
would like to sincerely thank my colleagues for their support
and generous contribu-
tion of their expertise and time, which made this pioneering text
possible.
Many thanks to Lori Ashley, Barb Blackburn, Barclay Blair,
Charmaine Brooks,
Ken Chasse, Monica Crocker, Charles M. Dollar, Seth Earley,
Dr. Patricia Franks,
Randy Kahn, Paula Lederman, and Barry Murphy.
I am truly honored to include their work and owe them a great
debt of gratitude.
PA RT O N E
Information
Governance
Concepts,
Defi nitions, and
Principles
3
The Onslaught
of Big Data and
the Information
Governance Imperative
C H A P T E R 1
T
he value of information in business is rising, and business
leaders are more and
more viewing the ability to govern, manage, and harvest
information as critical
to success. Raw data is now being increasingly viewed as an
asset that can be
leveraged, just like fi nancial or human capital.1 Some have
called this new age of “Big
Data” the “industrial revolution of data.”
According to the research group Gartner, Inc., Big Data is defi
ned as “high-volume,
high-velocity and high-variety information assets that demand
cost-effective, inno-
vative forms of information processing for enhanced insight and
decision making.” 2
A practical defi nition should also include the idea that the
amount of data—both struc-
tured (in databases) and unstructured (e.g., e-mail, scanned
documents) is so mas-
sive that it cannot be processed using today’s database tools and
analytic software
techniques. 3
In today’s information overload era of Big Data—characterized
by massive growth
in business data volumes and velocity—the ability to distill key
insights from enor-
mous amounts of data is a major business differentiator and
source of sustainable com-
petitive advantage. In fact, a recent report by the World
Economic Forum stated that
data is a new asset class and personal data is “the new oil.” 4
And we are generating more
than we can manage effectively with current methods and tools.
The Big Data numbers are overwhelming: Estimates and
projections vary, but it
has been stated that 90 percent of the data existing worldwide
today was created in the
last two years 5 and that every two days more information is
generated than was from
the dawn of civilization until 2003. 6 This trend will
continue: The global market for
Big Data technology and services is projected to grow at a
compound annual rate of
27 percent through 2017, about six times faster than the general
information and com-
munications technology (ICT) market. 7
Many more comparisons and statistics are available, and all
demonstrate the
incredible and continued growth of data.
Certainly, there are new and emerging opportunities arising
from the accu-
mulation and analysis of all that data we are busy generating
and collecting. New
enterprises are springing up to capitalize on data mining and
business intelligence
opportunities. The U.S. federal government joined in,
announcing $200 million in
Big Data research programs in 2012.8
4 INFORMATION GOVERNANCE
Big Data values massive accumulation of data, whereas in
business, e-discovery
realities and potential legal liabilities dictate that data be culled
to only that
which has clear business value.
But established organizations, especially larger ones, are being
crushed by this
onslaught of Big Data: It is just too expensive to keep all the
information that is being
generated, and unneeded information is a sort of irrelevant
sludge for decision makers
to wade through. They have diffi culty knowing which
information is an accurate and
meaningful “wheat” and which is simply irrelevant “chaff.”
This means they do not
have the precise information they need to base good business
decisions upon.
And all that Big Data piling up has real costs: The burden of
massive stores of
information has increased storage management costs
dramatically, caused overloaded
systems to fail, and increased legal discovery costs. 9 Further,
the longer that data is
kept, the more likely that it will need to be migrated to newer
computing platforms,
driving up conversion costs; and legally, there is the risk that
somewhere in that
mountain of data an organization stores is a piece of
information that represents a
signifi cant legal liability.10
This is where the worlds of Big Data and business collide . For
Big Data proponents,
more data is always better, and there is no perceived downside
to accumulation of mas-
sive amounts of data. In the business world, though, the
realities of legal e-discovery
mean the opposite is true. 11 To reduce risk, liability, and
costs, it is critical for unneeded
information to be disposed of in a systematic, methodical, and
“legally defensible” (jus-
tifi able in legal proceedings) way, when it no longer has legal,
regulatory, or business
value. And there also is the high-value benefi t of basing
decisions on better, cleaner
data, which can come about only through rigid, enforced
information governance
(IG) policies that reduce information glut.
Organizations are struggling to reduce and right-size their
information footprint
by discarding superfl uous and redundant data, e-documents,
and information. But the
critical issue is devising policies, methods, and processes and
then deploying information technol-
ogy (IT) to sort through which information is valuable and
which no longer has business value
and can be discarded.
IT, IG, risk, compliance, and legal representatives in
organizations have a clear
sense that most of the information stored is unneeded, raises
costs, and poses risks.
According to a survey taken at a recent Compliance,
Governance and Oversight
Counsel summit, respondents estimated that approximately 25
percent of information
stored in organizations has real business value, while 5 percent
must be kept as busi-
ness records and about 1 percent is retained due to a litigation
hold. “This means that
The onslaught of Big Data necessitates that information
governance (IG) be
implemented to discard unneeded data in a legally defensible
way.
THE ONSLAUGHT OF BIG DATA AND THE INFORMATION
GOVERNANCE IMPERATIVE 5
[about] 69 percent of information in most companies has no
business, legal, or regulatory value.
Companies that are able to dispose of this data debris return
more profi t to sharehold-
ers, can leverage more of their IT budgets for strategic
investments, and can avoid
excess expense in legal and regulatory response” (emphasis
added). 12
With a smaller information footprint , organizations can more
easily fi nd what they tt
need and derive business value from it.13 They must eliminate
the data debris regularly
and consistently, and to do this, processes and systems must be
in place to cull valuable
information and discard the data debris daily. An IG program
sets the framework to
accomplish this.
The business environment has also underscored the need for
IG. According to
Ted Friedman at Gartner, “The recent global fi nancial crisis
has put information gov-
ernance in the spotlight. . . . [It] is a priority of IT and business
leaders as a result of
various pressures, including regulatory compliance mandates
and the urgent need for
improved decision-making.” 14
And IG mastery is critical for executives: Gartner predicts that
by 2016, one in fi ve chief
information offi cers in regulated industries will be fi red from
their jobs for failed IG initiatives. s 15
Defi ning Information Governance
IG is a sort of super discipline that has emerged as a result of
new and tightened legislation
governing businesses, external threats such as hacking and data
breaches, and the recog-
nition that multiple overlapping disciplines were needed to
address today’s information
management challenges in an increasingly regulated and
litigated business environment.16
IG is a subset of corporate governance, and includes key
concepts from re-
cords management, content management, IT and data
governance, information se-
curity, data privacy, risk management, litigation readiness,
regulatory compliance,
long-term digital preservation , and even business intelligence.
This also means
that it includes related technology and discipline subcategories,
such as document
management, enterprise search, knowledge management, and
business continuity/
disaster recovery.
Only about one quarter of information organizations are
managing has real
business value.
With a smaller information footprint, it is easier for
organizations to fi nd the
information they need and derive business value from it.
IG is a subset of corporate governance.
6 INFORMATION GOVERNANCE
IG is a sort of superdiscipline that encompasses a variety
of key concepts from
a variety of related disciplines.
Practicing good IG is the essential foundation for building
legally defensible
disposition practices to discard unneeded information and to
secure confi dential in-
formation, which may include trade secrets, strategic plans,
price lists, blueprints, or
personally identifi able information (PII) subject to privacy
laws; it provides the basis
for consistent, reliable methods for managing data, e-
documents, and records.
Having trusted and reliable records, reports, data, and databases
enables managers
to make key decisions with …

More Related Content

Similar to T W OThe Internment of AnthropologyWartime Studies of.docx

Philippine History
Philippine HistoryPhilippine History
Philippine History
RENECATALANLACABA
 
Yoshimitsu Benedict Endō Guilt Shame And The Post War Idea Of Japan
Yoshimitsu  Benedict  Endō Guilt Shame And The Post War Idea Of  JapanYoshimitsu  Benedict  Endō Guilt Shame And The Post War Idea Of  Japan
Yoshimitsu Benedict Endō Guilt Shame And The Post War Idea Of Japan
Masa Nakata
 
To Win the Peace by Richard Hawkins
To Win the Peace by Richard HawkinsTo Win the Peace by Richard Hawkins
To Win the Peace by Richard Hawkins
Richard Hawkins
 
Learning from shogun_txt
Learning from shogun_txtLearning from shogun_txt
Learning from shogun_txt
Hung Pham Thai
 
America Compared Race War
America Compared Race WarAmerica Compared Race War
America Compared Race War
blueAE86
 
Essays should have a clear argument supported by evidence from the.docx
Essays should have a clear argument supported by evidence from the.docxEssays should have a clear argument supported by evidence from the.docx
Essays should have a clear argument supported by evidence from the.docx
SANSKAR20
 
Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...
Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...
Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...
AJHSSR Journal
 
