SlideShare a Scribd company logo
1 of 25
Download to read offline
Navigating Information
          Governance and eDiscovery
              Implementing Processes and Technologies to
              Reduce Risk and Increase Strategic Advantage



Shannon Smith, Esq., Director of Information Governance, Globanet
Agenda
  1   Why Does Information Governance Matter?


  2   Implementing Processes


  3   Implementing Technology


  4   Symantec Solutions



  5   Q&A




                                                2
Agenda

  1   Why Does Information Governance Matter?


  2   Implementing Processes


  3   Implementing Technology


  4   Symantec Solutions



  5   Q&A



                                                3
Information Governance

Information governance is the set of
multi-disciplinary structures, policies,
procedures, processes and controls
implemented to manage information on
all media in such a way that it supports
an organization's immediate and future
regulatory, legal, and operational
requirements.
    An effective information governance program
      should balance risk, value, and efficiency.

                                                    4
Information Governance Challenges:
Multiple Stakeholders




                                     5
Objectives on an Information Governance Program
             • Ensure compliance with internal and external directives

                      • Assist in making informed business decisions
                      • Enable third parties to judge the conduct of the
                        organization by providing administrative, fiscal, and
                        legal accountability
                      • Assure the most complete historical documentation of
                        the organization’s actions

 • Maintain good business practices – information governance creates efficiency
 • Reduce the burden associated with locating and preserving records that may
   be the subject of litigation

                   Create a culture whereby employees value
                    information as a shared, corporate asset

                                                                                6
Why Does Information Governance Matter?




                                          7
DuPont v. Kolon
  The Value of a Strong Preservation Process

                            • Misappropriation of trade secrets, theft of
                              business information, and conspiracy
                            • DuPont moved for spoliation of evidence based
                              on evidence that emails and other documents
                              were marked by employees for deletion
                            • RESULT: judge imposes an adverse inference jury
                              instruction and awards DuPont attorneys’
                              fees, expenses and costs related to the motion
Take aways:
• Imperative to have a preservation process in place ahead of time
• Written notices should be issued to all affected
   employees, tracked, and translated when necessary
• Preservation should include IT early on
               A thoughtful preservation process gave
                 DuPont a clear strategic advantage
                                                                                8
Agenda

  1   Why Does Information Governance Matter?


  2   Implementing Processes


  3   Implementing Technology


  4   Symantec Solutions



  5   Q&A



                                                9
How Mature is your IG Program?
•   Level 1 (Sub-standard):
     – recordkeeping concerns are either not addressed at all, or in a very ad hoc manner
     – should be concerned that their programs will not meet legal or regulatory scrutiny
•   Level 2 (In Development):
     – developing recognition that recordkeeping has an impact on the organization, and that the
        organization may benefit from a more defined information governance program
     – still vulnerable to legal or regulatory scrutiny since practices are ill-defined and still largely ad
        hoc in nature.
•   Level 3 (Essential):
     – defined policies and procedures, and more specific decisions taken to improve recordkeeping
     – may still be missing significant opportunities for streamlining business and controlling costs
•   Level 4 (Proactive):
     – information governance issues are integrated into business decisions on a routine basis
     – easily meets its legal and regulatory requirements; should begin to consider the business
        benefits of information availability in transforming their organizations globally
•   Level 5 (Transformational):
     – integrated information governance into its overall corporate infrastructure and business
        processes to such an extent that compliance with the program requirements is routine
     – recognized that effective information governance plays a critical role in cost containment,
        competitive advantage, and client service
                                                                     ARMA Maturity Model for Information Governance



