SlideShare a Scribd company logo
1 of 65
ITS 833 – INFORMATION GOVERNANCE
Chapter 7
Dr. Omar Mohamed
Copyright @ Omar Mohamed 2019
1
1
Chapter Goals and Objectives
What is the difference between structured
What is the difference between unstructured and semi-structured
information?
Why is unstructured data so challenging?
Copyright @ Omar Mohamed 2019
2
Generally, what is full cost accounting (FCA)?
What are the 10 key factors that drive the total cost of
ownership of unstructured data
How can we better manage information?
How would an IG enabled organization look different from one
that is not IG enabled?
2
The Business Case for
Information Governance
Difficult to Justify
Short term return on investment is nonexistent
Long term view is essential
Reduce exposure to risk over time
Improve quality and security of information
Streamlining information retention
Looking at Information Costs differently
Copyright @ Omar Mohamed 2019
3
3
The information environment
Challenges of Unstructured Information
Data volumes are growing
“Unstructured Information” is growing at a dramatic rate
Challenges unique to unstructured information
Horizontal nature
Lack of formality
Management location
Identification of ownership
Classification
Copyright @ Omar Mohamed 2019
4
Calculating Information Costs
Rising Storage Costs (Short sighted thinking)
Labor (particularly knowledge workers)
Overhead costs
Costs of e-discovery and litigation
Opportunity Costs
4
Full Cost Accounting for
Information Models
Total Cost of Ownership (TCO) Model
Return on Investment Model (ROI)
Full Cost Accounting Model (FCA)
Past, Present, Future Costs
Direct Costs
Indirect Costs
Flexible Application
Triple Bottom Line Accounting – Monetary, Environment,
Societal Costs
Copyright @ Omar Mohamed 2019
5
Full Cost Accounting
General and Administrative Costs
Productivity Gains and Losses
Legal and E-discovery costs
Indirect Costs
Up-Front Costs
Future Costs
5
The politics involved
Tools needed to establish facts about the information
environment
SOURCES OF Costs of owning unstructured information, cost
reducers, and cost enhancers
Giving unstructured information value
The IG enabled organization
The End
Copyright @ Omar Mohamed 2019
11
11
ITS 833 – INFORMATION GOVERNANCE
Chapter 6
Information Governance policy development
Dr. Omar Mohamed
Copyright @ Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Know the 8 Generally Accepted Recordkeeping Principles®
What is the IG Reference Model?
What does the IGRM Diagram consist of?
What are the best practice considerations?
What is the benefits and risks of having standards?
What are the key standards relevant to IG
Copyright @ Omar Mohamed 2019
2
2
A Review of the 8 Generally Accepted
Recording Keeping Principles®
Accountability
Transparency
Integrity
Protection
Compliance
Availability
Retention
Disposition
So…what is the significance of these principles?
Copyright @ Omar Mohamed 2019
3
3
IG REFERENCE MODEL
Who?
ARMA International & CGOC
When?
2012
Where?
As part of the EDRM Project Version 3.0
Why?
To foster the adoption by facilitating communication and
collaboration between IG stakeholder functions, legal, records
management, risk management, and business unit stakeholders.
Copyright @ Omar Mohamed 2019
4
4
HOW TO INTERPRET THE IGRM DIAGRAM
Outer Ring: Complex set of interoperable processes and
implementing he procedures and structural element to put them
into practice
Requirements:
Understanding of business imperatives
Knowledge of appropriate tools and infrastructure
Sensitivity to legal and regulatory obligations
Inner Ring: Depicts a work-flow (life-cycle) diagram. Shows
that information management is important at all stages of the
lifecycle
Copyright @ Omar Mohamed 2019
5
5
How the IGRM Diagram related to the
Generally Accepted Recordkeeping Principles®
Support the ARMA Principle by identifying the cross-functional
groups of IG stakeholders
Depicts the intersecting objectives of the organization
Depicts the relationship duty, value and information assets
Used by proactive organizations as an introspective lens to
facilitate visualization, understanding and discussion
concerning how to apple the “Principles” to the organization.
Puts focus on the “Principles”
Provides essential context for the maturity model
Copyright @ Omar Mohamed 2019
6
6
Considerations in IG Policy Formation
Best Practices?
YES!
Understand that Best Practices will vary per organization
Review 25 generic Best Practices, Pages 75 and 76 of text book
Copyright @ Omar Mohamed 2019
7
Standards?
YES!
Two types to consider
De Jure Standards - Legal standards published by standards
setting bodies such as IOS, ANSI, NIST, BTS and others
De Facto Standards – Informal standards regarded by many as
actual standards – arising through popular use (Example:
Windows in the business world in 2001-2010). May be
published by formal standards setting bodies without having
“Formal” status
7
Benefits and Risks of Standards
Benefits
Quality Assurance Support
Interoperability Support
Implementation Framework and Certification Checklists
Cost Reduction
International Consensus
Copyright @ Omar Mohamed 2019
8
Risks
Possible Decreased Flexibility
Standards Confusion
Real-World Shortcomings to due Theoretical Basis
Cost and Maintenance Involving in Updating Standard
8
KEY STANDARDS RELEVANT TO IG
Risk Management
ISO 31000-2009 – States principles and generic guidelines of
risk management applicable to IG
Provides a structured framework for development and
implementation of risk management strategies and programs
“Risk Management Framework”: Set of two basic components
(foundations and organizational arrangements) that support and
sustain risk management throughout the organization.
Copyright @ Omar Mohamed 2019
9
9
KEY STANDARDS RELEVANT TO IG
Information Security Management
ISO/IEC 27001:2005- Information Security Management System
Standard that provides guidance in development of security
controls for protection of information assets
Flexible –can be applied to different activities and processes
Includes use of standards by auditors and stakeholders
ISO/IEC 27002:2005-Information Technology-Security
Techniques-Code of Practice for Information Security
Establishes guidelines and general principle for initiating,
implementing, maintaining and improving information security
mgt.
Includes Best Practices of Control Objectives in 11 key areas of
information security management
ISO/IE 38500:2008 –International Standard for high-level
principle and guidance for senior executives and directors, and
advisors for effective and efficient use of IT
Three major sections
Scope, Application and Objectives
Framework for Good Corporate Governance of IT
Guidance for Corporate Governance of IT
Copyright @ Omar Mohamed 2019
10
10
KEY STANDARDS RELEVANT TO IG
RECORDS AND E-RECORDS MANAGEMENT
ISO 15489-1:2001 and ISO 15489-2:2001– International
Standard for Records Management
Part 1:Provides a framework and high-level overview of RM
core principles
Part 1:Defines RM as “Field of management responsibility for
the efficient and systematic control of creation receipt,
maintenance, use and disposition of records, including
processes for capturing and maintaining evidence of and
information about business activities and transactions in the
form of records”1
Part 2: Technical Specifications and Methodology for
implementing standard
ISO 30300;2011 – Information and Documentation-Management
Systems for Records-Fundamentals and Vocabulary
ISO 30301:2011 – Information and Documentation-Management
Systems for Records – Requirements
1ISO 15489-1:2001 Information and Documentation-Records
Management, Part 1:General Geneva: ISO, 2001), section 3.16.
Copyright @ Omar Mohamed 2019
11
11
NATIONAL, INTERNATIONAL AND REGIONAL ERM
STANDARDS
United States E-Records Standard
U.S. DOD 5015.2 Design Criteria Standard For Electronic
Records Management Software Applications
Developed in 1997
Updated in 2002 and 2007
Canadian Standards
Electronic Records as Documentary Evidence CAN/CGSB-
72.34-2005
Microfilm and Electronic Images as Documentary Evidence
CAN/DGSB-72.11-93
Canadian Legal Considerations
Relies on prime directive-that an organization shall always be
prepared to produce its records as evidence- and its national
standards, for the admissibility of electronic records in court
proceedings
The admissibility of records as evidence is determined under the
business records provisions of the Evidence Act
Copyright @ Omar Mohamed 2019
12
12
NATIONAL, INTERNATIONAL AND REGIONAL ERM
STANDARDS…CONTINUED
United Kingdom
The National Archives
To sets of functions requirements to promote the development
of the electronic records management software market (one in
1999 and one in 2002)
Model Requirements of Electronic Records
MoReq2
MoReq2010
Australian ERM and Records Management Standards
Has consistently been world leader in this area
Adopted all three parts of ISO 16175 as its e-records standard
Australian Government Recordkeeping Metadata Standard
Version 2.0
Australian Government Locator Service
AS 5090:2003 – Work Process Analysis for Recordkeeping
Copyright @ Omar Mohamed 2019
13
13
LONG-TERM DIGITAL PRESERVATION
Referred to as “LTDP”
LTDP is a key area for IG policy development
Frequently not addressed in an IG plan
Should be applied in preserving historical and “vital records”
and in order to maintain its corporate or organizational memory
Key Standards for LTDP:
PDF/A-2 –official standard format for preserving electronic
documents, developed by Adobe.
ISO 19005-1:2005 Document Management is the published
specification requiring PDF format
ISO 14721:2012 – Space Data and Information Transfer
Systems –Open Archival Information Systems
ISO TR 18492(2005) – Long Term Preservation of Electronic
Document Based Information
ISO 16363:2012 – Space Data and Information Transfer
Systems-Audit and Certification of Trustworthy Digital
Repositories
Copyright @ Omar Mohamed 2019
14
14
BUSINESS CONTINUITY MANAGEMENT
ISO 22301:2012 – Societal Security – Business Continuity
Management Systems Requirements
Specifies requirements for creating and implementing a
standardized approach to business continuity management -----
this is also known as Disaster Recovery
Benefits of ISO 22301
Threat Identification and Assessment
Threat and Recovery Planning
Mission-critical process protection
Stakeholder Confidence
Copyright @ Omar Mohamed 2019
15
15
THINGS TO REMEMBER IN DEVELOPING THE IG POLICY
Take into account organizational goals
Draw clear lines of authority
Make sure you have an executive sponsor who can garner
executive support for the IG program and policies
IG program must contain communications and training
component
Stakeholders must be made aware of new policies and practices
Make sure you have metrics that are relevant and useful and can
actually be measured
Test and audit
Give feedback to employees based upon metrics, tests and audit
results
Establish and enforce clear penalties for policy violations and
communicate that to employees
Take into account organizational culture
Copyright @ Omar Mohamed 2019
16
16
The End
Copyright @ Omar Mohamed 2019
17
17
ITS 833 – INFORMATION GOVERNANCE
Chapter 1 – The Onslaught of Big Data and Information
Governance Imperative
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Define or identify what is meant by “Big Data”
What is the practical effects and problems associated with Big
Data
Solution
to the Big Data problem
Defining Information Governance (“IG”)
Why we do not incorporate IG into everyday business
Advantage of IG
Effects of not incorporating IG
General approach to implementing IG
Copyright Omar Mohamed 2019
2
2
What is “Big Data”?
It is a business asset capable of being leveraged.
“High-volume, high-velocity and high-variety information that
demands cost-effective innovative forms of information
processing for enhanced insight and decision making”
A combination of both structured and unstructured data that is
so massive that it cannot be processed using today’s database
tools and analytical software techniques.
Copyright Omar Mohamed 2019
3
3
What is the practical effect of “Big Data”?
Whether or not a business enterprise will be able to sustain a
competitive advantage will depend on the business’ ability to
manipulate the large amount of data in a way that it to
differentiate itself.
Estimates are that 90% of the data existing today was created
over the pat two years.
Big Data and related technology and services are projected to
grow at a compound annual rate of approximately 27% - leading
to new opportunities for data mining and business intelligence.
Copyright Omar Mohamed 2019
4
4
Issues Related to Big Data
Expense –Only about 25% of data stored has real business
value, 5% more is required to be maintained for legal reasons,
1% retained due to litigation hold, leaving about 69% with no
real value.
A great deal of irrelevant information
Increased storage costs
System failures
Legal costs
Conversion costs
Copyright Omar Mohamed 2019
5
5
SOLUTION TO BIG DATA PROBLEMS?
Information Governance
Rigid
Enforced
Creates a smaller “information footprint”