How Comfort Women Speak Yale Historical Review
How Comfort Women Speak Yale Historical ReviewHow Comfort Women Speak Yale Historical Review
How Comfort Women Speak Yale Historical Review
yalehistoricalreview
 
Cheers for Japanese Athletes The 1932 Los Angeles Olympics an.docx
Cheers for Japanese Athletes The 1932 Los Angeles Olympics an.docxCheers for Japanese Athletes The 1932 Los Angeles Olympics an.docx
Cheers for Japanese Athletes The 1932 Los Angeles Olympics an.docx
mccormicknadine86
 

Similar to T W OThe Internment of AnthropologyWartime Studies of.docx (9)

Philippine History
Philippine HistoryPhilippine History
Philippine History
 
Yoshimitsu Benedict Endō Guilt Shame And The Post War Idea Of Japan
Yoshimitsu  Benedict  Endō Guilt Shame And The Post War Idea Of  JapanYoshimitsu  Benedict  Endō Guilt Shame And The Post War Idea Of  Japan
Yoshimitsu Benedict Endō Guilt Shame And The Post War Idea Of Japan
 
To Win the Peace by Richard Hawkins
To Win the Peace by Richard HawkinsTo Win the Peace by Richard Hawkins
To Win the Peace by Richard Hawkins
 
Learning from shogun_txt
Learning from shogun_txtLearning from shogun_txt
Learning from shogun_txt
 
America Compared Race War
America Compared Race WarAmerica Compared Race War
America Compared Race War
 
Essays should have a clear argument supported by evidence from the.docx
Essays should have a clear argument supported by evidence from the.docxEssays should have a clear argument supported by evidence from the.docx
Essays should have a clear argument supported by evidence from the.docx
 
Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...
Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...
Beyond the Memory of Patriotism: Seeking a Way to Reconcile Patriotism-Memory...
 
How Comfort Women Speak Yale Historical Review
How Comfort Women Speak Yale Historical ReviewHow Comfort Women Speak Yale Historical Review
How Comfort Women Speak Yale Historical Review
 
Cheers for Japanese Athletes The 1932 Los Angeles Olympics an.docx
Cheers for Japanese Athletes The 1932 Los Angeles Olympics an.docxCheers for Japanese Athletes The 1932 Los Angeles Olympics an.docx
Cheers for Japanese Athletes The 1932 Los Angeles Olympics an.docx
 

More from perryk1

Take a few moments to research the contextual elements surrounding P.docx
Take a few moments to research the contextual elements surrounding P.docxTake a few moments to research the contextual elements surrounding P.docx
Take a few moments to research the contextual elements surrounding P.docx
perryk1
 
Table of Contents Section 2 Improving Healthcare Quality from.docx
Table of Contents Section 2 Improving Healthcare Quality from.docxTable of Contents Section 2 Improving Healthcare Quality from.docx
Table of Contents Section 2 Improving Healthcare Quality from.docx
perryk1
 
Take a company and build a unique solution not currently offered. Bu.docx
Take a company and build a unique solution not currently offered. Bu.docxTake a company and build a unique solution not currently offered. Bu.docx
Take a company and build a unique solution not currently offered. Bu.docx
perryk1
 
Tackling a Crisis Head-onThis week, we will be starting our .docx
Tackling a Crisis Head-onThis week, we will be starting our .docxTackling a Crisis Head-onThis week, we will be starting our .docx
Tackling a Crisis Head-onThis week, we will be starting our .docx
perryk1
 
take a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docxtake a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docx
perryk1
 
Table of Contents-Perioperative Care.-Perioperative Med.docx
Table of Contents-Perioperative Care.-Perioperative Med.docxTable of Contents-Perioperative Care.-Perioperative Med.docx
Table of Contents-Perioperative Care.-Perioperative Med.docx
perryk1
 
Take a look at the sculptures by Giacometti and Moore in your te.docx
Take a look at the sculptures by Giacometti and Moore in your te.docxTake a look at the sculptures by Giacometti and Moore in your te.docx
Take a look at the sculptures by Giacometti and Moore in your te.docx
perryk1
 
Table of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docx
Table of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docxTable of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docx
Table of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docx
perryk1
 
Table of Contents Title PageWELCOMETHE VAJRA.docx
Table of Contents Title PageWELCOMETHE VAJRA.docxTable of Contents Title PageWELCOMETHE VAJRA.docx
Table of Contents Title PageWELCOMETHE VAJRA.docx
perryk1
 
Take a few minutes to reflect on this course. How has your think.docx
Take a few minutes to reflect on this course. How has your think.docxTake a few minutes to reflect on this course. How has your think.docx
Take a few minutes to reflect on this course. How has your think.docx
perryk1
 
Taiwan The Tail That Wags DogsMichael McDevittAsia Po.docx
Taiwan The Tail That Wags DogsMichael McDevittAsia Po.docxTaiwan The Tail That Wags DogsMichael McDevittAsia Po.docx
Taiwan The Tail That Wags DogsMichael McDevittAsia Po.docx
perryk1
 
TABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docx
TABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docxTABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docx
TABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docx
perryk1
 
Tackling wicked problems A public policy perspective Ple.docx
Tackling wicked problems  A public policy perspective Ple.docxTackling wicked problems  A public policy perspective Ple.docx
Tackling wicked problems A public policy perspective Ple.docx
perryk1
 
Tahira Longus Week 2 Discussion PostThe Public Administration.docx
Tahira Longus Week 2 Discussion PostThe Public Administration.docxTahira Longus Week 2 Discussion PostThe Public Administration.docx
Tahira Longus Week 2 Discussion PostThe Public Administration.docx
perryk1
 
Tabular and Graphical PresentationsStatistics (exercises).docx
Tabular and Graphical PresentationsStatistics (exercises).docxTabular and Graphical PresentationsStatistics (exercises).docx
Tabular and Graphical PresentationsStatistics (exercises).docx
perryk1
 
Table 4-5 CSFs for ERP ImplementationCritical Success Fact.docx
Table 4-5 CSFs for ERP ImplementationCritical Success Fact.docxTable 4-5 CSFs for ERP ImplementationCritical Success Fact.docx
Table 4-5 CSFs for ERP ImplementationCritical Success Fact.docx
perryk1
 
Table 7.7 Comparative Financial Statistics Universal Office Fur.docx
Table 7.7 Comparative Financial Statistics Universal Office Fur.docxTable 7.7 Comparative Financial Statistics Universal Office Fur.docx
Table 7.7 Comparative Financial Statistics Universal Office Fur.docx
perryk1
 
TableOfContentsTable of contents with hyperlinks for this document.docx
TableOfContentsTable of contents with hyperlinks for this document.docxTableOfContentsTable of contents with hyperlinks for this document.docx
TableOfContentsTable of contents with hyperlinks for this document.docx
perryk1
 
Tajfel and Turner (in chapter two of our reader) give us the followi.docx
Tajfel and Turner (in chapter two of our reader) give us the followi.docxTajfel and Turner (in chapter two of our reader) give us the followi.docx
Tajfel and Turner (in chapter two of our reader) give us the followi.docx
perryk1
 
tabOccupational Safety & Health for Technologists, Enginee.docx
tabOccupational Safety & Health for Technologists, Enginee.docxtabOccupational Safety & Health for Technologists, Enginee.docx
tabOccupational Safety & Health for Technologists, Enginee.docx
perryk1
 

More from perryk1 (20)

Take a few moments to research the contextual elements surrounding P.docx
Take a few moments to research the contextual elements surrounding P.docxTake a few moments to research the contextual elements surrounding P.docx
Take a few moments to research the contextual elements surrounding P.docx
 
Table of Contents Section 2 Improving Healthcare Quality from.docx
Table of Contents Section 2 Improving Healthcare Quality from.docxTable of Contents Section 2 Improving Healthcare Quality from.docx
Table of Contents Section 2 Improving Healthcare Quality from.docx
 
Take a company and build a unique solution not currently offered. Bu.docx
Take a company and build a unique solution not currently offered. Bu.docxTake a company and build a unique solution not currently offered. Bu.docx
Take a company and build a unique solution not currently offered. Bu.docx
 
Tackling a Crisis Head-onThis week, we will be starting our .docx
Tackling a Crisis Head-onThis week, we will be starting our .docxTackling a Crisis Head-onThis week, we will be starting our .docx
Tackling a Crisis Head-onThis week, we will be starting our .docx
 
take a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docxtake a look at the latest Presidential Order that relates to str.docx
take a look at the latest Presidential Order that relates to str.docx
 
Table of Contents-Perioperative Care.-Perioperative Med.docx
Table of Contents-Perioperative Care.-Perioperative Med.docxTable of Contents-Perioperative Care.-Perioperative Med.docx
Table of Contents-Perioperative Care.-Perioperative Med.docx
 