                                                                                                              10
Where to Begin – Policy

• Develop, document and enforce consistent policies

• Know where your records are stored

• Distinguish records from non-records; tie a value to
  information assets




                                                         11
Where to Begin – Process

• Don’t attempt to boil the ocean – be selective

• Adopt processes with users in mind

• Establish points of sharing and collaboration

• Leverage automation where it makes sense

• Test and adjust processes periodically to improve efficiencies




                                                                   12
Agenda
  1   Why Does Information Governance Matter?


  2   Implementing Processes


  3   Implementing Technology


  4   Symantec Solutions



  5   Q&A




                                                13
Information Governance & Technology Challenges

    Difficult to                Difficult to                Difficult to
    Consolidate                  Control                      Access
 • Multiple data            • Ownership of              • Visibility into multiple
   repositories across        information assets          repositories
   business units           • Enforcing information     • Implementing
 • Multitude of data          controls and policies       permissions and
   types and outlets          (internal and external)     security controls
 • Value of information     • Corporate data            • Identification and
   assets varies              leakage                     collection for
 • On-premise vs. offsite                                 investigatory or
                                                          litigation purposes




                                                                                     14
Where to Begin – Policy

• Develop, document and enforce consistent policies

• Know where your records are stored

• Distinguish records from non-records; tie a value to
  information assets




                                                         15
Social Media has Fundamentally Changed
                         Communication
•      2/3 of the global internet population                 •    Social network users surpassed email
       visits social media networks                               users in July 2009
       Source: Nielsen, Global Faces & Networked                  Source: Morgan Stanley’s “Slow death of email”
       Faces, 2009
                                                             •    By 2014 20% of companies will use
•      86% of Financial Service professionals                     Social Media as the primary vehicle
       use social media up from 73% the                           for communication replacing email
       previous year                                              Source: Gartner
       Source: American Century Investments 2011




                            200 Million active
                            users                                                                     5 Billion Photos
                                                            490 Million users
500 Million active users



                                                                                       10 Million Users
                                       100 Million active
                                       users




                                                                                                                   16
                                                                                                                   16
Technology to Support an IG Program
Important Considerations

                                                 Ensure integration across
                                                   solutions to achieve
 Consider solutions that support                        efficiencies
 automation of certain functions
                                     Implement solutions that
                                   enable the sharing or transfer
                                   of data across the enterprise;
             Deployment Model         reduce use of data silos
                On Premise
                   Cloud
                  Hybrid                    Reporting, audit, chain of
                                            custody across solutions


                                                                             1
                                                                             7
Agenda
  1   Why Does Information Governance Matter?


  2   Implementing Processes


  3   Implementing Technology


  4   Symantec Solutions



  5   Q&A




                                                18
Symantec Information Intelligence
•   Enterprise Vault
•   Discovery Accelerator
•   Compliance Accelerator
•   Data Classification Services
•   EV.Cloud
•   Clearwell
•   Data Insight Manager
•   Network Discover
•   Endpoint Discover
•   NetBackup Search 1
•   Brightmail Gateway

                                                Notes:
                                       1 – Release TBA



                                                  19
Symantec Solutions
Breadth & Depth of IG Technology

 EMAIL
 SERVERS           Store         Manage           Discover               LEGAL

 FILE
 SERVERS
                 Migration     Classification      Identify
 IM
 SERVERS        Compression     Retention          Collect
                                                                 INFO
                                                                 SEC
 SHAREPOINT    Deduplication     Deletion       Process & Cull

 LEGACY         Transparency   Preservation        Review
 DATABASES                                                                HR


 DESKTOPS
                                                                 END
                                                                 USERS
 SOCIAL
 MEDIA




                                                                                 20
Data Classification Services (DCS)
          Policy Driven Classification                   What does it do?
   – Archive decision, retention, tags        – Analyzes content and metadata during
                                                archiving
   – Reduces the cost of reactive
     Discovery                                – Decides on an archiving and retention
                                                strategy
   – Prioritizes items for supervisory
     review                                   – Assigns searchable classification tags




Symantec Enterprise Vault™ 10
                                         21
Customer Presentation
Enterprise Vault.cloud
                              Purely Hosted
                              • No mandatory hardware and software to install and maintain
                              • Low upfront investment & total cost of ownership
                              • Flat fee per mailbox per month includes service upgrades

