Book description
The essential guide to effective IG strategy and practice
Information Governance is a highly practical and deeply informative handbook for the implementation of effective Information Governance (IG) procedures and strategies. A critical facet of any mid- to large-sized company, this “super-discipline” has expanded to cover the management and output of information across the entire organization; from email, social media, and cloud computing to electronic records and documents, the IG umbrella now covers nearly every aspect of your business. As more and more everyday business is conducted electronically, the need for robust internal management and compliance grows accordingly. This book offers big-picture guidance on effective IG, with particular emphasis on document and records management best practices.
Step-by-step strategy development guidance is backed by expert insight and crucial advice from a leading authority in the field. This new second edition has been updated to align with the latest practices and regulations, providing an up-to-date understanding of critical IG concepts and practices.
- Explore the many controls and strategies under the IG umbrella
- Understand why a dedicated IG function is needed in today’s organizations
- Adopt accepted best practices that manage risk in the use of electronic documents and data
- Learn how IG and IT technologies are used to control, monitor, and enforce information access and security policy
IG strategy must cover legal demands and external regulatory requirements as well as internal governance objectives; integrating such a broad spectrum of demands into workable policy requires a deep understanding of key concepts and technologies, as well as a clear familiarity with the most current iterations of various requirements. Information Governance distills the best of IG into a primer for effective action.
Table of contents
- COVER
- PREFACE
- ACKNOWLEDGMENTS
- PART ONE: Information Governance Concepts, Definitions, and Principles
-
PART TWO: Information Governance Risk Assessment and Strategic Planning
- CHAPTER 4: Information Asset Risk Planning and Management
- CHAPTER 5: Strategic Planning and Best Practices for Information Governance
-
CHAPTER 6: Information Governance Policy Development
- The Sedona Conference IG Principles
- A Brief Review of Generally Accepted Recordkeeping Principles®
- IG Reference Model
- Best Practices Considerations
- Standards Considerations
- Benefits and Risks of Standards
- Key Standards Relevant to IG Efforts
- Major National and Regional ERM Standards
- Making Your Best Practices and Standards Selections to Inform Your IG Framework
- Roles and Responsibilities
- Program Communications and Training
- Program Controls, Monitoring, Auditing, and Enforcement
- Notes
-
PART THREE: Information Governance Key Impact Areas
-
CHAPTER 7: Information Governance for Business Units
- Start with Business Objective Alignment
- Which Business Units Are the Best Candidates to Pilot an IG Program?
- What Is Infonomics?
- How to Begin an IG Program
- Business Considerations for an IG Program
- Changing Information Environment
- Calculating Information Costs
- Big Data Opportunities and Challenges
- Full Cost Accounting for Information
- Calculating the Cost of Owning Unstructured Information
- The Path to Information Value
- Challenging the Culture
- New Information Models
- Future State: What Will the IG-Enabled Organization Look Like?
- Moving Forward
- Notes
-
CHAPTER 8: Information Governance and Legal Functions
- Introduction to E-Discovery: The Revised 2006 and 2015 Federal Rules of Civil Procedure Changed Everything
- Big Data Impact
- More Details on the Revised FRCP Rules
- Landmark E-Discovery Case: Zubulake v. UBS Warburg
- E-Discovery Techniques
- E-Discovery Reference Model
- The Intersection of IG and E-Discovery
- Building on Legal Hold Programs to Launch Defensible Disposition
- Destructive Retention of E-Mail
- Newer Technologies That Can Assist in E-Discovery
- Defensible Disposal: The Only Real Way to Manage Terabytes and Petabytes
- Notes
-
CHAPTER 9: Information Governance and Records and Information Management Functions
- Records Management Business Rationale
- Why Is Records Management So Challenging?
- Benefits of Electronic Records Management
- Additional Intangible Benefits
- Inventorying E-Records
- RM Intersection with Data Privacy Management
- Generally Accepted Recordkeeping Principles®
- E-Records Inventory Challenges
- Records Inventory Purposes
- Records Inventorying Steps
- Appraising the Value of Records
- Ensuring Adoption and Compliance of RM Policy
- Sample Information Asset Survey Questions
- General Principles of a Retention Scheduling
- Developing a Records Retention Schedule
- Why Are Retention Schedules Needed?