Allows business to more easily find what they need and derive
business value from it
Copyright Omar Mohamed 2019
6
6
So…What is “Information Governance”?
It is discipline that emerged out of necessity…
Subset of corporate governance
Merged from records management, content management,
information technology, data governance, information security,
data privacy, risk management, litigation readiness, regulatory
compliance, data preservation and business intelligence
It is the way by which an organization manages the totality of
its information
A strategic framework composed of standards, processes, roles,
and metrics that hold organizations and individuals accountable
to create, organize, secure, maintain, use and dispose of
information in ways that align with and contribute to the
organizations goals. (Association of Records Management and
Administrators)Glossary of Records and Information
Management Terms, 4th Ed., 2012, TR 22-2012)
Copyright Omar Mohamed 2019
7
7
WHY INCORPORATE “IG”?
We can’t keep everything forever
We can’t throw everything away
E-discovery
Employees want it
It improves information delivery and improves productivity
It does not get easier to do over time
Legal requirements
Helps mitigate information management risk
E-mail
Copyright Omar Mohamed 2019
8
8
WHY DON’T WE INCORPORATE “IG”?
Cost
Lack of understanding
Lack of support from top
Copyright Omar Mohamed 2019
9
9
FAILURES OF INFORMATION GOVERNANCE?
Theft of valuable information
Inability to protect personal, private information
Breaches in legal requirements
Loss of trade secrets
Public reputation damage
Copyright Omar Mohamed 2019
10
10
Approaches to Implementing IG
Form proper IG policies first
Review existing policy…if any
Implement an awareness policy
Develop an approach
Project approach vs. Strategic program
Identify governance body or steering committee
Apply appropriate technologies for enforcement
Copyright Omar Mohamed 2019
11
11
Thank You
Copyright Omar Mohamed 2019
12
12
ITS 833 – INFORMATION
GOVERNANCE
Chapter 2 – Information Governance, IT Governance, Data
Governance: What’s the Difference?
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Distinguish between Data Governance, Information Governance
and Information Technology Governance and be able to define
or explain each
How to increase the likelihood of success of a data governance
program
Identify IT Governance Frameworks
Identify the impact of a successful IG program
Copyright Omar Mohamed 2019
2
What is “Data Governance”?
Includes processes and controls to ensure that information at the
data level – raw data- is true, accurate and unique.
Involves data cleansing and de-duplication
Focus is on information quality
Hybrid quality control discipline
Data quality
Data management
IG policy development
Business process improvement
Compliance
Risk Management
Copyright Omar Mohamed 2019
3
3
How can you improve data governance success ?
Identify a measurable impact
Assign accountability for data quality to a business unit
Recognize the uniqueness of data as an asset
Forget the past-use a forward going strategy
Management the Change
Copyright Omar Mohamed 2019
4
WHAT IS INFORMATION TECHNOLOGY GOVERNANCE?
Primary way that stakeholders can ensure that investments in IT
create business value and contribute to business objectives
Function to improve IT performance and deliver optimum
business value and ensure regulatory compliance
Focus is on making IT efficient and effective
Copyright Omar Mohamed 2019
5
5
IT Governance Framework(s)
CobiT® - Control Objective for Information and Related
Technology
ValIT®
ITIL
ISO/IEC38500:2008
Copyright Omar Mohamed 2019
6
6
CobIT®
Three Basic Organizational Levels/Responsibilities
Board of Directors and Executive Management
IT and Business Management
Line-Level Governance
Divided into four (4) IT Domains
Plan and Organize
Acquire and Implement
Deliver and Support
Monitor and Evaluate
Includes 34 processes and 210 Control Objectives
ISO 17799
Compatible with IT Infrastructure Library (ITIL)
Process oriented IT governance framework
Codeveloped by IT Governance Institute and ISACA
Focus on:
Business Risks
Control Requirements
Compliance
Technical Issues
Under continuous refinement
Copyright Omar Mohamed 2019
7
ValIT®
Value Oriented Framework
Compatible and complimentary with CobiT®
Focus is on leveraging IT investments for maximum value
40 Essential Management Practices (same as CobiT® control
objectives)
Supports three processes:
Value Governance
Portfolio Management
Investment Management
Copyright Omar Mohamed 2019
8
8
ITIL – Information Technology Infrastructure Library
Process Oriented
Developed in United Kingdom
Applicable to both public and private sector
Most widely accepted approach to IT service management in the
world
Focus is on providing guidance to organizations on how to use
IT as a tool to facilitate business change, transformation and
growth
Foundation for ISO/IEC 20000
Five Volumes that map IT service cycle as follows:
ITIL Service Strategy
ITIL Service Design
ITIL Service Transition
ITIL Service Operation
ITIL Continual Service Improvement
Copyright Omar Mohamed 2019
9
9
ISO/IEC 38500:2008
International Standard
Focus is on high-level principles for senior executives, directors
and advisors of IT
Applies to the governance of management processes that are
performed at the IT service level
Three main sections:
Scope, Application and Objectives
Framework for Good Corporate Governance of IT
Guidance for Corporate Governance of IT
Copyright Omar Mohamed 2019
10
10
INFORMATION GOVERNANCE
A part of “Corporate Governance” which is the highest level of
governance of an organization
Processes which are at a higher level than data governance or IT
governance
Contains and includes both data governance and IT governance
Approach focuses on controlling the information that is
generated by IT systems, rather than the detailed IT o data
capture and quality control processes
Goal is to manage and control information assets to lower risk,
ensure compliance with regulations and improve information
quality and accessibility while implementing security measure
to protect and preserve information that has business value
Copyright Omar Mohamed 2019
11
IMPACT OF SUCCESSFUL INFORMATION GOVERNANCE
Enable the use of common terms across the enterprise
Development of standard definitions and terms
Map Information creation and usage
Who
Which
When
Where
Information Confidentiality
Integrity
Validity
Accuracy
Quality
Harvest and Leverage Information
Copyright Omar Mohamed 2019
12
DIFFERENCES BETWEEN IG, ITG AND DG
Information Governance
Overarching policies and processes to optimize and leverage
information while keeping it secure and meeting legal and
privacy obligations that are consistent with organizational
objectives.
Higher level approach, incorporating IT Governance and Data
Governance
IT Governance
Following established frameworks and best practices to gain the
most leverage and benefit from IT investments and support
accomplishment of business objectives
Data Governance
Consists of processes methods and techniques to ensure that
data is of high quality, reliable and unique so that its results are
trusted and accurate
Copyright Omar Mohamed 2019
13
RELATIONSHIP BETWEEN COROPRATE GOVERNANCE,
INFORMATION GOVERNANCE, IT GOVERNANCE AND
DATA GOVERNANCE
Copyright Omar Mohamed 2019
14
Information Governance
IT Governance
Data Governance
Corporate Governance
Thank You
Copyright Omar Mohamed 2019
15
15
ITS 833 – INFORMATION GOVERNANCE
Chapter 3 – Information Governance Principles
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
CHAPTER GOALS AND OBJECTIVES
Know the 10 key principles of IG
What are the Generally Accepted Recordkeeping Principles®
What is the difference between disposition and destruction
Who should be involved in the information governance
development process
Know the 8 GAR principle
Know the 5 GAR Principle Levels
Know which of the four area(s) of improvement each of the 8
GAR principles map to
Copyright Omar Mohamed 2019
2
10 key principles for the IG approach
Executive Sponsorship
Information Policy Development and Communication
Information Integrity
Information Organization and Classification
Information Security
Information Accessibility
Information Control
Information Governance Monitoring and Auditing
Stakeholder Consultation
Continuous Improvement
Copyright Omar Mohamed 2019
3
3
The Key to Information Governance
Accountability
Copyright Omar Mohamed 2019
4
Often the root of many problems is that no one is held
accountable
RECORDING KEEPING PRINCIPLES®
Formal Business records account for about 9% of all
information in an organization
Formal record keeping allows the organization to demonstrate
legal compliance, and applicable standards
Generally Accepted Recordkeeping Principles® were developed
in 2009 by ARMA International to foster awareness of good
recordkeeping practices
Copyright Omar Mohamed 2019
5
5
Generally Accepted Recordkeeping Principles®
Accountability
Transparency
Integrity
Protection
Compliance
Availability
Retention
Disposition
Copyright Omar Mohamed 2019
6
6
GAR Principles Levels
Used to define the characteristics of evolving and maturing
Records Management Programs
1. Standard – whether recordkeeping concerns are being
addressed
2. In Development – developing recognition that recordkeeping
has an impact and benefit from more defined IG program
3. Essential – where defined policies and procedures exist that
address minimum legal and regulatory requirements but more
action is required to improve recordkeeping
4. Proactive – where information governance issues are
integrated into business decisions with organization consistently
meeting its legal and regulatory obligations
5. Transformational – Integrated IG into corporate
infrastructure and business processes to such an extent that
compliance is routine
Copyright Omar Mohamed 2019
7
7
RM responsibility at the senior level of executive authority
Understanding of regulatory and legal framework
Responsibility for ensuring that processes, procedures and
governance structures and documentation are developed
Development of organization wide audit process for all aspects
of RM
Reinforce compliance and require accountability
GAR PRINCIPLE 1: ACCOUNTABILITY
Copyright Omar Mohamed 2019
8
Practices that document processes and promote an
understanding of the roles and responsibilities of the
stakeholders
Policies are formalized and integrated into business processes
Must be recognized by senior management
Employees must have access to the policies and procedures of
RM
Employee training
Documentation in the form of policies, procedures, guidelines,
instructions, diagrams, flowcharts, system documentation, user
manuals, etc.
GAR PRINCIPLE 2: TRANSPARENCY
Copyright Omar Mohamed 2019
9
“Record Integrity”: The records are complete and protected
from being altered
Record generating systems and repositories are required to be
assessed to determine record keeping capabilities.
Here a formalized process is required to be in place for
acquiring or developing new systems, required for lifecycle
management of records.
Record integrity is confirmed by ensuring that records are
created by competent authority based upon established
principles
GAR PRINCIPLE 3:INTEGRITY
Copyright Omar Mohamed 2019
10
This is where organizations ensure that the records are unaltered
through loss, tampering or corruption
Applies to both physical and electronic records
GAR PRINCIPLE 4: PROTECTION
Copyright Omar Mohamed 2019
11
There should be a process for development and training of the
fundamentals of compliance monitoring
Compliance monitoring involves reviewing and inspecting
different facets or records management
Compliance monitoring is carried out by audits, whether that be
internal audits, external organizations or by records
management and must be performed routinely
GAR PRINCIPLE 5: COMPLIANCE
Copyright Omar Mohamed 2019
12
Process of evaluating how effectively and efficiently records
and information are stored and retrieved using existing
equipment, networks and software of the organization
Intended to identify current and future requirements and
recommendations for new systems where appropriate
GAR PRINCIPLE 6: AVAILABILITY
Copyright Omar Mohamed 2019
13
This is the function of preserving and maintaining records for
continuing use
A retention schedule is created to identify actions needed to
fulfill requirements for retention and disposal of records and to
identify and establish authority for employees who will be
responsible for retention, destruction and transfer of records
Must identify the scope of the different jurisdictions that
impose control over record in each location where the company
does business
Includes “records appraisal” – process of assessing the value
and risk of records to determine their retention and destruction
requirements-part of records retention schedule
Record retention period – length of time that records should be
retained and actions taken for them to be destroyed or preserved
Document research performed to identify jurisdictional and