  Enterprise Vault.cloud
                              Unlimited Storage & Rapid Search
 Email Storage Management
                              • Unlimited email storage and retention
 Email eDiscovery            • Rapid search results from scalable grid architecture
                              • No mailbox size limits for end users
 Email Compliance
 Mailbox Continuity option
                              Enterprise-class Infrastructure & Security
                              • Redundant, scalable, Tier 4 data centers
                              • Data encrypted in transit & at rest
                              • 24/7/365 support included in cost of service




                                                                                       22
Enterprise-Wide Information Governance
    Records Management                  Legal                   Compliance




     • Define and enforce      • Effective legal hold       • Meet regulatory
       retention policies        management                  requirements

     • Automate record         • Reduce processing and      •Streamline supervision
       classification            review costs
                                                            • End-to-end audit
     • Report and audit        • Define and enforce           capabilities
       capability                retention policies


                                  IT Management

             • Reduce storage costs,    • Satisfy demands     • Eliminate data silos
               improve performance        from legal           and increase access



                                                                                       23
Agenda
  1   Why Does Information Governance Matter?


  2   Implementing Processes


  3   Implementing Technology


  4   Symantec Solutions



  5   Q&A




                                                24
About Globanet
Globanet is a strategic Symantec partner specializing in information
management solutions. We provide our customers with products and services
to help them manage data more efficiently while reducing risk.

Our portfolio of offerings includes
- Select Symantec products including Enterprise
  Vault, Clearwell, Netbackup, and Storage Foundation
- Globanet’s Merge1 for archiving of electronic communications including data
  from Bloomberg, Blackberry, Reuters, Facebook, and other data sources
- Custom development for Enterprise Vault
- Services to deploy, customize, and manage Enterprise Vault and Clearwell
- Consulting on information governance topics including records
  management, litigation readiness, and ediscovery workflow




                                                                           25

More Related Content

Similar to Information governance process & technology

Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiRobust Marketing & Consulting (Pty) Ltd
 
Doing Information Management Right
Doing Information Management Right Doing Information Management Right
Doing Information Management Right Lane Severson
 
A future history of content management
A future history of content managementA future history of content management
A future history of content managementJohn Mancini
 
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 201015. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 2010Brian Bailey
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due DiligenceResilient Systems
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
How to build an E-procurement Machine - Concept to-control
How to build an E-procurement Machine - Concept to-controlHow to build an E-procurement Machine - Concept to-control
How to build an E-procurement Machine - Concept to-controlCoupa Software
 
Liquent IUG Presentation Feb 2013
Liquent IUG Presentation Feb 2013Liquent IUG Presentation Feb 2013
Liquent IUG Presentation Feb 2013claudiapyne
 
Lecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxLecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxRoshanKC10
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuwebtc01
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuweben01
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decisioneuwebsc01
 
The Very Best Intranets and Digital Workplaces of 2017
The Very Best Intranets and Digital Workplaces of 2017The Very Best Intranets and Digital Workplaces of 2017
The Very Best Intranets and Digital Workplaces of 2017Prescient Digital Media
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...Paris Open Source Summit
 
OpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE socialOpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE socialeaopenq
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory IntelligenceArmin Torres
 
Data Governance: Description, Design, Delivery
Data Governance: Description, Design, DeliveryData Governance: Description, Design, Delivery
Data Governance: Description, Design, DeliveryInnoTech
 

Similar to Information governance process & technology (20)

Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
IaaS
IaaSIaaS
IaaS
 
Doing Information Management Right
Doing Information Management Right Doing Information Management Right
Doing Information Management Right
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
A future history of content management
A future history of content managementA future history of content management
A future history of content management
 
Data governance guide
Data governance guideData governance guide
Data governance guide
 
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 201015. Brian Bailey presentation 2 DQ Asia Pacific 2010
15. Brian Bailey presentation 2 DQ Asia Pacific 2010
 