- What Records Do You Have to Schedule? Inventory and Classification
- Rationale for Records Groupings
- Records Series Identification and Classification
- Retention of E-Mail Records
- How Long Should You Keep Old E-Mails?
- Destructive Retention of E-Mail
- Legal Requirements and Compliance Research
- Event-Based Retention Scheduling for Disposition of E-Records
- Prerequisites for Event-Based Disposition
- Final Disposition and Closure Criteria
- Retaining Transitory Records
- Implementation of the Retention Schedule and Disposal of Records
- Ongoing Maintenance of the Retention Schedule
- Audit to Manage Compliance with the Retention Schedule
- Notes
- CHAPTER 10: Information Governance and Information Technology Functions
-
CHAPTER 11: Information Governance and Privacy and Security Functions
- Information Privacy
- Generally Accepted Privacy Principles
- Fair Information Practices (FIPS)
- OCED Privacy Principles
- Madrid Resolution 2009
- EU General Data Protection Regulation
- GDPR: A Look at Its First Year
- Privacy Programs
- Privacy in the United States
- Privacy Laws
- Cybersecurity
- Cyberattacks Proliferate
- Insider Threat: Malicious or Not
- Information Security Assessments and Awareness Training
- Cybersecurity Considerations and Approaches
- Defense in Depth
- Controlling Access Using Identity Access Management
- Enforcing IG: Protect Files with Rules and Permissions
- Challenge of Securing Confidential E-Documents
- Apply Better Technology for Better Enforcement in the Extended Enterprise
- E-Mail Encryption
- Secure Communications Using Record-Free E-Mail
- Digital Signatures
- Document Encryption
- Data Loss Prevention (DLP) Technology
- Missing Piece: Information Rights Management (IRM)
- Embedded Protection
- Hybrid Approach: Combining DLP and IRM Technologies
- Securing Trade Secrets After Layoffs and Terminations
- Persistently Protecting Blueprints and CAD Documents
- Securing Internal Price Lists
- Approaches for Securing Data Once It Leaves the Organization
- Document Labeling
- Document Analytics
- Confidential Stream Messaging
- Notes
-
CHAPTER 7: Information Governance for Business Units
-
PART FOUR: Information Governance for Delivery Platforms
-
CHAPTER 12: Information Governance for E-Mail and Instant Messaging
- Employees Regularly Expose Organizations to E-Mail Risk
- E-Mail Polices Should Be Realistic and Technology Agnostic
- E-Record Retention: Fundamentally a Legal Issue
- Preserve E-Mail Integrity and Admissibility with Automatic Archiving
- Instant Messaging
- Best Practices for Business IM Use
- Technology to Monitor IM
- Tips for Safer IM
- Team and Channel Messaging Solutions Emerge
- Notes
-
CHAPTER 13: Information Governance for Social Media
- Types of Social Media in Web 2.0
- Additional Social Media Categories
- Social Media in the Enterprise
- Key Ways Social Media Is Different from E-Mail and Instant Messaging
- Biggest Risks of Social Media
- Legal Risks of Social Media Posts
- Tools to Archive Social Media
- IG Considerations for Social Media
- Key Social Media Policy Guidelines
- Records Management and Litigation Considerations for Social Media
- Emerging Best Practices for Managing Social Media Records
- Notes
- CHAPTER 14: Information Governance for Mobile Devices
-
CHAPTER 15: Information Governance for Cloud Computing
- Defining Cloud Computing
- Key Characteristics of Cloud Computing
- What Cloud Computing Really Means
- Cloud Deployment Models
- Benefits of the Cloud
- Security Threats with Cloud Computing
- Managing Documents and Records in the Cloud
- IG Guidelines for Cloud Computing Solutions
- IG for SharePoint and Office365
- Notes
-
CHAPTER 16: Leveraging and Governing Emerging Technologies
- Data Analytics
- Descriptive Analytics
- Diagnostic Analytics
- Predictive Analytics
- Prescriptive Analytics
- Which Type of Analytics Is Best?