legal requirements for record retention
GAR PRINCIPLE 7: RETENTION
Copyright Omar Mohamed 2019
14
Disposition is the last stage in the life cycle of records
When records are required to be retained permanently or on a
long term basis they should be “archived” for preservation
Should be part of record retention schedule
When destroyed, destruction must be in a controlled and secure
manner in accordance with disposal instructions
Document destruction of record
Maintain an audit trail of the destruction of records
Must have someone designated to oversee destruction of records
GAR PRINCIPLE 8: DISPOSITION
Copyright Omar Mohamed 2019
15
Disposition of records is not the same as destruction of records.
Destruction may be one of the disposal options
Methods of Disposition
Discard-Standard for non-confidential records
Shred – Confidential and sensitive records
Archive – For records retained permanently or for long-term
periods
Imaging – Conversion from a physical record to digital images
prior to destruction of paper records
Purge – This involves the removal of material based upon
specific criteria. Generally applicable to structured database
records and applications
Copyright Omar Mohamed 2019
16
16
Generally Accepted Recordkeeping Principles® maturity model
is used to identify a company’s areas in need of improvement.
Principles are mapped to four (4) improvement areas:
Roles and responsibilities
Policies and Procedure
Communication and Training
Systems and automation
Copyright Omar Mohamed 2019
17
17
MAPPING OF IMPROVEMENT AREAS FOR GENERALLY
ACCEPTED RECORDKEEPING PRINCIPELS®
Copyright Omar Mohamed 2019
18Improvement Area
AccountabilityTransparencyIntegrityProtectionComplianceAvail
abilityRetentionDispositionRoles and
18
WHO SHOULD DETERMINE THE IG POLICIES?
Steering Committee or Board
Headed by executive sponsor
Include cross-functional groups
Key business units
IT
Finance
Risk
Compliance
Records Management
Legal
Training is essential
Review the Sample Assessment Report and Road Map in Table
3.3, Page 36 and 37 of text book
Copyright Omar Mohamed 2019
19
The End
Copyright Omar Mohamed 2019
20
20
ITS 833 – INFORMATION GOVERNANCE
Chapter 4
Information Risk Planning and Management
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Be able to outline the progressive steps involved in developing
an information risk management plan
Know what is meant by “risk” and a “risk profile”
Know the different ways one would go about creating a risk
profile
Know how one would go about conducting a risk assessment
Know what an information risk mitigation plan is
Copyright Omar Mohamed 2019
2
2
What is the purpose of Information Risk Planning?
Identify potential risks to information
Weighing risks against each other
Creating strategic plans for risk mitigation
Creating policies
Develop Metrics
Applying metrics to measure progress
Audit and feedback
Copyright Omar Mohamed 2019
3
3
Steps in Information Risk Planning and Management
Step 1: Survey and Determine Legal and Regulatory
Applicability and Requirements
Step 2: Specify IG Requirements to Achieve Compliance
Step 3: Create a Risk Profile
Step 4: Perform Risk Analysis and Assessment
Copyright Omar Mohamed 2019
4
Step 5: Develop an Information Risk Mitigation Plan
Step 6: Develop Metrics and Measure Results
Step 7: Execute The Risk Mitigation Plan
Step 8: Audit the Information Risk Mitigation Program
4
Step 1: Survey and Determine Legal and Regulatory
Applicability and Requirements
Conduct Legislative Research-Legal requirements trump all
other requirements
Identify the jurisdictions(s) where the company operates
Federal
Provincial (international)
State
Municipal
Approaches to legal research for retention, privacy and security
laws:
Records retention citation service (Example: FILELAW®)
Use online Print resources (Example: Code of Federal
Regulations “CFR”)
Copyright Omar Mohamed 2019
5
5
Step 2: Specify IG Requirements to Achieve Compliance
Compile list of external compliance requirements
Map data, document, and records to external compliance
requirements
Devise a method of keeping legal and records management staff
apprised of changes in regulations
Reconcile Internal IG retention requirements with external
compliance requirements
Copyright Omar Mohamed 2019
6
6
Step 3: Create a Risk Profile
“RISK” – Effect of uncertainty on objectives1
“RISK PROFILE” – Description of a set of risks2
A part of Enterprise Risk Management
Considerations for creating a Risk Profile
Frequency
External Resources
Stakeholders
ISO 31000 2009 Plain English, Risk Management Dictionary”,
www.praxiom.com/iso-31000-terms.htm
Included in Risk Profile
Identification, documentation, assessment and prioritizing risk
that an organization may face in pursuing a business objective
Timeline:
Projections 3 to 5 years into future
Create annually
Updated or reviewed semiannually
Copyright Omar Mohamed 2019
7
7
Step 3..Continued
Types of Risk Profile Methodology
Top-10 list-simple listing and ranking of top 10 risks in relation
to the objective
Risk Map – Visual tool, easy to grasp, grid depiction of a
likelihood axis and impact axis-Generally rated on a 1 to 5 scale
Heat Map-color coded matrix generated by stakeholders voting
on risk by color (red is highest risk)
Copyright Omar Mohamed 2019
8
8
Step 3..Continued
Information Gathering for Risk Profile
Surveys
Person-to-Person Interviews
Give interviewees questions in advance
Schedule interviews at convenient times and places
Keep interviews as short as possible
Include questions about:
Access and Security policies
Policy development
Policy adherence
Retention of email
Legal Hold policies
Record Retention
Record destruction
Training and Communications
Consider key events and changes that will impact risk
Generate a list of risks and categorize (Example: natural
disasters, regulatory, safety , competitive, etc.)
Copyright Omar Mohamed 2019
9
9
Step 4: Perform Risk Analysis and Assessment
Five steps for Risk Assessment:
Identify the risks –The output of Risk Profile
Determine Potential Impact-Include calculations for range of
economic impact in dollars where available. Be as specific as
possible
Evaluate Risk Levels and Probabilities and Recommend Action-
Recommendations for new procedures, new processes, new
investments in IT, and other risk mitigation methods
Create a Report with recommendations and implement-include
risk assessment table where available, include written
recommendations – implement
Review periodically-at least annually but as appropriate for
your organization
Copyright Omar Mohamed 2019
10
10
Step 5: Develop an Information Risk Mitigation Plan
What is a Risk Mitigation Plan?
Plan which includes
Options to reduce specific risks and increases likelihood of
achieving objectives
Tasks to reduce specific risks and increases likelihood of
achieving objectives
Timetable implementation of risk mitigation measures
Milestones for implementing risk mitigation measures
Timetable/Milestones for IT acquisitions
Timetable/Milestones for assigning roles and responsibilities
Copyright Omar Mohamed 2019
11
11
Step 6: Develop Metrics and Measure Results
Assign quantitative measures that are
Meaningful
Measure progress
What are relevant metrics? – Must be relevant to your
organization. Examples are:
Educe the data lost on stolen or misplaced laptops and mobile
devices by ___ % over the prior year
Reduce the number of hacker intrusion events by ___ over prior
year
Reduce e-discovery costs by __ % over prior year
Reduce the number of adverse findings in the risk and
compliance audit by ___% over last year
Provide information risk training to __%of knowledge level
workers this year
Provide confidential messaging services for the organization’s
top ___ executives this year
Copyright Omar Mohamed 2019
12
12
Step 7: Execute Your Risk Mitigation Plan
Set up regular project/program team meetings
Develop Key Reports on key risk mitigation metrics
Manage the process
Use Project management tools and techniques
Clear and concise communication with the IG team on progress
and status
Copyright Omar Mohamed 2019
13
13
Step 8: Audit the Information Risk Mitigation Program
Key tools in the audit process?
Metrics used to measure risk mitigation effectiveness
Use Audit results for further redevelopment and fine tuning of
the risk mitigation program
Don’t misuse the audit results-Don’t use it to beat up on people-
Use it for feedback and improvement
Copyright Omar Mohamed 2019
14
14
The End
Copyright Omar Mohamed 2019
15
15
ITS 833 – INFORMATION GOVERNANCE
Chapter 5
Strategic Planning and Best Practices for Information
governance
Dr. Omar Mohamed
Copyright Omar Mohamed 2019
1
1
CHAPTER GOALS AND OBJECTIVES
Be able to explain the general steps required in the strategic
planning for an IG Plan
Be able to identify key Best Practices as they relate to strategic
planning for an IG Plan
Copyright Omar Mohamed 2019
2
2
First Step in Strategic Planning for Information Governance
Program
Secure commitment/sponsorship of executive management
Resource acquisition
Time
Labor/Manpower
$$$
Accountability
But who??
Suggested: Chief compliance officer, Chief Information
Officer, Chief Executive Officer
Copyright Omar Mohamed 2019
3
3
Crucial Roles:
So what is the role of this Executive Sponsor?
Budget
Planning and Control
Decision Making
Expectation Management
Anticipation/Runs Interference for PM
Approval
Copyright Omar Mohamed 2019
4
What is the role of the Project Manager?
Keep Executive Sponsor apprised of progress
Implement/oversee daily tasks
Track detailed progress
Involve Executive Management only when necessary to do so
4
EVOVING ROLE OF EXECUTIVE SPONSOR
The Role of the Executive Sponsor will change over the
lifecycle of the IG program implementation
Initial involvement requires greater TIME investment by
executive management
Early Implementation – Visible and Accessible
Post-Implementation – Responsible for maintenance –ongoing
communication with PM
Copyright Omar Mohamed 2019
5
5
THE IG TEAM
Who Should Be On Your IG Team?
Take a Cross-Functional Approach
Required:
Executive Sponsor
Legal Department or Outside Attorney
IT Department
Senior Records Officer
Risk Management Specialist
IG Program Manager
Elective:
Human Resources
Analyst
Rep from different business units or departments
Copyright Omar Mohamed 2019
6
6
ASSIGNMENT OF ROLES
AND RESPONSIBILITIES
Executive Sponsor – designation of roles for:
Project Manager
Possibly from Legal, Compliance, Risk management, Records
Management or IT
Logically each IG team members take responsibility for their
functional area of expertise
Pair up team members or assign small work groups
Resulting output of team effort: Final Draft of the IT strategic
plan – Should be in a form ready to align with organizational
strategic plan
Copyright Omar Mohamed 2019
7
7
ALIGNEMENT OF IG PLAN TO
ORGANIZATIONAL STRATEGIC PLAN
IG Plan MUST support the achievement of the Organization’s
business objectives and its strategic plan
IG Plan MUST be integrated with the IT strategy
Decisions must be made with regard to the use of E-Discovery
techniques like predictive coding technology in early case
assessment and software that uses artificial intelligence
Must take resource allocation into consideration
Copyright Omar Mohamed 2019
8
8
SURVEY AND EVALUATE
EXTERNAL FACTORS
What External Factors?
IT Trends – What new is coming online? What new is being
developed? Which are too risky? What is the plan for long term
digital preservation?
Business Conditions and Economic Environment-Where is the
industry/country in the recurring business cycle? What is the
state of business conditions in your industry?
Relevant Legal, Regulatory and Political Factor - Identify
regulation affecting your industry. What is expected of future
and anticipated regulation?
Industry Best Practices-Survey your industry. What is your
more progressive competition doing? Will you use 3rd Party
consultants
See Sample IG Best Practices taken from Different
areas/industries on page 61-64
Copyright Omar Mohamed 2019
9
9
FORMULATING THE IG STRAEGIC PLAN
Synthesize Information –
Make the plan relevant to the information . Don’t linger
Develop IG strategy for each critical area
Maintain focus by developing IG strategy without regard to
prioritizing critical areas
Prioritize Strategies and map to organizational goals and
objectives
Develop Actionable Plans to Support Organizational Objectives
and Goals
Develop policies and plans that identify specific tasks and
steps, and define roles and responsibilities
Build checks and audits and other testing methods
Create New IG Programs to Support Business Goals and
Objectives
Launch new “Sub-Programs” within the IG program
Assign specific employee responsibility to specific tasks
Have defined timeframes for subprograms
Piece together subprograms
Draft IG Strategic Plan and Gain Input from Broader Group of
Stakeholders
Get Buy-in and Sign-Off and Execute Plan
Answer questions of top level management
Address concerns
Get them to buy-in to the program and sign off on it
Copyright Omar Mohamed 2019
10
10
The end
Copyright Omar Mohamed 2019
11
11