Take a look at the sculptures by Giacometti and Moore in your te.docx
Take a look at the sculptures by Giacometti and Moore in your te.docxTake a look at the sculptures by Giacometti and Moore in your te.docx
Take a look at the sculptures by Giacometti and Moore in your te.docx
 
Table of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docx
Table of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docxTable of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docx
Table of ContentsLOCAL PEOPLE PERCEPTION TOWARDS SUSTAINABLE TOU.docx
 
Table of Contents Title PageWELCOMETHE VAJRA.docx
Table of Contents Title PageWELCOMETHE VAJRA.docxTable of Contents Title PageWELCOMETHE VAJRA.docx
Table of Contents Title PageWELCOMETHE VAJRA.docx
 
Take a few minutes to reflect on this course. How has your think.docx
Take a few minutes to reflect on this course. How has your think.docxTake a few minutes to reflect on this course. How has your think.docx
Take a few minutes to reflect on this course. How has your think.docx
 
Taiwan The Tail That Wags DogsMichael McDevittAsia Po.docx
Taiwan The Tail That Wags DogsMichael McDevittAsia Po.docxTaiwan The Tail That Wags DogsMichael McDevittAsia Po.docx
Taiwan The Tail That Wags DogsMichael McDevittAsia Po.docx
 
TABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docx
TABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docxTABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docx
TABLE 1-1 Milestones of Medicine and Medical Education 1700–2015 ■.docx
 
Tackling wicked problems A public policy perspective Ple.docx
Tackling wicked problems  A public policy perspective Ple.docxTackling wicked problems  A public policy perspective Ple.docx
Tackling wicked problems A public policy perspective Ple.docx
 
Tahira Longus Week 2 Discussion PostThe Public Administration.docx
Tahira Longus Week 2 Discussion PostThe Public Administration.docxTahira Longus Week 2 Discussion PostThe Public Administration.docx
Tahira Longus Week 2 Discussion PostThe Public Administration.docx
 
Tabular and Graphical PresentationsStatistics (exercises).docx
Tabular and Graphical PresentationsStatistics (exercises).docxTabular and Graphical PresentationsStatistics (exercises).docx
Tabular and Graphical PresentationsStatistics (exercises).docx
 
Table 4-5 CSFs for ERP ImplementationCritical Success Fact.docx
Table 4-5 CSFs for ERP ImplementationCritical Success Fact.docxTable 4-5 CSFs for ERP ImplementationCritical Success Fact.docx
Table 4-5 CSFs for ERP ImplementationCritical Success Fact.docx
 
Table 7.7 Comparative Financial Statistics Universal Office Fur.docx
Table 7.7 Comparative Financial Statistics Universal Office Fur.docxTable 7.7 Comparative Financial Statistics Universal Office Fur.docx
Table 7.7 Comparative Financial Statistics Universal Office Fur.docx
 
TableOfContentsTable of contents with hyperlinks for this document.docx
TableOfContentsTable of contents with hyperlinks for this document.docxTableOfContentsTable of contents with hyperlinks for this document.docx
TableOfContentsTable of contents with hyperlinks for this document.docx
 
Tajfel and Turner (in chapter two of our reader) give us the followi.docx
Tajfel and Turner (in chapter two of our reader) give us the followi.docxTajfel and Turner (in chapter two of our reader) give us the followi.docx
Tajfel and Turner (in chapter two of our reader) give us the followi.docx
 
tabOccupational Safety & Health for Technologists, Enginee.docx
tabOccupational Safety & Health for Technologists, Enginee.docxtabOccupational Safety & Health for Technologists, Enginee.docx
tabOccupational Safety & Health for Technologists, Enginee.docx
 

Recently uploaded

The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
heathfieldcps1
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
Prof. Dr. K. Adisesha
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
ImMuslim
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
Nguyen Thanh Tu Collection
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
Mohammad Al-Dhahabi
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
Celine George
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
giancarloi8888
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
RamseyBerglund
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
سمير بسيوني
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
Celine George
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
nitinpv4ai
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
MJDuyan
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
nitinpv4ai
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
TechSoup
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
Celine George
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
siemaillard
 

Recently uploaded (20)

The basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptxThe basics of sentences session 7pptx.pptx
The basics of sentences session 7pptx.pptx
 
Data Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsxData Structure using C by Dr. K Adisesha .ppsx
Data Structure using C by Dr. K Adisesha .ppsx
 
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
Geography as a Discipline Chapter 1 __ Class 11 Geography NCERT _ Class Notes...
 
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
CHUYÊN ĐỀ ÔN TẬP VÀ PHÁT TRIỂN CÂU HỎI TRONG ĐỀ MINH HỌA THI TỐT NGHIỆP THPT ...
 
skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)skeleton System.pdf (skeleton system wow)
skeleton System.pdf (skeleton system wow)
 
How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17How Barcodes Can Be Leveraged Within Odoo 17
How Barcodes Can Be Leveraged Within Odoo 17
 
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdfREASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
REASIGNACION 2024 UGEL CHUPACA 2024 UGEL CHUPACA.pdf
 
Electric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger HuntElectric Fetus - Record Store Scavenger Hunt
Electric Fetus - Record Store Scavenger Hunt
 
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdfمصحف القراءات العشر   أعد أحرف الخلاف سمير بسيوني.pdf
مصحف القراءات العشر أعد أحرف الخلاف سمير بسيوني.pdf
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17How to Manage Reception Report in Odoo 17
How to Manage Reception Report in Odoo 17
 
Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)Oliver Asks for More by Charles Dickens (9)
Oliver Asks for More by Charles Dickens (9)
 
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) CurriculumPhilippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
Philippine Edukasyong Pantahanan at Pangkabuhayan (EPP) Curriculum
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10Haunted Houses by H W Longfellow for class 10
Haunted Houses by H W Longfellow for class 10
 
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
Elevate Your Nonprofit's Online Presence_ A Guide to Effective SEO Strategies...
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17How to Download & Install Module From the Odoo App Store in Odoo 17
How to Download & Install Module From the Odoo App Store in Odoo 17
 
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptxPrésentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
Présentationvvvvvvvvvvvvvvvvvvvvvvvvvvvv2.pptx
 

