198 Lotus blogs updated hourly. Who will post next? Home | Blogs | Search | About 
 
Latest 7 Posts
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 2
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 1
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 4
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 2
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 8
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 1
Top 10
Avoiding Mishaps in eDiscovery Collections
Tue, Jan 20th 2015 8
Coming Soon for Discovery Attender, Version 3.92
Thu, Nov 5th 2015 8
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 8
Information governance certification: AIIM vs. ARMA
Mon, Jul 7th 2014 7
Off the topic: 10 must-do fall activities
Mon, Aug 24th 2015 7
How to Survive Data Discovery in the Digital age
Mon, May 9th 2016 7
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 7
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 7
Policies for your organization’s IG strategy. Classification, we don’t need no stinking classification.
Mon, Aug 24th 2015 5
Top 10 Horror Movies for Halloween
Thu, Oct 29th 2015 5


Ways to avoid Information Governance pitfalls
Twitter Google+ Facebook LinkedIn Addthis Email Gmail Flipboard Reddit Tumblr WhatsApp StumbleUpon Yammer Evernote Delicious
Jeff Tujetsch    

Ways to avoid Information Governance pitfalls

Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is.  There are many components to IG, with the two major players being software and people. In this article, I will try to expose possible issues that you can hopefully avoid.

For those of you that have had school-age kids, you can attest to the kids succeeding more when a routine is established and followed. So why am I talking about routine? Because IG is all about routine. It’s about software performing its work on a scheduled basis and about how your fellow employees consistently manage their data.

So, let’s take a look at some possible pitfalls when it comes to Information Governance:

  1. Communication

This pitfall or mistake is the most fragile, volatile, forgotten, and easily the most important component of IG. If the proper communication is not performed and maintained with all stakeholders and employees, IG will fail. Communication is so vital to the creation, implementation, enforcement, maturation, and mutation of the Information Governance process. Therefore, the proper people need to be involved with each one.

a. Creation

In order to properly create your IG strategy, you must not use the ‘Cone of Silence’. IG is not a secret, instead everyone should not only know that IG policies are being implemented, but also be know why it’s important to your company’s future. Not everyone will be involved with the creation of your IG strategy, but you cannot work from a vacuum either. You must be sure to include representation from every department in your company, because you must know all forms of data created, stored, and used within your company.

b. Implementation

The process for implementing your IG strategy will be complex, time-consuming and will take months or even years. Though this could be a tedious, arduous process, you must stay the course and focus on the big picture. This might sound strange, but an analogy I like to make with IG is the fortified cities of centuries ago. The walls, moats, etc. took months/years to build but the people focused on a bigger picture- keeping themselves safe. The same is true for IG. It will be a long process, but don’t falter because the protection it affords is worth the effort.

c. Enforcement

There are two ways to enforce IG; automatically and manually. The automatic process is software that you use to enforce IG on the data you specified. The manual process is performed by users. This will be an iterative process to not only initiate IG, but to also schedule and perform IG. As much as I love automation, not everything can be automated. This means the users must be fully trained on how they are to be involved in the IG process. If they are not fully trained, IG will fail.

d. Maturation

Your IG process will begin at a frantic pace. However, as the process progresses, you and your team will have a chance to catch your breath. Keep in mind, this could be many months down the road. However, this is not a time to rest. Instead, you need to remain diligent and vigilant. Don’t assume all is well. Instead, spot-check your processes and do a random sampling of your data, to ensure you are still on track.

e. Mutation

Your IG process will change. That is a given. People will leave, software will become obsolete, new software will be purchased, etc. You must be willing and able to adjust. Routine is important, but so is being willing to adjust your routine. Don’t fall into the trap of making change for the sake of change, but at the same time, don’t be unwilling to adapt to change. It is inevitable.

There are some other pitfalls that could also expose themselves (and probably will) and they both come back to one indisputable fact…humans are flawed. No matter how hard we try, no matter how much we analyze, there will be mistakes. IG is a process that is never-ending and the key is staying on the right track. There will be times you feel like you are meandering around and never taking two consecutive steps in the same direction. Just be sure to stay the course and everything will fall into place.

Flawed decisions

Measure twice, cut once. Perform the proper due diligence, collect the necessary information and then make an informed decision. Analysis paralysis serves no one. But be prepared to discover a decision you confidently made, is now incorrect. This is not to say that all decisions made initially will be wrong. But things change, new laws are made, etc. The key here is to not be afraid to change your IG strategy. Don’t fall into the trap of “We’ve always done it this way.”

Flawed users

Users are integral to the IG process. Since IG cannot be fully automated, users must be educated as to how they are to comply with IG, as well as why they are to comply. You must make sure users are on board with this. If your company follows the mantra of “These are the rules and you don’t need to know why”, do not expect IG to be successful. Some of the most successful companies are those that are employee-owned. Even if that is not the case for your company, you need to have everyone invest and believe in the IG process. If you want IG to work, you cannot have any users that are not assimilated.

In the end, these are a couple pitfalls one may typically see with IG. If you would like more information on Information Governance or any of our products, please visit our website at www.sherpasoftware.com or Contact Us.

 

The post Ways to avoid Information Governance pitfalls appeared first on Sherpa Software.