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
3rd Party Risk: Practical Considerations for Privacy & Security Due Diligence
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
How to build an E-procurement Machine - Concept to-control
How to build an E-procurement Machine - Concept to-controlHow to build an E-procurement Machine - Concept to-control
How to build an E-procurement Machine - Concept to-control
 
Liquent IUG Presentation Feb 2013
Liquent IUG Presentation Feb 2013Liquent IUG Presentation Feb 2013
Liquent IUG Presentation Feb 2013
 
Lecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptxLecture 2- Knowledge Managment .pptx
Lecture 2- Knowledge Managment .pptx
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
Making Informed Decision
Making Informed DecisionMaking Informed Decision
Making Informed Decision
 
The Very Best Intranets and Digital Workplaces of 2017
The Very Best Intranets and Digital Workplaces of 2017The Very Best Intranets and Digital Workplaces of 2017
The Very Best Intranets and Digital Workplaces of 2017
 
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
#OSSPARIS19 - Understanding Open Source Governance - Gilles Gravier, Wipro Li...
 
OpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE socialOpenQ webinar 8/27/12 SafeGuard SAFE social
OpenQ webinar 8/27/12 SafeGuard SAFE social
 
Regulatory Intelligence
Regulatory IntelligenceRegulatory Intelligence
Regulatory Intelligence
 
Data Governance: Description, Design, Delivery
Data Governance: Description, Design, DeliveryData Governance: Description, Design, Delivery
Data Governance: Description, Design, Delivery
 

Recently uploaded

Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsSafe Software
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdfPedro Manuel
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Websitedgelyza
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024D Cloud Solutions
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Brian Pichman
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-pyJamie (Taka) Wang
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostMatt Ray
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioChristian Posta
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesMd Hossain Ali
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfAijun Zhang
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8DianaGray10
 

Recently uploaded (20)

20230104 - machine vision
20230104 - machine vision20230104 - machine vision
20230104 - machine vision
 
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration WorkflowsIgniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Nanopower In Semiconductor Industry.pdf
Nanopower  In Semiconductor Industry.pdfNanopower  In Semiconductor Industry.pdf
Nanopower In Semiconductor Industry.pdf
 
COMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a WebsiteCOMPUTER 10 Lesson 8 - Building a Website
COMPUTER 10 Lesson 8 - Building a Website
 
Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024Artificial Intelligence & SEO Trends for 2024
Artificial Intelligence & SEO Trends for 2024
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
201610817 - edge part1
201610817 - edge part1201610817 - edge part1
201610817 - edge part1
 
Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )Building Your Own AI Instance (TBLC AI )
Building Your Own AI Instance (TBLC AI )
 
20230202 - Introduction to tis-py
20230202 - Introduction to tis-py20230202 - Introduction to tis-py
20230202 - Introduction to tis-py
 
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCostKubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
KubeConEU24-Monitoring Kubernetes and Cloud Spend with OpenCost
 
Comparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and IstioComparing Sidecar-less Service Mesh from Cilium and Istio
Comparing Sidecar-less Service Mesh from Cilium and Istio
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just MinutesAI Fame Rush Review – Virtual Influencer Creation In Just Minutes
AI Fame Rush Review – Virtual Influencer Creation In Just Minutes
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
Machine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdfMachine Learning Model Validation (Aijun Zhang 2024).pdf
Machine Learning Model Validation (Aijun Zhang 2024).pdf
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8UiPath Studio Web workshop series - Day 8
UiPath Studio Web workshop series - Day 8
 