T W OThe Internment of AnthropologyWartime Studies of.docx

  • 1. T W O The Internment of Anthropology: Wartime Studies of Japanese Culture On the one hand we dogmatically insist that anthropology rests on ethno- graphic research involving personal, prolonged interaction with the Other. But then we pronounce upon the knowledge gained from such research a discourse which construes the Other in terms of distance, spatial and temporal. The Oth- er’s empirical presence turns into his theoretical absence, a conjuring trick . . . to keep the Other outside the Time of anthropology.—Johannes Fabian, Time and the Other In War Without Mercy, historian John Dower’s 1986 book on the racial discourses that informed the war between Japan and the United States, there is a fleeting but vitally important point about the terms of the na-
  • 2. tional perception of Japanese Americans.1 ‘‘The treatment of Japanese Americans,’’ Dower begins, ‘‘is a natural starting point for any study of the racial aspects of the war, for it reveals not merely the clear- cut racial stigmatization of the Japanese, but also the oªcial endorsement this received’’ (79). He then concludes that the key to understanding the terms of their treatment rests in the oªcial program of ‘‘community analysis’’ or ethnographic study that the War Relocation Authority (wra) ‘‘established in the ten camps in which Japanese- Americans were incarcerated’’ (79). Although Dower does not elaborate on the possible implications of community analysis, the ambitions of com- munity analysts were well documented at the time, and they revolved around using interviews with the internees in an e¤ort to develop theo- ries of Japanese behavior that would be useful after the war when the United States occupied Japan. Thus, anthropology’s central role in the Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019
  • 3. 44 A N A B S E N T P R E S E N C E ‘‘treatment’’ of Japanese American internees begins to suggest some- thing of the truth of Johannes Fabian’s argument quoted in the epi- graph to this chapter—that anthropology makes its Other (in this case, Japanese Americans) by using information gathered from ‘‘personal, prolonged interaction’’ in an e¤ort to set the Other beyond the spatial and temporal realm of the examiner (in occupied Japan) and, thus, ‘‘keep the Other outside the Time of anthropology.’’2 The work of the mostly liberal, white camp anthropologists or ‘‘community analysts,’’ as they were oªcially known, was beset with problems peculiar to the national and institutional politics of the war, a fact that complicates the ways in which Japanese Americans were ultimately constructed as ra- cial Others. American anthropological studies of internment became not just another example of the American propensity for seeing Japa- nese Americans as Japanese aliens, but more important, the studies be- came a clearinghouse for certain transitions in the deployment and power of anthropological theories about Asian Americans that were to have serious, long-term e¤ects on the self-concept and political status
  • 4. of Japanese Americans. Beneath the circuits of influence and layers of obfuscation, community analysis programs allowed liberal, white an- thropologists unparalleled power to reconstruct the Nisei in particular. Government records indicate that during the early years of World War II the wra, which was initially established to administer intern- ment or relocation camps housing more than one hundred thousand West Coast Japanese Americans, created the community analysis pro- gram to assist in the administration of the internment camps. Termed the ‘‘community analysis section,’’ it began at Poston camp in Arizona and eventually involved the assignment of social scientists as govern- ment agents in each of the ten internment camps.3 Most of the social scientists involved were anthropologists whose chief qualification was their knowledge of and interest in Japanese cultural and behavioral pat- terns, although only a handful had ever actually visited Japan.4 As com- munity analysts they were primarily responsible for ensuring the smooth operation of camp life. But while stationed in the camps they were also explicitly encouraged to utilize Japanese American internees as informants on Japanese culture in the hope that the data
  • 5. collected might prove useful not only to the ongoing war e¤ort against Japan but also to the postwar e¤ort as well. The government hoped for insights useful for the control of both international and domestic Japanese com- munities: the reformation of Japan in the postwar period as well as the resettlement of Japanese Americans after the war.5 Or, as Dower puts Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019 T H E I N T E R N M E N T O F A N T H R O P O L O G Y 45 it, ‘‘observations based on work with these persecuted and uprooted Americans were superimposed upon the growing collective portrait of the Japanese enemy, and several social scientists who worked in the camps went on to participate directly in psychological-warfare plan- ning pertaining to Japan.’’6 In truth, however, the relationship between the data drawn from community analysis and theories of Japanese character was even more complicated. Once the project was underway, some anthropologists be-
  • 6. gan to recognize that the recruitment of dispossessed Japanese Ameri- cans as informants on Japanese culture occurred under such unique domestic conditions of suspicion and uncertainty that the uses of com- munity analysis in postwar Japan must, at the very least, be compro- mised. The anthropologists’ reservations about simply transferring methods of regulating camp life to the occupation of Japan were often explicit, especially as they begin to see their job as that of correcting misconceptions about Japanese Americans by highlighting their dif- ficult ordeal during the war and promoting their chances for successful reintegration after the war. Ultimately, the relationship between Japa- nese Americans and Japanese cultural studies departed significantly from its founding intentions. Rather than simply using the internees as a resource for information on Japan, the anthropologists very quickly became invested in drawing conclusions about Japanese behav- ior that could be applied to a program of readjustment for Japanese Americans. Community analysts paradoxically found themselves will- ing to concede that the population was an ‘‘alien’’ culture in order to develop an acceptable argument for their assimilability. Thus, despite the obvious dilemmas posed by this loose exchange and
  • 7. substitution of data, the anthropologists continued to pursue the assumption that theories of Japanese behavior and policies for reforming Japan after the war might be confirmed and tested through ‘‘prolonged’’ analyses and observations of imprisoned Japanese Americans. The immediate, his- torical reasons for the liberal anthropologists’ willingness to view the terms ‘‘Japanese’’ and ‘‘Japanese American’’ as interchangeable also followed in the tradition of early national sociological studies of ‘‘the oriental problem,’’ which represented the peculiar American founda- tions of managing national anxieties about the ‘‘oriental’’ Other by reconstructing this ‘‘inscrutable’’ presence as an American in the making. Scholars have only just recently begun to piece together the elabo- rate politics of internment anthropology that I synopsize here. Despite Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019 46 A N A B S E N T P R E S E N C E
  • 8. the fact that the cultural anthropologists’ participation in the adminis- tration of the Japanese American internment was public knowledge during the war years, it is only in the past decade that this fraught part of the history of American anthropology has been deemed a watershed in the conceptualization of the Japanese American subject.7 Peter Su- zuki’s work in the early and mid-1980s was groundbreaking in this re- gard, because he was the first to catalog the ethical and scientific prob- lems suggested by thewra’s administration of the camps. In a series of essays on the role of internment politics in the development of wartime anthropology, Suzuki argues, among other things, that ‘‘anthropology in the wra camp was misapplied because it was largely used to control and manipulate the inmates.’’8 Suzuki’s work was followed by Orin Starn’s 1986 essay, ‘‘Engineering Internment: Anthropologists and the War Relocation Authority,’’ a thoughtful and comprehensive over- view of the motivations, processes, and results of the anthropologists’ misguided attempts to help Japanese American internees. Although Starn acknowledges that the analysts were stationed in the camps in order to gather data against Japan and to identify potential
  • 9. problems, he also focuses on the paradoxical means by which the anthropologists tried to use their positions to speak on behalf of the incarcerated. He concludes that despite ‘‘their good intentions of improving camp con- ditions and defusing anti-Japanese public opinion,’’ (700),wra anthro- pologists ultimately produced work and followed policies that ‘‘unin- tentionally’’ promoted racial stereotypes about the Japanese and, by implication, the Japanese Americans as well. Starn’s impressive analy- sis remains indispensable for its synthesis of the evolution of the an- thropologists’ work in the internment camps. In his essay he also reit- erates Suzuki’s contention that the scholarly neglect of the meaning of camp analysis has deprived American anthropologists of the opportu- nity for important insights into the development of postwar theories of culture and behavior: It continually struck me how little the basic views of wra ethnographers about their role in relocation have altered over the years. Historical changes have not inspired the kind of public self-examination found, for
  • 10. example, in the discussions of British anthropologists about their rela- tion to colonialism. . . . Continued convictions of having contributed to Japanese-American well-being in troubled times and to the war e¤ort more generally would have to be the starting points for such an analysis. (717) Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019 T H E I N T E R N M E N T O F A N T H R O P O L O G Y 47 Echoes of Dower resound in Starn’s description of the anthropologists’ treatment of Japanese Americans as ‘‘starting points’’ for the under- standing of American attitudes about the Japanese. Starn seems to sug- gest that Americans must come to grips with the extent of the anthro- pologists’ participation in projecting Japanese Americans as an ‘‘alien’’ ethnic group in need of reformation, an enterprise that evokes an ear- lier, Western colonial paternalism.