---------------------
http://sherpasoftware.com/blog/ways-avoid-information-governance-pitfalls/
Oct 05, 2016
8 hits



Recent Blog Posts
2
Ways to avoid Information Governance pitfalls
Wed, Oct 5th 2016 2:25p   Jeff Tujetsch
Ways to avoid Information Governance pitfalls Information Governance (IG) -It sounds like it is a very extensive process because unfortunately, it is.  There are many components to IG, with the two major players being software and people. In this article, I will try to expose possible issues that you can hopefully avoid. For those of you that have had school-age kids, you can attest to the kids succeeding more when a routine is established and followed. So why am I talking about routine? Beca
1
Finding PCI and PII Data with Discovery Attender
Wed, Sep 21st 2016 1:21p   Marta Farensbach
Various privacy laws and other data security regulations detail how private, financial, and other confidential records should be handled. These rules cover the usage and storage of data, such as credit card numbers, social security numbers, social insurance information, and health care records. As described in a previous blog article, having this Personally Identifiable information (PII) or Payment Card Industry (PCI) data loose in your system can cause all kinds trouble, ranging from fi
2
Bring Your Own Device & Data Security
Tue, Aug 30th 2016 4:25p   Harvey Coblin
With the proliferation of portable electronic devices, increasing numbers of professionals are preferring to carry their own smart phones, laptops, tablets, etc. to use for work-related purposes. Rather than transporting duplicate devices to distinguish between professional vs. personal data, employees can work where and when they please and with hardware and applications they are already familiar with. It is estimated worldwide that one in three employees are utilizing personal devices at the
1
Understanding the General Data Protection Regulation
Wed, Aug 24th 2016 1:13p   Rick Wilson
If your organization has international operations in the European Union, you should be planning for GDPR compliance now! The General Data Protection Regulation (GDPR) is set to become the overriding data protection regulation with the EU. It was adopted by the European Parliament Council and Commission in 2015, took effect in 2016 and enforcement is scheduled to begin in May of 2018. At its core, the GDPR is intended to provide citizens of the EU with greater control over their personal data
0
Targeting Risks in IT – 5 Things to Consider
Mon, Jul 11th 2016 6:04p   Marta Farensbach
Today’s compliance, litigation, and regulation-heavy business environments introduce a number of challenges for busy IT professionals. Ignoring any of these areas, as well as failing to implement a strong Information Governance (IG) platform, can introduce substantial risk into your organization. In the worst cases, data breaches, adverse judgements, or non-compliance penalties could thrust a company into the glare of national headlines. Poor policy can affect more than just the finances of a
1
FOIA reforms are on the way, are you ready?
Wed, Jun 22nd 2016 2:06p   Rick Wilson
If you are employed by a federal government agency, then you are probably well aware of FOIA, or the Freedom of Information Act. FOIA was originally signed into law during the 1960’s by then President Lyndon B. Johnson to establish a process whereby citizens can request copies of governmental records that are not published in the Federal Registry. Agencies, in turn, are required to provide this information in a timely fashion (usually 20 days). Although FOIA is a federal mandate, it has also
0
Breach of Security: Measuring the Cost of Cyber Crime
Wed, Jun 8th 2016 2:10p   Harvey Coblin
Cybercrime is an increasing threat. Estimates vary widely, but according to a recent Reuters article, “Cyber crime costs (the) global economy $445 billion a year.” Other estimates place the costs as high as $1 trillion. The reason estimates vary is due in part to the fact that cybercrime can come in many forms, ranging from denial of service, theft of credit card or other financial information  (PCI/PII), industrial espionage, all the way up the ladder to state-sponsored terroris
1
How to Survive Data Discovery in the Digital Age
Wed, May 18th 2016 12:42p   Jeff Tujetsch
eDiscovery. That one word will make IT professionals start shaking. But, as the most technologically advanced civilization in the world, why is that? Is it because of what will be found? Is it because of what they are asked to search? Or is it because of the search terms they are asked to use? Well, the answer to each question is ‘Yes’. Data Discovery has grown into a multi-billion dollar world-wide business. Though the United States might lead the way because of our litigiousness,
1
Information Governance and the Internet of Things
Wed, May 11th 2016 2:28p   Marta Farensbach
Machines talking to machines.  Once the province of science fiction, the Internet of Things is set to transform industries as visionaries incorporate its wide reach into everyday objects. On a very simple level, the Internet of Things (IoT) describes the freeing of communication from the domain of computers and smart phones by allowing all types of devices to share information across the internet.  ‘Things’ like cars, fridges, health monitors, water meters and so much more can be empower
1
WHITE PAPER: Implementing Office 365: Inherent Features and the Need for Third Party Tools
Wed, May 4th 2016 12:59p   bhat67i
In this white paper, the topic of Office 365 and complementary solutions will be discussed; insights will be offered on a business’ future migration plans and knowing the options available. One will learn:  Why Office 365 is a compelling platform, Examples of productivity integrations, About the importance of information governance integration, Supplementing with third party software Click here to download this white paper! The post WHITE PAPER: Implementing Office 365: Inherent Fea




Created and Maintained by Yancy Lent - About - Planet Lotus Blog - Advertising - Mobile Edition