More Related Content

Similar to ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx

ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docxdonnajames55
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketingNavneet Singh
 
COBIT® Presentation Package.ppt
COBIT® Presentation Package.pptCOBIT® Presentation Package.ppt
COBIT® Presentation Package.pptEmmacuet
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.360factors
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxrobertad6
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfJim Merrifield, IGP, CIP
 
SOC 2 presentation. Overview of SOC 2 assessment
SOC 2 presentation. Overview of SOC 2 assessmentSOC 2 presentation. Overview of SOC 2 assessment
SOC 2 presentation. Overview of SOC 2 assessmentModu9
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference BriefingJesse Wilkins
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...bikheet
 
White paper-iop tech1
White paper-iop tech1White paper-iop tech1
White paper-iop tech1ali tajalli
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategySustainableEnergyAut
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
Records management overview - InFuture
Records management overview - InFutureRecords management overview - InFuture
Records management overview - InFutureGreg Reid
 
Document Management Regulations Ii Payment Processing
Document Management Regulations Ii   Payment ProcessingDocument Management Regulations Ii   Payment Processing
Document Management Regulations Ii Payment Processingguest709aa8
 
Struktur Komponen, Area Fokus, Faktor Desain.pdf
Struktur Komponen, Area Fokus, Faktor Desain.pdfStruktur Komponen, Area Fokus, Faktor Desain.pdf
Struktur Komponen, Area Fokus, Faktor Desain.pdfDhata Praditya
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementChristian F. Nissen
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governanceguestea68b0
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500Ramiro Cid
 

Similar to ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx (20)

ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
 
rethinking marketing
rethinking marketingrethinking marketing
rethinking marketing
 
COBIT® Presentation Package.ppt
COBIT® Presentation Package.pptCOBIT® Presentation Package.ppt
COBIT® Presentation Package.ppt
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docxCHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
CHAPTER 6INFORMATION GOVERNANCEInformation Governance Po.docx
 
Automated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages ItselfAutomated Compliance: How to Create an IG Program that Manages Itself
Automated Compliance: How to Create an IG Program that Manages Itself
 
SOC 2 presentation. Overview of SOC 2 assessment
SOC 2 presentation. Overview of SOC 2 assessmentSOC 2 presentation. Overview of SOC 2 assessment
SOC 2 presentation. Overview of SOC 2 assessment
 
Cobit overview
Cobit overviewCobit overview
Cobit overview
 
20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing20160426 AIIM16 CIP Preconference Briefing
20160426 AIIM16 CIP Preconference Briefing
 
This domain reviews the diverse areas of knowledge needed to develop and man...
This domain reviews the diverse areas of  knowledge needed to develop and man...This domain reviews the diverse areas of  knowledge needed to develop and man...
This domain reviews the diverse areas of knowledge needed to develop and man...
 