Information governance process & technology

  • 1. Navigating Information Governance and eDiscovery Implementing Processes and Technologies to Reduce Risk and Increase Strategic Advantage Shannon Smith, Esq., Director of Information Governance, Globanet
  • 2. Agenda 1 Why Does Information Governance Matter? 2 Implementing Processes 3 Implementing Technology 4 Symantec Solutions 5 Q&A 2
  • 3. Agenda 1 Why Does Information Governance Matter? 2 Implementing Processes 3 Implementing Technology 4 Symantec Solutions 5 Q&A 3
  • 4. Information Governance Information governance is the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage information on all media in such a way that it supports an organization's immediate and future regulatory, legal, and operational requirements. An effective information governance program should balance risk, value, and efficiency. 4
  • 6. Objectives on an Information Governance Program • Ensure compliance with internal and external directives • Assist in making informed business decisions • Enable third parties to judge the conduct of the organization by providing administrative, fiscal, and legal accountability • Assure the most complete historical documentation of the organization’s actions • Maintain good business practices – information governance creates efficiency • Reduce the burden associated with locating and preserving records that may be the subject of litigation Create a culture whereby employees value information as a shared, corporate asset 6
  • 7. Why Does Information Governance Matter? 7
  • 8. DuPont v. Kolon The Value of a Strong Preservation Process • Misappropriation of trade secrets, theft of business information, and conspiracy • DuPont moved for spoliation of evidence based on evidence that emails and other documents were marked by employees for deletion • RESULT: judge imposes an adverse inference jury instruction and awards DuPont attorneys’ fees, expenses and costs related to the motion Take aways: • Imperative to have a preservation process in place ahead of time • Written notices should be issued to all affected employees, tracked, and translated when necessary • Preservation should include IT early on A thoughtful preservation process gave DuPont a clear strategic advantage 8
  • 9. Agenda 1 Why Does Information Governance Matter? 2 Implementing Processes 3 Implementing Technology 4 Symantec Solutions 5 Q&A 9
  • 10. How Mature is your IG Program? • Level 1 (Sub-standard): – recordkeeping concerns are either not addressed at all, or in a very ad hoc manner – should be concerned that their programs will not meet legal or regulatory scrutiny • Level 2 (In Development): – developing recognition that recordkeeping has an impact on the organization, and that the organization may benefit from a more defined information governance program – still vulnerable to legal or regulatory scrutiny since practices are ill-defined and still largely ad hoc in nature. • Level 3 (Essential): – defined policies and procedures, and more specific decisions taken to improve recordkeeping – may still be missing significant opportunities for streamlining business and controlling costs • Level 4 (Proactive): – information governance issues are integrated into business decisions on a routine basis – easily meets its legal and regulatory requirements; should begin to consider the business benefits of information availability in transforming their organizations globally • Level 5 (Transformational): – integrated information governance into its overall corporate infrastructure and business processes to such an extent that compliance with the program requirements is routine – recognized that effective information governance plays a critical role in cost containment, competitive advantage, and client service ARMA Maturity Model for Information Governance 10
  • 11. Where to Begin – Policy • Develop, document and enforce consistent policies • Know where your records are stored • Distinguish records from non-records; tie a value to information assets 11
  • 12. Where to Begin – Process • Don’t attempt to boil the ocean – be selective • Adopt processes with users in mind • Establish points of sharing and collaboration • Leverage automation where it makes sense • Test and adjust processes periodically to improve efficiencies 12
  • 13. Agenda 1 Why Does Information Governance Matter? 2 Implementing Processes 3 Implementing Technology 4 Symantec Solutions 5 Q&A 13
  • 14. Information Governance & Technology Challenges Difficult to Difficult to Difficult to Consolidate Control Access • Multiple data • Ownership of • Visibility into multiple repositories across information assets repositories business units • Enforcing information • Implementing • Multitude of data controls and policies permissions and types and outlets (internal and external) security controls • Value of information • Corporate data • Identification and assets varies leakage collection for • On-premise vs. offsite investigatory or litigation purposes 14