  • 11. Around the same time that Starn’s work was published, Yuji Ichioka organized a two-day conference on the internment titled ‘‘Views From Within: The Japanese American Wartime Internment Experience,’’ held at the University of California at Berkeley, the center for the origi- nal Japanese Evacuation and Resettlement Study (jers). The book that came out of the conference gathered a wide-ranging series of essays on the politics of camp anthropology, essays that testify to the fact that the impact of community analysis is still being felt, although it is not by any means fully accounted for.9 Like Dower, Suzuki, and Starn, Ichioka and the conference participants found themselves focused on the an- thropological studies conducted in the camps as ‘‘the basis of a rich so- cial history of concentration camp life’’ (22), but they also revealed the diªculty of categorizing the e¤ects of community analysis. ‘‘It goes without saying,’’ Ichioka concludes, with his characteristic cynicism, ‘‘that jers was not a research project in the service of a political cause on behalf of Japanese-Americans. To say that it should have been is to engage in wishful thinking; to criticize it for not having been is to be naı̈ ve’’ (23). Although the disastrous e¤ects of the tendency to
  • 12. view Japanese American culture as Japanese have been widely noted and have enriched numerous histories and memoirs of the period of Japa- nese American internment, postwar and Asian American critics have clearly just started to address the impact of anthropology’s study of Jap- anese Americans’ internment and resettlement.10 Still, as noted earlier by Dower, the underlying implications of the fact that theories of Japanese behavior were explicitly confirmed or tested by the administration of Japanese American internees remain unspoken. It is time to explain how the liberal anthropologists’ confla- tion of Japanese American and Japanese culture allowed them not just to use an imprisoned population as a scientific resource but also to show how their reports from the camps reiterated earlier notions about Asians as ‘‘oriental Others’’ in America in an e¤ort to revitalize the be- lief in an assimilable Japanese Other. More specifically, scrutiny of the Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019
  • 13. 48 A N A B S E N T P R E S E N C E work of the camp anthropologists suggests parallels between the ear- lier focus on Asian Americans as ‘‘marginal men’’ and the wartime ob- session with the split character of the Japanese American Nisei. De- spite their stress on presentism and their suspicion of historicism, cultural anthropologists recast the concept of the Asian American as the ‘‘marginal man’’ as one of Japanese ‘‘duality.’’ According to Robert Park, who coined his definition in 1928, the ‘‘marginal man’’ was the result of global movement and cross-cultural contact, which created the conditions for the emergence of the alienated immigrant individual caught between two distinct cultures.11 This concept metamorphosed into the wartime anthropologists’ concerns with Japanese ‘‘duality,’’ [the peculiar presence of warring impulses in an individual,] as they tried to show how the dualistic Japanese American might be pushed further toward the American pole. Community analysts argued that the presence of a tense generational struggle between Issei and Nisei internees was caused by the vestiges of a lingering, archaic Japanese character typified by the Issei, which the Nisei had to turn away
  • 14. from in order to progress toward full assimilation. As a result, the anthropol- ogists determined to utilize the ancient filial piety of Japanese culture as a means of spatially and temporally fixing the problem of Japanese Americans, a problem that, thus parsed, inevitably necessitated their forced movement toward another more modern and thus American ex- istence. Not coincidentally, this process of othering a group in space and time in order to create the imperative of colonial reformation was similarly deployed in occupied Japan, where the aim was to break the old, patriarchal Japanese traditions and replace them with a model of American democratic capitalism. In the end, however, the community analysis project was ultimately responsible for extending the ‘‘prob- lem’’ of Japanese American di¤erence by aªrming the resilience of Japanese culture and, thus, maintaining the constructed alienation of the Nisei. ‘‘Experience in Such Colonies’’: Establishing the Camp Analysis Project Mass hysteria in the wake of Pearl Harbor provoked widespread sus- picion of Japanese Americans. Historian Michi Weglyn reveals that
  • 15. in February 1942, President Roosevelt signed Executive Order 9066, thereby acting against the findings of the prewar Munson Report, Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019 T H E I N T E R N M E N T O F A N T H R O P O L O G Y 49 which had determined that ‘‘there is no Japanese problem on the Coast.’’ This order designated much of the West Coast a ‘‘military area,’’ and hence extended to the military carte blanche the power to remove any and all individuals of ‘‘a potentially dangerous’’ nature. Even though the order did not specify Japanese Americans for special scrutiny, they emerged as the order’s intended target and remain the only ethnic group evacuated en masse under suspicion of disloyalty.12 Ronald Takaki concludes that in signing Executive Order 9066 Roose- velt had in e¤ect ‘‘signed a blank check, giving full authority to General DeWitt to evacuate the Japanese and place them in assembly centers and eventually in internment camps.’’13 Despite the fact that almost
  • 16. two-thirds of the evacuees were U.S. citizens—Nisei who had been born and, in many cases, reared on the West Coast—a number of high- ranking government oªcials urged Roosevelt forward in the belief that, as Secretary of War Harry Stimson put it, ‘‘their racial characteris- tics are such that we cannot understand or trust even the citizen Japa- nese.’’14 Within a year, virtually every West Coast Japanese American was sent to one of several remote relocation centers where he or she was oªcially quarantined and questioned to determine if imprison- ment in even more isolated internment camps, reserved for those deemed disloyal and a threat to national security, was warranted. Ten relocation centers, often called ‘‘camps’’ even though they were sup- posed to be merely holding centers, were eventually established. A central part of the task of assessing and containing Japanese American internees fell to the group of government social scientists who became part of the wra’s administration of the camps. As com- munity analysts and as part of the Camp Analysts Section, or cas, their explicit duties in the camps were to assess levels of residual ‘‘Japanese attitudes,’’ including and especially the evacuated population’s varying levels of loyalty to the United States; to recommend and direct govern-
  • 17. ment administration of the camps, including future plans for perma- nently relocating evacuees away from their lifelong homes in the West; and, later, to study the viability of training and using Japanese Ameri- cans as go-betweens in occupied areas of the Pacific.15 Archival evi- dence reveals that the decision to place analysts in the camps was ratio- nalized not only as a domestic necessity for the purposes of discovering how to deal with the unique problems represented by Japanese Ameri- cans, but also as a means of studying and confirming theories of Japa- nese behavioral patterns. Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019 50 A N A B S E N T P R E S E N C E In an early memorandum from John Embree, the anthropologist who ran the cas from Washington, D.C., to General J. L. DeWitt, Em- bree writes: ‘‘It is believed that various evacuees in the Japanese reloca- tion centers possess information regarding Japanese social, political, economic and labor conditions which can be of great value in the prose-
  • 18. cution of the war.’’16 Although Embree clearly refers to Kibei, those Jap- anese Americans who had been born in the United States but educated in Japan, camp analysts regularly dealt with and depended on others in the camps as well. By 1944, Embree had broadened the initial focus on the Kibei to state simply that the evacuees were used as resources for camp analysts from ‘‘the time the administration was first set up.’’ He also became more specific about the general uses of the data collected in the camps, saying, ‘‘the section was expected not only to be informed on social conditions in relocation centers but also on the social organi- zation of the West Coast Japanese before the war, and on that abstruse phenomenon called ‘Japanese psychology’ ’’ (278). Here, the emphasis on historical context, on the specific social con- ditions a¤ecting Japanese Americans, is in large measure the enduring legacy of Franz Boas, who established the terms for cross- cultural analysis as early as 1887 when, in response to Otis Mason’s Social Dar- winist view of the evolution of all cultures as governed by natural or biological laws, Boas argued for the necessity of historical specificity in assessing the culture of any people.17 It is interesting to note that even
  • 19. Boas was not immune to such views. He entertained the validity of the physiological basis for comparison of cultures in his early theories of race and culture, even once acknowledging that some races were, at least in the then present day, ‘‘inherently’’ inferior to others. At the close of his career, however, he would adamantly insist that cultural di¤erences were ‘‘dependent upon historical causes, regardless of race.’’18 Although Boas and those who studied with him accepted that historical and social forces were the ultimate source of cultural di¤er- ences, the debate did not entirely eliminate the resort to racial stereo- typing in some cases. Embree’s and perhaps others’ willingness to con- sider that Japanese Americans might represent both a unique culture and yet remain direct symbols of a distant Japanese culture was indi- rectly influenced by this tendency in American social scientists’ work on race and culture. John Embree saw no conflict between his Boasnian adherence to the historical foundations of culture and his casual asser- tion that with Japanese Americans ‘‘recommendations on labor rela- Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user