White paper-iop tech1
White paper-iop tech1White paper-iop tech1
White paper-iop tech1
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data Strategy
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Records management overview - InFuture
Records management overview - InFutureRecords management overview - InFuture
Records management overview - InFuture
 
Document Management Regulations Ii Payment Processing
Document Management Regulations Ii   Payment ProcessingDocument Management Regulations Ii   Payment Processing
Document Management Regulations Ii Payment Processing
 
Struktur Komponen, Area Fokus, Faktor Desain.pdf
Struktur Komponen, Area Fokus, Faktor Desain.pdfStruktur Komponen, Area Fokus, Faktor Desain.pdf
Struktur Komponen, Area Fokus, Faktor Desain.pdf
 
Introduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT managementIntroduction to COBIT 2019 and IT management
Introduction to COBIT 2019 and IT management
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
IT Governance & ISO 38500
IT Governance & ISO 38500IT Governance & ISO 38500
IT Governance & ISO 38500
 

More from vrickens

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docxvrickens
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docxvrickens
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docxvrickens
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docxvrickens
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docxvrickens
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docxvrickens
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docxvrickens
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docxvrickens
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docxvrickens
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docxvrickens
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docxvrickens
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docxvrickens
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docxvrickens
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docxvrickens
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docxvrickens
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docxvrickens
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docxvrickens
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docxvrickens
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docxvrickens
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docxvrickens
 

More from vrickens (20)

