Chapter 5. Achieving IMC: Introduction to the Seven Keys
In Chapter 4 we introduced the concept of IMC, and discussed how the concepts of Compliance and Information Management fit together to provide a new approach to Information Management. Here we will introduce the Seven IMC Keys, which form the basis of a methodology for all organizations to follow.
The Facts: Something Is Broken
FACT: | In 2006, a federal district court threw out a dealership's case against a car manufacturer where the dealership willfully withheld its computer system containing financial data from the manufacturer, and one of the principals deliberately lied about its whereabouts when he knew the system had been repossessed. In affirming the dismissal in 2008, the Eighth Circuit Court of Appeals stated that "[p]laintiffs have behaved like a pack of weasels and can't expect any part of their tale to be believed."[45] |
FACT: | A bankruptcy court judge in 2007 found a bankruptcy trustee guilty of bad faith destruction of evidence when he installed "GhostSurf" software on a computer prior to turning it over to the government. The judge also threatened the trustee with jail time if he did not turn over other computer equipment and data to the government.[46] |
FACT: | The Nuclear Regulatory Commission ordered changes in a nuclear plant located in San Onofre, California after discovering that a fire watch worker had falsified records and skipped hourly rounds on many occasions over five years.[47] |
FACT: | In 2008, the State of Texas ... |
Get Information Nation: Seven Keys to Information Management Compliance, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.