  • 20. on 29 May 2019 T H E I N T E R N M E N T O F A N T H R O P O L O G Y 51 tions, mess operations, etc., to be accepted, usually had to be made in terms of Japanese psychology rather than of prosaic labor- management relations.’’19 The implementation of Japanese Americans as a resource for the study of Japan continued to develop under the auspices of Em- bree and anthropologist Alexander Leighton, the very first analyst in- stalled at one of the camps. When unrest broke out in the Poston, Ari- zona, camp in 1942, it was decided that cultural anthropologists might be useful in resolving the di¤erences between camp administrators and camp residents.20 Thus, Embree’s approach to the so-called prob- lem of Japanese American status was shaped by his unselfconscious application of Boas’s earlier arguments about racial di¤erences. Yet Embree, and Alexander Leighton in particular, were also com- pelled by the work of those social scientists who followed in Boas’s wake to develop new theories that further explained the social and cul- tural origins of interracial contact and also suggested how solutions to
  • 21. the problem might be achieved. Chief among these problems was the question of the future role of Asian immigrants in American society. In a recent work, historian Henry Yu points out that ‘‘the ‘oriental prob- lem’ in the 1920s created a set of ideas that structured the way that Asians were understood and the way they were given a meaningful place in American society.’’21 Robert Park was the most influential pro- ponent of ‘‘the oriental problem,’’ which he perceived as a prob- lem of assimilation because ‘‘the ‘oriental’ in America was still an ex- otic oddity, foreign and seemingly unassimilated.’’22 According to Yu, Park theorized that such ‘‘an enormous cultural distance separated Western culture from ‘Oriental’ culture’’ that the universal cycle of contact, competition, conflict, accommodation, and assimilation was not allowed to develop.23 Thus, the greatest task facing the social scien- tist was to determine how to move the ‘‘oriental’’ Other further along in the cycle so that he or she might achieve full assimilation. More than any other single camp analyst, Alexander Leighton was vital to enunciating a set of strategies for dealing with the perceived ‘‘assimilation problem’’ of the Japanese American subject. He spent
  • 22. fifteen months, from June 1942 to September 1943, at Poston, a camp in Arizona in the Colorado River Valley, which was the first to use social scientists to observe Japanese American camp behavior. Not surpris- ingly, Leighton was also among the first to suggest publicly that ana- lysts’ experiences in the camps should play a major role in the nation’s administration of the postwar reconstruction of Asia. John Embree, as Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz user on 29 May 2019 52 A N A B S E N T P R E S E N C E head of the wra, viewed Leighton’s anthropological project at Poston as the model for the installation of community analysts in every one of the camps housing evacuated Japanese Americans.24 Because commu- nity analysis in the camps hinged on the presumption of the direct use- fulness of Japanese Americans as informants on Japanese culture, Em- bree and Leighton were often compelled to focus on the similarities between internment and the expected postwar dislocation of Japa-
  • 23. nese citizens. Any conclusions they might draw about the cultural dif- ferences that Park had theorized as preventing Asian Americans’ as- similation in America had to be applicable to the occupation e¤ort in postwar Japan. Although camp analysts did not in practice mistake Jap- anese Americans for Japanese, in theory they did rely from the start on viewing the government’s administration of Japanese American dis- placement as a direct analogue for the military’s later occupation of Ja- pan. As a result of this reliance, the anthropologists’ observations and opinions regarding the administration of internment were later quite influential in developing and confirming theories of the best way to manage Japanese di¤erences and, as a ‘‘natural’’ extension, the best means of restructuring Japanese American subjectivity to achieve Park’s final stage of assimilation. In hindsight, the disastrous e¤ects of such a fundamental oversight seem glaring, and it is important to recall that these ramifications were barely considered in the first public description of the camp analysis project and its aims. Although the project may now appear a rather ob- vious instance of social engineering, one that seems stamped with the
  • 24. imperialism of an earlier age, Leighton—perhaps also reflecting impe- rialist rationalizations—believed his work would ultimately achieve the liberation of his subjects. In July 1942, Leighton published an essay titled ‘‘Training Social Scientists for Post-War Conditions,’’ just as he was assuming his position at Poston. In this work, he outlines an opti- mistic plan for the use of social scientists during and after the war, in which he cites the invaluable benefits of the ‘‘practical application’’ of their results.25 After providing a synopsis of his experiences in ‘‘an Es- kimo village in Alaska’’ as an example of how the social scientist could be ‘‘both an observer and a social doctor to a community’’ and utilize the information gathered toward ‘‘the development of better living and better relations,’’ he suggests that ‘‘there are many similar opportuni- ties in the United States under the widespread administration of the Oªce of Indian A¤airs’’ (27–29). His statement refers to the Poston Downloaded from https://read.dukeupress.edu/books/chapter- pdf/88386/9780822380832-003.pdf by University of California Santa Cruz …
  • 25. INFORMATION GOVERNANCE Founded in 1807, John Wiley & Sons is the oldest independent publishing company in the United States. With offi ces in North America, Europe, Asia, and Australia, Wiley is globally committed to developing and marketing print and electronic products and services for our customers’ professional and personal knowledge and understanding. The Wiley CIO series provides information, tools, and insights to IT executives and managers. The products in this series cover a wide range of topics that supply strategic and implementation guidance on the latest technology trends, leadership, and emerging best practices. Titles in the Wiley CIO series include: The Agile Architecture Revolution: How Cloud Computing, REST-Based SOA, and Mobile Computing Are Changing Enterprise IT by Jason BloombergT Big Data, Big Analytics: Emerging Business Intelligence and Analytic Trends for Today’s Businesses by Michael Minelli, Michele Chambers, and Ambiga Dhiraj
  • 26. The Chief Information Offi cer’s Body of Knowledge: People, Process, and Technology by Dean Lane CIO Best Practices: Enabling Strategic Value with Information Technology (Second Edition) by Joe Stenzel, Randy Betancourt, Gary Cokins, Alyssa Farrell, Bill Flemming, Michael H. Hugos, Jonathan Hujsak, and Karl Schubert The CIO Playbook: Strategies and Best Practices for IT Leaders to Deliver Value by Nicholas R. Colisto Enterprise Performance Management Done Right: An Operating System for Your Organization by Ron Dimon Executive’s Guide to Virtual Worlds: How Avatars Are Transforming Your Business and Your Brand by Lonnie Bensond IT Leadership Manual: Roadmap to Becoming a Trusted Business Partner by Alan R. r Guibord Managing Electronic Records: Methods, Best Practices, and Technologies by Robert F. s Smallwood On Top of the Cloud: How CIOs Leverage New Technologies to Drive Change and Build Value Across the Enterprise by Hunter Muller
  • 27. Straight to the Top: CIO Leadership in a Mobile, Social, and Cloud-based World (Second Edition) by Gregory S. Smith Strategic IT: Best Practices for Managers and Executives by Arthur M. Langer ands Lyle Yorks Transforming IT Culture: How to Use Social Intelligence, Human Factors, and Collaboration to Create an IT Department That Outperforms by Frank Wanders Unleashing the Power of IT: Bringing People, Business, and Technology Together by Dan Roberts The U.S. Technology Skills Gap: What Every Technology Executive Must Know to Save America’s Future by Gary J. Beach Information Governance: Concepts, Strategies and Best Practices by Robert F. Smallwoods Robert F. Smallwood INFORMATION GOVERNANCE CONCEPTS, STRATEGIES AND BEST PRACTICES
  • 28. Cover image: © iStockphoto / IgorZh Cover design: Wiley Copyright © 2014 by Robert F. Smallwood. All rights reserved. Chapter 7 © 2014 by Barclay Blair Portions of Chapter 8 © 2014 by Randolph Kahn Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600, or on the Web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifi cally disclaim any implied warranties of
  • 29. merchantability or fi tness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profi t or any other commercial damages, including but not limited to special, incidental, consequential, or other damages. For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002. Wiley publishes in a variety of print and electronic formats and by print-on-demand. Some material included with standard print versions of this book may not be included in e-books or in print-on-demand. If this book refers to media such as a CD or DVD that is not included in the version you purchased, you may download this material at http://booksupport.wiley.com. For more information about Wiley products, visit www.wiley.com. Library of Congress Cataloging-in-Publication Data: Smallwood, Robert F., 1959- Information governance : concepts, strategies, and best practices / Robert F. Smallwood. pages cm. — (Wiley CIO series) ISBN 978-1-118-21830-3 (cloth); ISBN 978-1-118-41949-6 (ebk); ISBN 978-1-118-42101-7 (ebk) 1. Information technology—Management. 2. Management information systems. 3. Electronic
  • 30. records—Management. I. Title. HD30.2.S617 2014 658.4’038—dc23 2013045072 Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 http://www.copyright.com http://www.wiley.com/go/permissions http://booksupport.wiley.com http://www.wiley.com For my sons and the next generation of tech-savvy managers vii CONTENTS PREFACE xv ACKNOWLEDGMENTS xvii PA RT O N E — Information Governance Concepts, Defi nitions, and Principles 1p
  • 31. C H A P T E R 1 The Onslaught of Big Data and the Information Governance Imperative 3 Defi ning Information Governance 5 IG Is Not a Project, But an Ongoing Program 7 Why IG Is Good Business 7 Failures in Information Governance 8 Form IG Policies, Then Apply Technology for Enforcement 10 Notes 12 C H A P T E R 2 Information Governance, IT Governance, Data Governance: What’s the Difference? 15 Data Governance 15 IT Governance 17 Information Governance 20 Impact of a Successful IG Program 20 Summing Up the Differences 21 Notes 22 C H A P T E R 3 Information Governance Principles 25 Accountability Is Key 27 Generally Accepted Recordkeeping Principles® 27
  • 32. Contributed by Charmaine Brooks, CRM Assessment and Improvement Roadmap 34 Who Should Determine IG Policies? 35 Notes 38 PA RT T W O — Information Governance Risk Assessment and Strategic Planning 41g g C H A P T E R 4 Information Risk Planning and Management 43 Step 1: Survey and Determine Legal and Regulatory Applicability and Requirements 43 viii CONTENTS Step 2: Specify IG Requirements to Achieve Compliance 46 Step 3: Create a Risk Profi le 46 Step 4: Perform Risk Analysis and Assessment 48 Step 5: Develop an Information Risk Mitigation Plan 49 Step 6: Develop Metrics and Measure Results 50 Step 7: Execute Your Risk Mitigation Plan 50 Step 8: Audit the Information Risk Mitigation Program 51