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 

ITS 833 – INFORMATION GOVERNANCEChapter 7Dr. Omar Mohamed.docx

  • 1. ITS 833 – INFORMATION GOVERNANCE Chapter 7 Dr. Omar Mohamed Copyright @ Omar Mohamed 2019 1 1 Chapter Goals and Objectives What is the difference between structured What is the difference between unstructured and semi-structured information? Why is unstructured data so challenging? Copyright @ Omar Mohamed 2019 2 Generally, what is full cost accounting (FCA)? What are the 10 key factors that drive the total cost of ownership of unstructured data How can we better manage information? How would an IG enabled organization look different from one that is not IG enabled? 2 The Business Case for Information Governance
  • 2. Difficult to Justify Short term return on investment is nonexistent Long term view is essential Reduce exposure to risk over time Improve quality and security of information Streamlining information retention Looking at Information Costs differently Copyright @ Omar Mohamed 2019 3 3 The information environment Challenges of Unstructured Information Data volumes are growing “Unstructured Information” is growing at a dramatic rate Challenges unique to unstructured information Horizontal nature Lack of formality Management location Identification of ownership Classification Copyright @ Omar Mohamed 2019 4 Calculating Information Costs Rising Storage Costs (Short sighted thinking) Labor (particularly knowledge workers) Overhead costs Costs of e-discovery and litigation
  • 3. Opportunity Costs 4 Full Cost Accounting for Information Models Total Cost of Ownership (TCO) Model Return on Investment Model (ROI) Full Cost Accounting Model (FCA) Past, Present, Future Costs Direct Costs Indirect Costs Flexible Application Triple Bottom Line Accounting – Monetary, Environment, Societal Costs Copyright @ Omar Mohamed 2019 5 Full Cost Accounting General and Administrative Costs Productivity Gains and Losses Legal and E-discovery costs Indirect Costs Up-Front Costs Future Costs 5 The politics involved
  • 4. Tools needed to establish facts about the information environment SOURCES OF Costs of owning unstructured information, cost reducers, and cost enhancers Giving unstructured information value The IG enabled organization The End Copyright @ Omar Mohamed 2019 11 11 ITS 833 – INFORMATION GOVERNANCE Chapter 6 Information Governance policy development Dr. Omar Mohamed Copyright @ Omar Mohamed 2019
  • 5. 1 1 CHAPTER GOALS AND OBJECTIVES Know the 8 Generally Accepted Recordkeeping Principles® What is the IG Reference Model? What does the IGRM Diagram consist of? What are the best practice considerations? What is the benefits and risks of having standards? What are the key standards relevant to IG Copyright @ Omar Mohamed 2019 2 2 A Review of the 8 Generally Accepted Recording Keeping Principles® Accountability Transparency Integrity Protection Compliance Availability Retention Disposition So…what is the significance of these principles? Copyright @ Omar Mohamed 2019 3
  • 6. 3 IG REFERENCE MODEL Who? ARMA International & CGOC When? 2012 Where? As part of the EDRM Project Version 3.0 Why? To foster the adoption by facilitating communication and collaboration between IG stakeholder functions, legal, records management, risk management, and business unit stakeholders. Copyright @ Omar Mohamed 2019 4 4 HOW TO INTERPRET THE IGRM DIAGRAM Outer Ring: Complex set of interoperable processes and implementing he procedures and structural element to put them into practice Requirements: Understanding of business imperatives Knowledge of appropriate tools and infrastructure Sensitivity to legal and regulatory obligations Inner Ring: Depicts a work-flow (life-cycle) diagram. Shows that information management is important at all stages of the lifecycle
  • 7. Copyright @ Omar Mohamed 2019 5 5 How the IGRM Diagram related to the Generally Accepted Recordkeeping Principles® Support the ARMA Principle by identifying the cross-functional groups of IG stakeholders Depicts the intersecting objectives of the organization Depicts the relationship duty, value and information assets Used by proactive organizations as an introspective lens to facilitate visualization, understanding and discussion concerning how to apple the “Principles” to the organization. Puts focus on the “Principles” Provides essential context for the maturity model Copyright @ Omar Mohamed 2019 6 6 Considerations in IG Policy Formation Best Practices? YES! Understand that Best Practices will vary per organization Review 25 generic Best Practices, Pages 75 and 76 of text book Copyright @ Omar Mohamed 2019 7 Standards? YES! Two types to consider
  • 8. De Jure Standards - Legal standards published by standards setting bodies such as IOS, ANSI, NIST, BTS and others De Facto Standards – Informal standards regarded by many as actual standards – arising through popular use (Example: Windows in the business world in 2001-2010). May be published by formal standards setting bodies without having “Formal” status 7 Benefits and Risks of Standards Benefits Quality Assurance Support Interoperability Support Implementation Framework and Certification Checklists Cost Reduction International Consensus Copyright @ Omar Mohamed 2019 8 Risks Possible Decreased Flexibility Standards Confusion Real-World Shortcomings to due Theoretical Basis Cost and Maintenance Involving in Updating Standard 8 KEY STANDARDS RELEVANT TO IG Risk Management ISO 31000-2009 – States principles and generic guidelines of risk management applicable to IG
  • 9. Provides a structured framework for development and implementation of risk management strategies and programs “Risk Management Framework”: Set of two basic components (foundations and organizational arrangements) that support and sustain risk management throughout the organization. Copyright @ Omar Mohamed 2019 9 9 KEY STANDARDS RELEVANT TO IG Information Security Management ISO/IEC 27001:2005- Information Security Management System Standard that provides guidance in development of security controls for protection of information assets Flexible –can be applied to different activities and processes Includes use of standards by auditors and stakeholders ISO/IEC 27002:2005-Information Technology-Security Techniques-Code of Practice for Information Security Establishes guidelines and general principle for initiating, implementing, maintaining and improving information security mgt. Includes Best Practices of Control Objectives in 11 key areas of information security management ISO/IE 38500:2008 –International Standard for high-level principle and guidance for senior executives and directors, and advisors for effective and efficient use of IT Three major sections Scope, Application and Objectives Framework for Good Corporate Governance of IT Guidance for Corporate Governance of IT Copyright @ Omar Mohamed 2019 10
  • 10. 10 KEY STANDARDS RELEVANT TO IG RECORDS AND E-RECORDS MANAGEMENT ISO 15489-1:2001 and ISO 15489-2:2001– International Standard for Records Management Part 1:Provides a framework and high-level overview of RM core principles Part 1:Defines RM as “Field of management responsibility for the efficient and systematic control of creation receipt, maintenance, use and disposition of records, including processes for capturing and maintaining evidence of and information about business activities and transactions in the form of records”1 Part 2: Technical Specifications and Methodology for implementing standard ISO 30300;2011 – Information and Documentation-Management Systems for Records-Fundamentals and Vocabulary ISO 30301:2011 – Information and Documentation-Management Systems for Records – Requirements 1ISO 15489-1:2001 Information and Documentation-Records Management, Part 1:General Geneva: ISO, 2001), section 3.16. Copyright @ Omar Mohamed 2019 11 11
  • 11. NATIONAL, INTERNATIONAL AND REGIONAL ERM STANDARDS United States E-Records Standard U.S. DOD 5015.2 Design Criteria Standard For Electronic Records Management Software Applications Developed in 1997 Updated in 2002 and 2007 Canadian Standards Electronic Records as Documentary Evidence CAN/CGSB- 72.34-2005 Microfilm and Electronic Images as Documentary Evidence CAN/DGSB-72.11-93 Canadian Legal Considerations Relies on prime directive-that an organization shall always be prepared to produce its records as evidence- and its national standards, for the admissibility of electronic records in court proceedings The admissibility of records as evidence is determined under the business records provisions of the Evidence Act Copyright @ Omar Mohamed 2019 12 12 NATIONAL, INTERNATIONAL AND REGIONAL ERM STANDARDS…CONTINUED United Kingdom The National Archives To sets of functions requirements to promote the development of the electronic records management software market (one in 1999 and one in 2002) Model Requirements of Electronic Records
  • 12. MoReq2 MoReq2010 Australian ERM and Records Management Standards Has consistently been world leader in this area Adopted all three parts of ISO 16175 as its e-records standard Australian Government Recordkeeping Metadata Standard Version 2.0 Australian Government Locator Service AS 5090:2003 – Work Process Analysis for Recordkeeping Copyright @ Omar Mohamed 2019 13 13 LONG-TERM DIGITAL PRESERVATION Referred to as “LTDP” LTDP is a key area for IG policy development Frequently not addressed in an IG plan Should be applied in preserving historical and “vital records” and in order to maintain its corporate or organizational memory Key Standards for LTDP: PDF/A-2 –official standard format for preserving electronic documents, developed by Adobe. ISO 19005-1:2005 Document Management is the published specification requiring PDF format ISO 14721:2012 – Space Data and Information Transfer Systems –Open Archival Information Systems ISO TR 18492(2005) – Long Term Preservation of Electronic Document Based Information ISO 16363:2012 – Space Data and Information Transfer Systems-Audit and Certification of Trustworthy Digital Repositories
  • 13. Copyright @ Omar Mohamed 2019 14 14 BUSINESS CONTINUITY MANAGEMENT ISO 22301:2012 – Societal Security – Business Continuity Management Systems Requirements Specifies requirements for creating and implementing a standardized approach to business continuity management ----- this is also known as Disaster Recovery Benefits of ISO 22301 Threat Identification and Assessment Threat and Recovery Planning Mission-critical process protection Stakeholder Confidence Copyright @ Omar Mohamed 2019 15 15 THINGS TO REMEMBER IN DEVELOPING THE IG POLICY Take into account organizational goals Draw clear lines of authority Make sure you have an executive sponsor who can garner executive support for the IG program and policies IG program must contain communications and training component Stakeholders must be made aware of new policies and practices
  • 14. Make sure you have metrics that are relevant and useful and can actually be measured Test and audit Give feedback to employees based upon metrics, tests and audit results Establish and enforce clear penalties for policy violations and communicate that to employees Take into account organizational culture Copyright @ Omar Mohamed 2019 16 16 The End Copyright @ Omar Mohamed 2019 17 17 ITS 833 – INFORMATION GOVERNANCE Chapter 1 – The Onslaught of Big Data and Information Governance Imperative Dr. Omar Mohamed Copyright Omar Mohamed 2019 1
  • 15. 1 CHAPTER GOALS AND OBJECTIVES Define or identify what is meant by “Big Data” What is the practical effects and problems associated with Big Data Solution to the Big Data problem Defining Information Governance (“IG”) Why we do not incorporate IG into everyday business Advantage of IG Effects of not incorporating IG General approach to implementing IG Copyright Omar Mohamed 2019 2 2 What is “Big Data”?
  • 16. It is a business asset capable of being leveraged. “High-volume, high-velocity and high-variety information that demands cost-effective innovative forms of information processing for enhanced insight and decision making” A combination of both structured and unstructured data that is so massive that it cannot be processed using today’s database tools and analytical software techniques. Copyright Omar Mohamed 2019 3 3 What is the practical effect of “Big Data”? Whether or not a business enterprise will be able to sustain a competitive advantage will depend on the business’ ability to manipulate the large amount of data in a way that it to differentiate itself. Estimates are that 90% of the data existing today was created over the pat two years. Big Data and related technology and services are projected to grow at a compound annual rate of approximately 27% - leading to new opportunities for data mining and business intelligence. Copyright Omar Mohamed 2019
  • 17. 4 4 Issues Related to Big Data Expense –Only about 25% of data stored has real business value, 5% more is required to be maintained for legal reasons, 1% retained due to litigation hold, leaving about 69% with no real value. A great deal of irrelevant information Increased storage costs System failures Legal costs Conversion costs Copyright Omar Mohamed 2019 5 5