  • 15. Where to Begin – Policy • Develop, document and enforce consistent policies • Know where your records are stored • Distinguish records from non-records; tie a value to information assets 15
  • 16. Social Media has Fundamentally Changed Communication • 2/3 of the global internet population • Social network users surpassed email visits social media networks users in July 2009 Source: Nielsen, Global Faces & Networked Source: Morgan Stanley’s “Slow death of email” Faces, 2009 • By 2014 20% of companies will use • 86% of Financial Service professionals Social Media as the primary vehicle use social media up from 73% the for communication replacing email previous year Source: Gartner Source: American Century Investments 2011 200 Million active users 5 Billion Photos 490 Million users 500 Million active users 10 Million Users 100 Million active users 16 16
  • 17. Technology to Support an IG Program Important Considerations Ensure integration across solutions to achieve Consider solutions that support efficiencies automation of certain functions Implement solutions that enable the sharing or transfer of data across the enterprise; Deployment Model reduce use of data silos On Premise Cloud Hybrid Reporting, audit, chain of custody across solutions 1 7
  • 18. Agenda 1 Why Does Information Governance Matter? 2 Implementing Processes 3 Implementing Technology 4 Symantec Solutions 5 Q&A 18
  • 19. Symantec Information Intelligence • Enterprise Vault • Discovery Accelerator • Compliance Accelerator • Data Classification Services • EV.Cloud • Clearwell • Data Insight Manager • Network Discover • Endpoint Discover • NetBackup Search 1 • Brightmail Gateway Notes: 1 – Release TBA 19
  • 20. Symantec Solutions Breadth & Depth of IG Technology EMAIL SERVERS Store Manage Discover LEGAL FILE SERVERS Migration Classification Identify IM SERVERS Compression Retention Collect INFO SEC SHAREPOINT Deduplication Deletion Process & Cull LEGACY Transparency Preservation Review DATABASES HR DESKTOPS END USERS SOCIAL MEDIA 20
  • 21. Data Classification Services (DCS) Policy Driven Classification What does it do? – Archive decision, retention, tags – Analyzes content and metadata during archiving – Reduces the cost of reactive Discovery – Decides on an archiving and retention strategy – Prioritizes items for supervisory review – Assigns searchable classification tags Symantec Enterprise Vault™ 10 21 Customer Presentation
  • 22. Enterprise Vault.cloud Purely Hosted • No mandatory hardware and software to install and maintain • Low upfront investment & total cost of ownership • Flat fee per mailbox per month includes service upgrades Enterprise Vault.cloud Unlimited Storage & Rapid Search  Email Storage Management • Unlimited email storage and retention  Email eDiscovery • Rapid search results from scalable grid architecture • No mailbox size limits for end users  Email Compliance  Mailbox Continuity option Enterprise-class Infrastructure & Security • Redundant, scalable, Tier 4 data centers • Data encrypted in transit & at rest • 24/7/365 support included in cost of service 22
  • 23. Enterprise-Wide Information Governance Records Management Legal Compliance • Define and enforce • Effective legal hold • Meet regulatory retention policies management requirements • Automate record • Reduce processing and •Streamline supervision classification review costs • End-to-end audit • Report and audit • Define and enforce capabilities capability retention policies IT Management • Reduce storage costs, • Satisfy demands • Eliminate data silos improve performance from legal and increase access 23
  • 24. Agenda 1 Why Does Information Governance Matter? 2 Implementing Processes 3 Implementing Technology 4 Symantec Solutions 5 Q&A 24
  • 25. About Globanet Globanet is a strategic Symantec partner specializing in information management solutions. We provide our customers with products and services to help them manage data more efficiently while reducing risk. Our portfolio of offerings includes - Select Symantec products including Enterprise Vault, Clearwell, Netbackup, and Storage Foundation - Globanet’s Merge1 for archiving of electronic communications including data from Bloomberg, Blackberry, Reuters, Facebook, and other data sources - Custom development for Enterprise Vault - Services to deploy, customize, and manage Enterprise Vault and Clearwell - Consulting on information governance topics including records management, litigation readiness, and ediscovery workflow 25