  • 33. Notes 51 C H A P T E R 5 Strategic Planning and Best Practices for Information Governance 53 Crucial Executive Sponsor Role 54 Evolving Role of the Executive Sponsor 55 Building Your IG Team 56 Assigning IG Team Roles and Responsibilities 56 Align Your IG Plan with Organizational Strategic Plans 57 Survey and Evaluate External Factors 58 Formulating the IG Strategic Plan 65 Notes 69 C H A P T E R 6 Information Governance Policy Development 71 A Brief Review of Generally Accepted Recordkeeping Principles® 71 IG Reference Model 72 Best Practices Considerations 75 Standards Considerations 76 Benefi ts and Risks of Standards 76 Key Standards Relevant to IG Efforts 77
  • 34. Major National and Regional ERM Standards 81 Making Your Best Practices and Standards Selections to Inform Your IG Framework 87 Roles and Responsibilities 88 Program Communications and Training 89 Program Controls, Monitoring, Auditing and Enforcement 89 Notes 91 PA RT T H R E E — Information Governance Key Impact Areas Based on the IG Reference Model 95p C H A P T E R 7 Business Considerations for a Successful IG Program 97 By Barclay T. Blair Changing Information Environment 97 CONTENTS ix Calculating Information Costs 99 Big Data Opportunities and Challenges 100 Full Cost Accounting for Information 101 Calculating the Cost of Owning Unstructured Information 102
  • 35. The Path to Information Value 105 Challenging the Culture 107 New Information Models 107 Future State: What Will the IG-Enabled Organization Look Like? 110 Moving Forward 111 Notes 113 C H A P T E R 8 Information Governance and Legal Functions 115 By Robert Smallwood with Randy Kahn, Esq., and Barry Murphy Introduction to e-Discovery: The Revised 2006 Federal Rules of Civil Procedure Changed Everything 115 Big Data Impact 117 More Details on the Revised FRCP Rules 117 Landmark E-Discovery Case: Zubulake v. UBS Warburg 119 E-Discovery Techniques 119 E-Discovery Reference Model 119 The Intersection of IG and E-Discovery 122 By Barry Murphy Building on Legal Hold Programs to Launch Defensible
  • 36. Disposition 125 By Barry Murphy Destructive Retention of E-Mail 126 Newer Technologies That Can Assist in E-Discovery 126 Defensible Disposal: The Only Real Way To Manage Terabytes and Petabytes 130 By Randy Kahn, Esq. Retention Policies and Schedules 137 By Robert Smallwood, edited by Paula Lederman, MLS Notes 144 C H A P T E R 9 Information Governance and Records and Information Management Functions 147 Records Management Business Rationale 149 Why Is Records Management So Challenging? 150 Benefi ts of Electronic Records Management 152 Additional Intangible Benefi ts 153 Inventorying E-Records 154 Generally Accepted Recordkeeping Principles® 155 E-Records Inventory Challenges 155 x CONTENTS
  • 37. Records Inventory Purposes 156 Records Inventorying Steps 157 Ensuring Adoption and Compliance of RM Policy 168 General Principles of a Retention Scheduling 169 Developing a Records Retention Schedule 170 Why Are Retention Schedules Needed? 171 What Records Do You Have to Schedule? Inventory and Classifi cation 173 Rationale for Records Groupings 174 Records Series Identifi cation and Classifi cation 174 Retention of E-Mail Records 175 How Long Should You Keep Old E-Mails? 176 Destructive Retention of E-Mail 177 Legal Requirements and Compliance Research 178 Event-Based Retention Scheduling for Disposition of E-Records 179 Prerequisites for Event-Based Disposition 180 Final Disposition and Closure Criteria 181 Retaining Transitory Records 182
  • 38. Implementation of the Retention Schedule and Disposal of Records 182 Ongoing Maintenance of the Retention Schedule 183 Audit to Manage Compliance with the Retention Schedule 183 Notes 186 C H A P T E R 10 Information Governance and Information Technology Functions 189 Data Governance 191 Steps to Governing Data Effectively 192 Data Governance Framework 193 Information Management 194 IT Governance 196 IG Best Practices for Database Security and Compliance 202 Tying It All Together 204 Notes 205 C H A P T E R 11 Information Governance and Privacy and Security Functions 207 Cyberattacks Proliferate 207 Insider Threat: Malicious or Not 208
  • 39. Privacy Laws 210 Defense in Depth 212 Controlling Access Using Identity Access Management 212 Enforcing IG: Protect Files with Rules and Permissions 213 CONTENTS xi Challenge of Securing Confi dential E-Documents 213 Apply Better Technology for Better Enforcement in the Extended Enterprise 215 E-Mail Encryption 217 Secure Communications Using Record-Free E-Mail 217 Digital Signatures 218 Document Encryption 219 Data Loss Prevention (DLP) Technology 220 Missing Piece: Information Rights Management (IRM) 222 Embedded Protection 226 Hybrid Approach: Combining DLP and IRM Technologies 227 Securing Trade Secrets after Layoffs and Terminations 228 Persistently Protecting Blueprints and CAD Documents 228
  • 40. Securing Internal Price Lists 229 Approaches for Securing Data Once It Leaves the Organization 230 Document Labeling 231 Document Analytics 232 Confi dential Stream Messaging 233 Notes 236 PA RT F O U R — Information Governance for Delivery Platforms 239y C H A P T E R 12 Information Governance for E-Mail and Instant Messaging 241 Employees Regularly Expose Organizations to E-Mail Risk 242 E-Mail Polices Should Be Realistic and Technology Agnostic 243 E-Record Retention: Fundamentally a Legal Issue 243 Preserve E-Mail Integrity and Admissibility with Automatic Archiving 244 Instant Messaging 247 Best Practices for Business IM Use 247 Technology to Monitor IM 249
  • 41. Tips for Safer IM 249 Notes 251 C H A P T E R 13 Information Governance for Social Media 253 By Patricia Franks, Ph.D, CRM, and Robert Smallwood Types of Social Media in Web 2.0 253 Additional Social Media Categories 255 Social Media in the Enterprise 256 Key Ways Social Media Is Different from E-Mail and Instant Messaging 257 Biggest Risks of Social Media 257 Legal Risks of Social Media Posts 259 xii CONTENTS Tools to Archive Social Media 261 IG Considerations for Social Media 262 Key Social Media Policy Guidelines 263 Records Management and Litigation Considerations for Social Media 264 Emerging Best Practices for Managing Social Media Records
  • 42. 267 Notes 269 C H A P T E R 14 Information Governance for Mobile Devices 271 Current Trends in Mobile Computing 273 Security Risks of Mobile Computing 274 Securing Mobile Data 274 Mobile Device Management 275 IG for Mobile Computing 276 Building Security into Mobile Applications 277 Best Practices to Secure Mobile Applications 280 Developing Mobile Device Policies 281 Notes 283 C H A P T E R 15 Information Governance for Cloud Computing 285 By Monica Crocker CRM, PMP, CIP, and Robert Smallwood Defi ning Cloud Computing 286 Key Characteristics of Cloud Computing 287 What Cloud Computing Really Means 288
  • 43. Cloud Deployment Models 289 Security Threats with Cloud Computing 290 Benefi ts of the Cloud 298 Managing Documents and Records in the Cloud 299 IG Guidelines for Cloud Computing Solution s 300 Notes 301 C H A P T E R 16 SharePoint Information Governance 303 By Monica Crocker, CRM, PMP, CIP, edited by Robert Smallwood Process Change, People Change 304 Where to Begin the Planning Process 306 Policy Considerations 310
  • 44. Roles and Responsibilities 311 Establish Processes 312 Training Plan 313 Communication Plan 313 Note 314 CONTENTS xiii PA RT F I V E — Long-Term Program Issues 315g g C H A P T E R 17 Long-Term Digital Preservation 317 By Charles M. Dollar and Lori J. Ashley Defi ning Long-Term Digital Preservation 317 Key Factors in Long-Term Digital Preservation 318 Threats to Preserving Records 320
  • 45. Digital Preservation Standards 321 PREMIS Preservation Metadata Standard 328 Recommended Open Standard Technology-Neutral Formats 329 Digital Preservation Requirements 333 Long-Term Digital Preservation Capability Maturity Model® 334 Scope of the Capability Maturity Model 336 Digital Preservation Capability Performance Metrics 341 Digital Preservation Strategies and Techniques 341 Evolving Marketplace 344 Looking Forward 344 Notes 346 C H A P T E R 18 Maintaining an Information Governance
  • 46. Program and Culture of Compliance 349 Monitoring and Accountability 349 Staffi ng Continuity Plan 350 Continuous Process Improvement 351 Why Continuous Improvement Is Needed 351 Notes 353 A P P E N D I X A Information Organization and Classifi cation: Taxonomies and Metadata 355 By Barb Blackburn, CRM, with Robert Smallwood; edited by Seth Earley Importance of Navigation and Classifi cation 357 When Is a New Taxonomy Needed? 358 Taxonomies Improve Search Results 358
  • 47. Metadata and Taxonomy 359 Metadata Governance, Standards, and Strategies 360 Types of Metadata 362 Core Metadata Issues 363 International Metadata Standards and Guidance 364 Records Grouping Rationale 368 Business Classifi cation Scheme, File Plans, and Taxonomy 368 Classifi cation and Taxonomy 369 xiv CONTENTS Prebuilt versus Custom Taxonomies 370 Thesaurus Use in Taxonomies 371
  • 48. Taxonomy Types 371 Business Process Analysis 377 Taxonomy Testing: A Necessary Step 379 Taxonomy Maintenance 380 Social Tagging and Folksonomies 381 Notes 383 A P P E N D I X B Laws and Major Regulations Related to Records Management 385 United States 385 Canada 387 By Ken Chasse, J.D., LL.M. United Kingdom 389 Australia 391 Notes 394
  • 49. A P P E N D I X C Laws and Major Regulations Related to Privacy 397 United States 397 Major Privacy Laws Worldwide, by Country 398 Notes 400 GLOSSARY 401 ABOUT THE AUTHOR 417 ABOUT THE MAJOR CONTRIBUTORS 419 INDEX 421 xv PREFACE I
  • 50. nformation governance (IG) has emerged as a key concern for business executives and managers in today’s environment of Big Data, increasing information risks, co- lossal leaks, and greater compliance and legal demands. But few seem to have a clear understanding of what IG is; that is, how you defi ne what it is and is not, and how to implement it. This book clarifi es and codifi es these defi nitions and provides key in- sights as to how to implement and gain value from IG programs. Based on exhaustive research, and with the contributions of a number of industry pioneers and experts, this book lays out IG as a complete discipline in and of itself for the fi rst time. IG is a super-discipline that includes components of several key fi elds: law, records management, information technology (IT), risk management, privacy and security, and business operations. This unique blend calls for a new breed of information pro- fessional who is competent across these established and quite