  • 18. SOLUTION TO BIG DATA PROBLEMS? Information Governance Rigid Enforced Creates a smaller “information footprint” Allows business to more easily find what they need and derive business value from it Copyright Omar Mohamed 2019 6 6 So…What is “Information Governance”? It is discipline that emerged out of necessity… Subset of corporate governance Merged from records management, content management, information technology, data governance, information security, data privacy, risk management, litigation readiness, regulatory compliance, data preservation and business intelligence It is the way by which an organization manages the totality of its information
  • 19. A strategic framework composed of standards, processes, roles, and metrics that hold organizations and individuals accountable to create, organize, secure, maintain, use and dispose of information in ways that align with and contribute to the organizations goals. (Association of Records Management and Administrators)Glossary of Records and Information Management Terms, 4th Ed., 2012, TR 22-2012) Copyright Omar Mohamed 2019 7 7 WHY INCORPORATE “IG”? We can’t keep everything forever We can’t throw everything away E-discovery Employees want it It improves information delivery and improves productivity It does not get easier to do over time Legal requirements Helps mitigate information management risk E-mail Copyright Omar Mohamed 2019
  • 20. 8 8 WHY DON’T WE INCORPORATE “IG”? Cost Lack of understanding Lack of support from top Copyright Omar Mohamed 2019 9 9 FAILURES OF INFORMATION GOVERNANCE? Theft of valuable information Inability to protect personal, private information Breaches in legal requirements Loss of trade secrets Public reputation damage
  • 21. Copyright Omar Mohamed 2019 10 10 Approaches to Implementing IG Form proper IG policies first Review existing policy…if any Implement an awareness policy Develop an approach Project approach vs. Strategic program Identify governance body or steering committee Apply appropriate technologies for enforcement Copyright Omar Mohamed 2019 11 11 Thank You Copyright Omar Mohamed 2019
  • 22. 12 12 ITS 833 – INFORMATION GOVERNANCE Chapter 2 – Information Governance, IT Governance, Data Governance: What’s the Difference? Dr. Omar Mohamed Copyright Omar Mohamed 2019 1 1 CHAPTER GOALS AND OBJECTIVES
  • 23. Distinguish between Data Governance, Information Governance and Information Technology Governance and be able to define or explain each How to increase the likelihood of success of a data governance program Identify IT Governance Frameworks Identify the impact of a successful IG program Copyright Omar Mohamed 2019 2 What is “Data Governance”? Includes processes and controls to ensure that information at the data level – raw data- is true, accurate and unique. Involves data cleansing and de-duplication Focus is on information quality Hybrid quality control discipline Data quality Data management IG policy development Business process improvement Compliance Risk Management
  • 24. Copyright Omar Mohamed 2019 3 3 How can you improve data governance success ? Identify a measurable impact Assign accountability for data quality to a business unit Recognize the uniqueness of data as an asset Forget the past-use a forward going strategy Management the Change Copyright Omar Mohamed 2019 4 WHAT IS INFORMATION TECHNOLOGY GOVERNANCE? Primary way that stakeholders can ensure that investments in IT create business value and contribute to business objectives Function to improve IT performance and deliver optimum business value and ensure regulatory compliance Focus is on making IT efficient and effective Copyright Omar Mohamed 2019
  • 25. 5 5 IT Governance Framework(s) CobiT® - Control Objective for Information and Related Technology ValIT® ITIL ISO/IEC38500:2008 Copyright Omar Mohamed 2019 6 6 CobIT® Three Basic Organizational Levels/Responsibilities Board of Directors and Executive Management IT and Business Management Line-Level Governance
  • 26. Divided into four (4) IT Domains Plan and Organize Acquire and Implement Deliver and Support Monitor and Evaluate Includes 34 processes and 210 Control Objectives ISO 17799 Compatible with IT Infrastructure Library (ITIL) Process oriented IT governance framework Codeveloped by IT Governance Institute and ISACA Focus on: Business Risks Control Requirements Compliance Technical Issues Under continuous refinement Copyright Omar Mohamed 2019 7 ValIT® Value Oriented Framework Compatible and complimentary with CobiT®
  • 27. Focus is on leveraging IT investments for maximum value 40 Essential Management Practices (same as CobiT® control objectives) Supports three processes: Value Governance Portfolio Management Investment Management Copyright Omar Mohamed 2019 8 8 ITIL – Information Technology Infrastructure Library Process Oriented Developed in United Kingdom Applicable to both public and private sector Most widely accepted approach to IT service management in the world Focus is on providing guidance to organizations on how to use IT as a tool to facilitate business change, transformation and growth
  • 28. Foundation for ISO/IEC 20000 Five Volumes that map IT service cycle as follows: ITIL Service Strategy ITIL Service Design ITIL Service Transition ITIL Service Operation ITIL Continual Service Improvement Copyright Omar Mohamed 2019 9 9 ISO/IEC 38500:2008 International Standard Focus is on high-level principles for senior executives, directors and advisors of IT Applies to the governance of management processes that are performed at the IT service level Three main sections: Scope, Application and Objectives
  • 29. Framework for Good Corporate Governance of IT Guidance for Corporate Governance of IT Copyright Omar Mohamed 2019 10 10 INFORMATION GOVERNANCE A part of “Corporate Governance” which is the highest level of governance of an organization Processes which are at a higher level than data governance or IT governance Contains and includes both data governance and IT governance Approach focuses on controlling the information that is generated by IT systems, rather than the detailed IT o data capture and quality control processes Goal is to manage and control information assets to lower risk, ensure compliance with regulations and improve information quality and accessibility while implementing security measure to protect and preserve information that has business value Copyright Omar Mohamed 2019 11
  • 30. IMPACT OF SUCCESSFUL INFORMATION GOVERNANCE Enable the use of common terms across the enterprise Development of standard definitions and terms Map Information creation and usage Who Which When Where Information Confidentiality Integrity Validity Accuracy Quality Harvest and Leverage Information Copyright Omar Mohamed 2019 12 DIFFERENCES BETWEEN IG, ITG AND DG Information Governance Overarching policies and processes to optimize and leverage information while keeping it secure and meeting legal and privacy obligations that are consistent with organizational objectives.
  • 31. Higher level approach, incorporating IT Governance and Data Governance IT Governance Following established frameworks and best practices to gain the most leverage and benefit from IT investments and support accomplishment of business objectives Data Governance Consists of processes methods and techniques to ensure that data is of high quality, reliable and unique so that its results are trusted and accurate Copyright Omar Mohamed 2019 13 RELATIONSHIP BETWEEN COROPRATE GOVERNANCE, INFORMATION GOVERNANCE, IT GOVERNANCE AND DATA GOVERNANCE Copyright Omar Mohamed 2019 14 Information Governance IT Governance
  • 32. Data Governance Corporate Governance Thank You Copyright Omar Mohamed 2019 15 15 ITS 833 – INFORMATION GOVERNANCE Chapter 3 – Information Governance Principles
  • 33. Dr. Omar Mohamed Copyright Omar Mohamed 2019 1 CHAPTER GOALS AND OBJECTIVES Know the 10 key principles of IG What are the Generally Accepted Recordkeeping Principles® What is the difference between disposition and destruction Who should be involved in the information governance development process Know the 8 GAR principle Know the 5 GAR Principle Levels Know which of the four area(s) of improvement each of the 8 GAR principles map to Copyright Omar Mohamed 2019 2
  • 34. 10 key principles for the IG approach Executive Sponsorship Information Policy Development and Communication Information Integrity Information Organization and Classification Information Security Information Accessibility Information Control Information Governance Monitoring and Auditing Stakeholder Consultation Continuous Improvement Copyright Omar Mohamed 2019 3 3 The Key to Information Governance Accountability Copyright Omar Mohamed 2019 4
  • 35. Often the root of many problems is that no one is held accountable RECORDING KEEPING PRINCIPLES® Formal Business records account for about 9% of all information in an organization Formal record keeping allows the organization to demonstrate legal compliance, and applicable standards Generally Accepted Recordkeeping Principles® were developed in 2009 by ARMA International to foster awareness of good recordkeeping practices Copyright Omar Mohamed 2019 5 5 Generally Accepted Recordkeeping Principles® Accountability Transparency Integrity Protection
  • 36. Compliance Availability Retention Disposition Copyright Omar Mohamed 2019 6 6 GAR Principles Levels Used to define the characteristics of evolving and maturing Records Management Programs 1. Standard – whether recordkeeping concerns are being addressed 2. In Development – developing recognition that recordkeeping has an impact and benefit from more defined IG program 3. Essential – where defined policies and procedures exist that address minimum legal and regulatory requirements but more action is required to improve recordkeeping 4. Proactive – where information governance issues are integrated into business decisions with organization consistently
  • 37. meeting its legal and regulatory obligations 5. Transformational – Integrated IG into corporate infrastructure and business processes to such an extent that compliance is routine Copyright Omar Mohamed 2019 7 7 RM responsibility at the senior level of executive authority Understanding of regulatory and legal framework Responsibility for ensuring that processes, procedures and governance structures and documentation are developed Development of organization wide audit process for all aspects of RM Reinforce compliance and require accountability GAR PRINCIPLE 1: ACCOUNTABILITY Copyright Omar Mohamed 2019 8 Practices that document processes and promote an
  • 38. understanding of the roles and responsibilities of the stakeholders Policies are formalized and integrated into business processes Must be recognized by senior management Employees must have access to the policies and procedures of RM Employee training Documentation in the form of policies, procedures, guidelines, instructions, diagrams, flowcharts, system documentation, user manuals, etc. GAR PRINCIPLE 2: TRANSPARENCY Copyright Omar Mohamed 2019 9 “Record Integrity”: The records are complete and protected from being altered Record generating systems and repositories are required to be assessed to determine record keeping capabilities. Here a formalized process is required to be in place for acquiring or developing new systems, required for lifecycle management of records. Record integrity is confirmed by ensuring that records are created by competent authority based upon established principles
  • 39. GAR PRINCIPLE 3:INTEGRITY Copyright Omar Mohamed 2019 10 This is where organizations ensure that the records are unaltered through loss, tampering or corruption Applies to both physical and electronic records GAR PRINCIPLE 4: PROTECTION Copyright Omar Mohamed 2019 11 There should be a process for development and training of the fundamentals of compliance monitoring Compliance monitoring involves reviewing and inspecting different facets or records management Compliance monitoring is carried out by audits, whether that be internal audits, external organizations or by records management and must be performed routinely GAR PRINCIPLE 5: COMPLIANCE Copyright Omar Mohamed 2019 12
  • 40. Process of evaluating how effectively and efficiently records and information are stored and retrieved using existing equipment, networks and software of the organization Intended to identify current and future requirements and recommendations for new systems where appropriate GAR PRINCIPLE 6: AVAILABILITY Copyright Omar Mohamed 2019 13 This is the function of preserving and maintaining records for continuing use A retention schedule is created to identify actions needed to fulfill requirements for retention and disposal of records and to identify and establish authority for employees who will be responsible for retention, destruction and transfer of records Must identify the scope of the different jurisdictions that impose control over record in each location where the company does business Includes “records appraisal” – process of assessing the value and risk of records to determine their retention and destruction requirements-part of records retention schedule