- Artificial Intelligence
- The Role of Artificial Intelligence in IG
- Blockchain: A New Approach with Clear Advantages
- Breaking Down the Definition of Blockchain
- The Internet of Things: IG Challenges
- IoT as a System of Contracts
- IoT Basic Risks and IG Issues
- IoT E-Discovery Issues
- Why IoT Trustworthiness Is a Journey and Not a Project
- Governing the IoT Data
- IoT Trustworthiness
- Information Governance Versus IoT Trustworthiness
- IoT Trustworthiness Journey
- Conclusion
- Notes
-
CHAPTER 12: Information Governance for E-Mail and Instant Messaging
-
PART FIVE: Long-Term Program Issues
-
CHAPTER 17: Long-Term Digital Preservation
- Defining Long-Term Digital Preservation
- Key Factors in Long-Term Digital Preservation
- Threats to Preserving Records
- Digital Preservation Standards
- PREMIS Preservation Metadata Standard
- Recommended Open Standard Technology–Neutral Formats
- Digital Preservation Requirements
- Long-Term Digital Preservation Capability Maturity Model®
- Scope of the Capability Maturity Model
- Digital Preservation Capability Performance Metrics
- Digital Preservation Strategies and Techniques
- Evolving Marketplace
- Looking Forward
- Conclusion
- Notes
- CHAPTER 18: Maintaining an Information Governance Program and Culture of Compliance
-
CHAPTER 17: Long-Term Digital Preservation
-
APPENDIX A: Information Organization and Classification: Taxonomies and Metadata
- Importance of Navigation and Classification
- When Is a New Taxonomy Needed?
- Taxonomies Improve Search Results
- Metadata and Taxonomy
- Metadata Governance, Standards, and Strategies
- Types of Metadata
- Core Metadata Issues
- International Metadata Standards and Guidance
- Records Grouping Rationale
- Business Classification Scheme, File Plans, and Taxonomy
- Classification and Taxonomy
- Prebuilt Versus Custom Taxonomies
- Thesaurus Use in Taxonomies
- Taxonomy Types
- Business Process Analysis
- Taxonomy Testing: A Necessary Step
- Taxonomy Maintenance
- Social Tagging and Folksonomies
- Endnotes
-
APPENDIX B: Laws and Major Regulations Related to Records Management
- United States
- Gramm-Leach-Bliley Act
- Healthcare Insurance Portability and Accountability Act of 1996 (HIPAA)
- PATRIOT Act (Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001)
- Sarbanes-Oxley Act (SOX)
- SEC Rule 17A-4
- CFR Title 47, Part 42—Telecommunications
- CFR Title 21, Part 11—Pharmaceuticals
- US Federal Authority on Archives and Records: National Archives and Records Administration (NARA)
- US Code of Federal Regulations
- Canada*
- United Kingdom
- Australia
- Identifying Records Management Requirements in Other Legislation
- Notes
- APPENDIX C: Laws and Major Regulations Related to Privacy
- GLOSSARY
- ABOUT THE AUTHOR
- ABOUT THE MAJOR CONTRIBUTORS
- INDEX
- END USER LICENSE AGREEMENT
Product information
- Title: Information Governance, 2nd Edition
- Author(s):
- Release date: December 2019
- Publisher(s): Wiley
- ISBN: 9781119491446
You might also like
book
Corporate Governance Matters, 3rd Edition
gives corporate board members, officers, directors, and other stakeholders all the knowledge they need to implement …
book
MASTER DATA MANAGEMENT AND DATA GOVERNANCE, 2/E, 2nd Edition
The latest techniques for building a customer-focused enterprise environment "The authors have appreciated that MDM is …
book
Data Governance For Dummies
How to build and maintain strong data organizations—the Dummies way Data Governance For Dummies offers an …
book
The Handbook of Board Governance, 2nd Edition
The revised new edition of the must-read guide for executives—provides comprehensive coverage of topics in corporate …