  • 51. complex fi elds. Training and education are key to IG success, and this book provides the essential underpinning for organizations to train a new generation of IG professionals. Those who are practicing professionals in the component fi elds of IG will fi nd the book useful in expanding their knowledge from traditional fi elds to the emerging tenets of IG. Attorneys, records and compliance managers, risk managers, IT manag- ers, and security and privacy professionals will fi nd this book a particularly valuable resource. The book strives to offer clear IG concepts, actionable strategies, and proven best practices in an understandable and digestible way; a concerted effort was made to simplify language and to offer examples. There are summaries of key points through- out and at the end of each chapter to help the reader retain major points. The text is organized into fi ve parts: (1) Information Governance Concepts, Defi nitions, and
  • 52. Principles; (2) IG Risk Assessment and Strategic Planning; (3) IG Key Impact Areas; (4) IG for Delivery Platforms; and (5) Long-Term Program Issues. Also included are appendices with detailed information on taxonomy and metadata design and on re- cords management and privacy legislation. One thing that is sure is that the complex fi eld of IG is evolving. It will continue to change and solidify. But help is here: No other book offers the kind of compre- hensive coverage of IG contained within these pages. Leveraging the critical advice provided here will smooth your path to understanding and implementing successful IG programs. Robert F. Smallwood xvii
  • 53. ACKNOWLEDGMENTS I would like to sincerely thank my colleagues for their support and generous contribu- tion of their expertise and time, which made this pioneering text possible. Many thanks to Lori Ashley, Barb Blackburn, Barclay Blair, Charmaine Brooks, Ken Chasse, Monica Crocker, Charles M. Dollar, Seth Earley, Dr. Patricia Franks, Randy Kahn, Paula Lederman, and Barry Murphy. I am truly honored to include their work and owe them a great debt of gratitude. PA RT O N E Information
  • 54. Governance Concepts, Defi nitions, and Principles 3 The Onslaught of Big Data and the Information Governance Imperative C H A P T E R 1 T he value of information in business is rising, and business leaders are more and more viewing the ability to govern, manage, and harvest information as critical to success. Raw data is now being increasingly viewed as an asset that can be
  • 55. leveraged, just like fi nancial or human capital.1 Some have called this new age of “Big Data” the “industrial revolution of data.” According to the research group Gartner, Inc., Big Data is defi ned as “high-volume, high-velocity and high-variety information assets that demand cost-effective, inno- vative forms of information processing for enhanced insight and decision making.” 2 A practical defi nition should also include the idea that the amount of data—both struc- tured (in databases) and unstructured (e.g., e-mail, scanned documents) is so mas- sive that it cannot be processed using today’s database tools and analytic software techniques. 3 In today’s information overload era of Big Data—characterized by massive growth in business data volumes and velocity—the ability to distill key insights from enor- mous amounts of data is a major business differentiator and source of sustainable com-
  • 56. petitive advantage. In fact, a recent report by the World Economic Forum stated that data is a new asset class and personal data is “the new oil.” 4 And we are generating more than we can manage effectively with current methods and tools. The Big Data numbers are overwhelming: Estimates and projections vary, but it has been stated that 90 percent of the data existing worldwide today was created in the last two years 5 and that every two days more information is generated than was from the dawn of civilization until 2003. 6 This trend will continue: The global market for Big Data technology and services is projected to grow at a compound annual rate of 27 percent through 2017, about six times faster than the general information and com- munications technology (ICT) market. 7 Many more comparisons and statistics are available, and all demonstrate the incredible and continued growth of data. Certainly, there are new and emerging opportunities arising
  • 57. from the accu- mulation and analysis of all that data we are busy generating and collecting. New enterprises are springing up to capitalize on data mining and business intelligence opportunities. The U.S. federal government joined in, announcing $200 million in Big Data research programs in 2012.8 4 INFORMATION GOVERNANCE Big Data values massive accumulation of data, whereas in business, e-discovery realities and potential legal liabilities dictate that data be culled to only that which has clear business value. But established organizations, especially larger ones, are being crushed by this onslaught of Big Data: It is just too expensive to keep all the information that is being generated, and unneeded information is a sort of irrelevant sludge for decision makers
  • 58. to wade through. They have diffi culty knowing which information is an accurate and meaningful “wheat” and which is simply irrelevant “chaff.” This means they do not have the precise information they need to base good business decisions upon. And all that Big Data piling up has real costs: The burden of massive stores of information has increased storage management costs dramatically, caused overloaded systems to fail, and increased legal discovery costs. 9 Further, the longer that data is kept, the more likely that it will need to be migrated to newer computing platforms, driving up conversion costs; and legally, there is the risk that somewhere in that mountain of data an organization stores is a piece of information that represents a signifi cant legal liability.10 This is where the worlds of Big Data and business collide . For Big Data proponents, more data is always better, and there is no perceived downside to accumulation of mas-
  • 59. sive amounts of data. In the business world, though, the realities of legal e-discovery mean the opposite is true. 11 To reduce risk, liability, and costs, it is critical for unneeded information to be disposed of in a systematic, methodical, and “legally defensible” (jus- tifi able in legal proceedings) way, when it no longer has legal, regulatory, or business value. And there also is the high-value benefi t of basing decisions on better, cleaner data, which can come about only through rigid, enforced information governance (IG) policies that reduce information glut. Organizations are struggling to reduce and right-size their information footprint by discarding superfl uous and redundant data, e-documents, and information. But the critical issue is devising policies, methods, and processes and then deploying information technol- ogy (IT) to sort through which information is valuable and which no longer has business value and can be discarded. IT, IG, risk, compliance, and legal representatives in
  • 60. organizations have a clear sense that most of the information stored is unneeded, raises costs, and poses risks. According to a survey taken at a recent Compliance, Governance and Oversight Counsel summit, respondents estimated that approximately 25 percent of information stored in organizations has real business value, while 5 percent must be kept as busi- ness records and about 1 percent is retained due to a litigation hold. “This means that The onslaught of Big Data necessitates that information governance (IG) be implemented to discard unneeded data in a legally defensible way. THE ONSLAUGHT OF BIG DATA AND THE INFORMATION GOVERNANCE IMPERATIVE 5 [about] 69 percent of information in most companies has no business, legal, or regulatory value. Companies that are able to dispose of this data debris return
  • 61. more profi t to sharehold- ers, can leverage more of their IT budgets for strategic investments, and can avoid excess expense in legal and regulatory response” (emphasis added). 12 With a smaller information footprint , organizations can more easily fi nd what they tt need and derive business value from it.13 They must eliminate the data debris regularly and consistently, and to do this, processes and systems must be in place to cull valuable information and discard the data debris daily. An IG program sets the framework to accomplish this. The business environment has also underscored the need for IG. According to Ted Friedman at Gartner, “The recent global fi nancial crisis has put information gov- ernance in the spotlight. . . . [It] is a priority of IT and business leaders as a result of various pressures, including regulatory compliance mandates and the urgent need for improved decision-making.” 14
  • 62. And IG mastery is critical for executives: Gartner predicts that by 2016, one in fi ve chief information offi cers in regulated industries will be fi red from their jobs for failed IG initiatives. s 15 Defi ning Information Governance IG is a sort of super discipline that has emerged as a result of new and tightened legislation governing businesses, external threats such as hacking and data breaches, and the recog- nition that multiple overlapping disciplines were needed to address today’s information management challenges in an increasingly regulated and litigated business environment.16 IG is a subset of corporate governance, and includes key concepts from re- cords management, content management, IT and data governance, information se- curity, data privacy, risk management, litigation readiness, regulatory compliance, long-term digital preservation , and even business intelligence. This also means
  • 63. that it includes related technology and discipline subcategories, such as document management, enterprise search, knowledge management, and business continuity/ disaster recovery. Only about one quarter of information organizations are managing has real business value. With a smaller information footprint, it is easier for organizations to fi nd the information they need and derive business value from it. IG is a subset of corporate governance. 6 INFORMATION GOVERNANCE IG is a sort of superdiscipline that encompasses a variety of key concepts from a variety of related disciplines. Practicing good IG is the essential foundation for building
  • 64. legally defensible disposition practices to discard unneeded information and to secure confi dential in- formation, which may include trade secrets, strategic plans, price lists, blueprints, or personally identifi able information (PII) subject to privacy laws; it provides the basis for consistent, reliable methods for managing data, e- documents, and records. Having trusted and reliable records, reports, data, and databases enables managers to make key decisions with …