  • 41. Record retention period – length of time that records should be retained and actions taken for them to be destroyed or preserved Document research performed to identify jurisdictional and legal requirements for record retention GAR PRINCIPLE 7: RETENTION Copyright Omar Mohamed 2019 14 Disposition is the last stage in the life cycle of records When records are required to be retained permanently or on a long term basis they should be “archived” for preservation Should be part of record retention schedule When destroyed, destruction must be in a controlled and secure manner in accordance with disposal instructions Document destruction of record Maintain an audit trail of the destruction of records Must have someone designated to oversee destruction of records GAR PRINCIPLE 8: DISPOSITION Copyright Omar Mohamed 2019 15
  • 42. Disposition of records is not the same as destruction of records. Destruction may be one of the disposal options Methods of Disposition Discard-Standard for non-confidential records Shred – Confidential and sensitive records Archive – For records retained permanently or for long-term periods Imaging – Conversion from a physical record to digital images prior to destruction of paper records Purge – This involves the removal of material based upon specific criteria. Generally applicable to structured database records and applications Copyright Omar Mohamed 2019 16 16 Generally Accepted Recordkeeping Principles® maturity model is used to identify a company’s areas in need of improvement. Principles are mapped to four (4) improvement areas: Roles and responsibilities
  • 43. Policies and Procedure Communication and Training Systems and automation Copyright Omar Mohamed 2019 17 17 MAPPING OF IMPROVEMENT AREAS FOR GENERALLY ACCEPTED RECORDKEEPING PRINCIPELS® Copyright Omar Mohamed 2019 18Improvement Area AccountabilityTransparencyIntegrityProtectionComplianceAvail abilityRetentionDispositionRoles and
  • 44. 18 WHO SHOULD DETERMINE THE IG POLICIES? Steering Committee or Board Headed by executive sponsor
  • 45. Include cross-functional groups Key business units IT Finance Risk Compliance Records Management Legal Training is essential Review the Sample Assessment Report and Road Map in Table 3.3, Page 36 and 37 of text book Copyright Omar Mohamed 2019 19 The End Copyright Omar Mohamed 2019 20 20
  • 46. ITS 833 – INFORMATION GOVERNANCE Chapter 4 Information Risk Planning and Management Dr. Omar Mohamed Copyright Omar Mohamed 2019 1 1 CHAPTER GOALS AND OBJECTIVES Be able to outline the progressive steps involved in developing an information risk management plan Know what is meant by “risk” and a “risk profile” Know the different ways one would go about creating a risk profile Know how one would go about conducting a risk assessment Know what an information risk mitigation plan is Copyright Omar Mohamed 2019 2
  • 47. 2 What is the purpose of Information Risk Planning? Identify potential risks to information Weighing risks against each other Creating strategic plans for risk mitigation Creating policies Develop Metrics Applying metrics to measure progress Audit and feedback Copyright Omar Mohamed 2019 3 3 Steps in Information Risk Planning and Management Step 1: Survey and Determine Legal and Regulatory Applicability and Requirements Step 2: Specify IG Requirements to Achieve Compliance Step 3: Create a Risk Profile
  • 48. Step 4: Perform Risk Analysis and Assessment Copyright Omar Mohamed 2019 4 Step 5: Develop an Information Risk Mitigation Plan Step 6: Develop Metrics and Measure Results Step 7: Execute The Risk Mitigation Plan Step 8: Audit the Information Risk Mitigation Program 4 Step 1: Survey and Determine Legal and Regulatory Applicability and Requirements Conduct Legislative Research-Legal requirements trump all other requirements Identify the jurisdictions(s) where the company operates Federal Provincial (international) State Municipal Approaches to legal research for retention, privacy and security laws: Records retention citation service (Example: FILELAW®)
  • 49. Use online Print resources (Example: Code of Federal Regulations “CFR”) Copyright Omar Mohamed 2019 5 5 Step 2: Specify IG Requirements to Achieve Compliance Compile list of external compliance requirements Map data, document, and records to external compliance requirements Devise a method of keeping legal and records management staff apprised of changes in regulations Reconcile Internal IG retention requirements with external compliance requirements Copyright Omar Mohamed 2019 6 6
  • 50. Step 3: Create a Risk Profile “RISK” – Effect of uncertainty on objectives1 “RISK PROFILE” – Description of a set of risks2 A part of Enterprise Risk Management Considerations for creating a Risk Profile Frequency External Resources Stakeholders ISO 31000 2009 Plain English, Risk Management Dictionary”, www.praxiom.com/iso-31000-terms.htm Included in Risk Profile Identification, documentation, assessment and prioritizing risk that an organization may face in pursuing a business objective Timeline: Projections 3 to 5 years into future Create annually Updated or reviewed semiannually Copyright Omar Mohamed 2019 7 7
  • 51. Step 3..Continued Types of Risk Profile Methodology Top-10 list-simple listing and ranking of top 10 risks in relation to the objective Risk Map – Visual tool, easy to grasp, grid depiction of a likelihood axis and impact axis-Generally rated on a 1 to 5 scale Heat Map-color coded matrix generated by stakeholders voting on risk by color (red is highest risk) Copyright Omar Mohamed 2019 8 8 Step 3..Continued Information Gathering for Risk Profile Surveys Person-to-Person Interviews Give interviewees questions in advance
  • 52. Schedule interviews at convenient times and places Keep interviews as short as possible Include questions about: Access and Security policies Policy development Policy adherence Retention of email Legal Hold policies Record Retention Record destruction Training and Communications Consider key events and changes that will impact risk Generate a list of risks and categorize (Example: natural disasters, regulatory, safety , competitive, etc.) Copyright Omar Mohamed 2019 9 9 Step 4: Perform Risk Analysis and Assessment Five steps for Risk Assessment: Identify the risks –The output of Risk Profile Determine Potential Impact-Include calculations for range of
  • 53. economic impact in dollars where available. Be as specific as possible Evaluate Risk Levels and Probabilities and Recommend Action- Recommendations for new procedures, new processes, new investments in IT, and other risk mitigation methods Create a Report with recommendations and implement-include risk assessment table where available, include written recommendations – implement Review periodically-at least annually but as appropriate for your organization Copyright Omar Mohamed 2019 10 10 Step 5: Develop an Information Risk Mitigation Plan What is a Risk Mitigation Plan? Plan which includes Options to reduce specific risks and increases likelihood of achieving objectives Tasks to reduce specific risks and increases likelihood of achieving objectives Timetable implementation of risk mitigation measures
  • 54. Milestones for implementing risk mitigation measures Timetable/Milestones for IT acquisitions Timetable/Milestones for assigning roles and responsibilities Copyright Omar Mohamed 2019 11 11 Step 6: Develop Metrics and Measure Results Assign quantitative measures that are Meaningful Measure progress What are relevant metrics? – Must be relevant to your organization. Examples are: Educe the data lost on stolen or misplaced laptops and mobile devices by ___ % over the prior year Reduce the number of hacker intrusion events by ___ over prior year Reduce e-discovery costs by __ % over prior year Reduce the number of adverse findings in the risk and compliance audit by ___% over last year Provide information risk training to __%of knowledge level workers this year
  • 55. Provide confidential messaging services for the organization’s top ___ executives this year Copyright Omar Mohamed 2019 12 12 Step 7: Execute Your Risk Mitigation Plan Set up regular project/program team meetings Develop Key Reports on key risk mitigation metrics Manage the process Use Project management tools and techniques Clear and concise communication with the IG team on progress and status Copyright Omar Mohamed 2019 13 13 Step 8: Audit the Information Risk Mitigation Program Key tools in the audit process?
  • 56. Metrics used to measure risk mitigation effectiveness Use Audit results for further redevelopment and fine tuning of the risk mitigation program Don’t misuse the audit results-Don’t use it to beat up on people- Use it for feedback and improvement Copyright Omar Mohamed 2019 14 14 The End Copyright Omar Mohamed 2019 15 15 ITS 833 – INFORMATION GOVERNANCE Chapter 5
  • 57. Strategic Planning and Best Practices for Information governance Dr. Omar Mohamed Copyright Omar Mohamed 2019 1 1 CHAPTER GOALS AND OBJECTIVES Be able to explain the general steps required in the strategic planning for an IG Plan Be able to identify key Best Practices as they relate to strategic planning for an IG Plan Copyright Omar Mohamed 2019 2 2
  • 58. First Step in Strategic Planning for Information Governance Program Secure commitment/sponsorship of executive management Resource acquisition Time Labor/Manpower $$$ Accountability But who?? Suggested: Chief compliance officer, Chief Information Officer, Chief Executive Officer Copyright Omar Mohamed 2019 3 3 Crucial Roles: So what is the role of this Executive Sponsor? Budget Planning and Control Decision Making Expectation Management
  • 59. Anticipation/Runs Interference for PM Approval Copyright Omar Mohamed 2019 4 What is the role of the Project Manager? Keep Executive Sponsor apprised of progress Implement/oversee daily tasks Track detailed progress Involve Executive Management only when necessary to do so 4 EVOVING ROLE OF EXECUTIVE SPONSOR The Role of the Executive Sponsor will change over the lifecycle of the IG program implementation Initial involvement requires greater TIME investment by executive management Early Implementation – Visible and Accessible Post-Implementation – Responsible for maintenance –ongoing
  • 60. communication with PM Copyright Omar Mohamed 2019 5 5 THE IG TEAM Who Should Be On Your IG Team? Take a Cross-Functional Approach Required: Executive Sponsor Legal Department or Outside Attorney IT Department Senior Records Officer Risk Management Specialist IG Program Manager Elective: Human Resources Analyst Rep from different business units or departments Copyright Omar Mohamed 2019 6
  • 61. 6 ASSIGNMENT OF ROLES AND RESPONSIBILITIES Executive Sponsor – designation of roles for: Project Manager Possibly from Legal, Compliance, Risk management, Records Management or IT Logically each IG team members take responsibility for their functional area of expertise Pair up team members or assign small work groups Resulting output of team effort: Final Draft of the IT strategic plan – Should be in a form ready to align with organizational strategic plan Copyright Omar Mohamed 2019 7 7
  • 62. ALIGNEMENT OF IG PLAN TO ORGANIZATIONAL STRATEGIC PLAN IG Plan MUST support the achievement of the Organization’s business objectives and its strategic plan IG Plan MUST be integrated with the IT strategy Decisions must be made with regard to the use of E-Discovery techniques like predictive coding technology in early case assessment and software that uses artificial intelligence Must take resource allocation into consideration Copyright Omar Mohamed 2019 8 8 SURVEY AND EVALUATE EXTERNAL FACTORS What External Factors? IT Trends – What new is coming online? What new is being developed? Which are too risky? What is the plan for long term digital preservation?
  • 63. Business Conditions and Economic Environment-Where is the industry/country in the recurring business cycle? What is the state of business conditions in your industry? Relevant Legal, Regulatory and Political Factor - Identify regulation affecting your industry. What is expected of future and anticipated regulation? Industry Best Practices-Survey your industry. What is your more progressive competition doing? Will you use 3rd Party consultants See Sample IG Best Practices taken from Different areas/industries on page 61-64 Copyright Omar Mohamed 2019 9 9 FORMULATING THE IG STRAEGIC PLAN Synthesize Information – Make the plan relevant to the information . Don’t linger Develop IG strategy for each critical area Maintain focus by developing IG strategy without regard to prioritizing critical areas Prioritize Strategies and map to organizational goals and
  • 64. objectives Develop Actionable Plans to Support Organizational Objectives and Goals Develop policies and plans that identify specific tasks and steps, and define roles and responsibilities Build checks and audits and other testing methods Create New IG Programs to Support Business Goals and Objectives Launch new “Sub-Programs” within the IG program Assign specific employee responsibility to specific tasks Have defined timeframes for subprograms Piece together subprograms Draft IG Strategic Plan and Gain Input from Broader Group of Stakeholders Get Buy-in and Sign-Off and Execute Plan Answer questions of top level management Address concerns Get them to buy-in to the program and sign off on it Copyright Omar Mohamed 2019 10 10
  • 65. The end Copyright Omar Mohamed 2019 11 11