Ce diaporama a bien été signalé.
Nous utilisons votre profil LinkedIn et vos données d’activité pour vous proposer des publicités personnalisées et pertinentes. Vous pouvez changer vos préférences de publicités à tout moment.
Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information Management
Information Governance Pl...
Underwritten by:
#AIIMYour Digital Transformation Begins with
Intelligent Information ManagementYour Digital Transformatio...
Underwritten by:
Tips for Participating in Today’s Webinar
Group Chat – to talk with each other, found in the icons along ...
Underwritten by:
Today’s Speakers
Peggy Winton
President & CEO
AIIM
Ian Robert Moran
VP Business Development
Access
Host: ...
Underwritten by:
Peggy Winton
President & CEO
AIIM
Introducing our Featured Speaker
Underwritten by:
A Major Shift in Perception of IG
From something you “should do”
To something you “must do”
Underwritten by:
Underwritten by:
Why is IG becoming Must Do?
1. Technology Domino
2. IG perspective
3. Security Imperative
4. Privacy Dema...
Underwritten by:
An Ongoing Struggle
Underwritten by:
“Our c-level executives are not engaged at all”
73%
Underwritten by:
How to Sell Change?
1. PONC’ing usually fails
2. Information as an Asset
3. Solve a problem
Underwritten by:
Changing the Conversation
Underwritten by:
Establishing the Connection between IG & Strategy
Underwritten by:
Ingredient #1: a successful cross-functional team
LOBs Legal Sales/Marketing
? ?
Underwritten by:
Ideal IG Team?
1. Ideal car, dinner entre or color….?? Depends
on Organization
2. IT, Legal, Compliance, ...
Underwritten by:
Cross-functional Team
Business Leader
Marketing/Sales
Finance
Compliance
Legal
IT
Underwritten by:
Ingredient #2: audit the information you have
2%
25%
21%
16%
10%
7%
5% 6%
2%
5%
X 2X 3X 4X 5X 6X 7X 8X 9X...
Underwritten by:
What Do We Have???
1. Consultative approach
2. Assess situation and admit there is a problem
3. Order to ...
Underwritten by:
Technology Ecosystems
Integrated
Machine Learning
Automation
Underwritten by:
Ingredient #3: get rid of the “ROT”
Underwritten by:
Responsible De| …. | tion.
1. struct and …. let
2. Create a plan, use tools, execute plan
3. Create a pla...
Underwritten by:
Retention Automation
Underwritten by:
Ingredient #4: set, run, & automate your
policies
Underwritten by:
Ingredient #4: (continued)
Underwritten by:
Ingredient #5: plan for the overall lifecycle –
seamlessly!
Underwritten by:
Ingredient #5: (continued)
8 lifecycle considerations:
1. Who created or received the information?
2. Who...
27 | Copyright © 2019 Access - Confidential
Access Supports the Entire Information Lifecycle
Information Lifecycle
Build t...
28 | Copyright © 2019 Access - Confidential
Ian Robert Moran
Vice President
Business Development
imoran@accesscorp.com
1.8...
29 | Copyright © 2019 Access - Confidential29 | Copyright © 2019 Access - Confidential
Access
Overview
30 | Copyright © 2019 Access - Confidential
Why Access
Key Differentiators
Complete product offering throughout the docume...
31 | Copyright © 2019 Access - Confidential
Lifecycle
Document
ManagementDigital Document
Management
Document
Scanning
Inf...
32 | Copyright © 2019 Access - Confidential
• CartaDC & Conversion Services,
CartaHR Document Management
• LexiTrac
Media ...
[Webinar Slides] Information Governance Plans Stalling? 5 Things You Need for the "Secret Sauce"
Prochain SlideShare
Chargement dans…5
×

[Webinar Slides] Information Governance Plans Stalling? 5 Things You Need for the "Secret Sauce"

In this webinar, learn the five things you must have as part of your Governance plans and strategies.

Want to follow along with the webinar replay? Download it here for FREE: https://info.aiim.org/information-plans-stalling-5-things-you-need-secret-sauce

  • Identifiez-vous pour voir les commentaires

  • Soyez le premier à aimer ceci

[Webinar Slides] Information Governance Plans Stalling? 5 Things You Need for the "Secret Sauce"

  1. 1. Underwritten by: #AIIMYour Digital Transformation Begins with Intelligent Information Management Information Governance Plans Stalling? 5 Things You Need for the "Secret Sauce" Presented October 23, 2019 Information Governance Plans Stalling? 5 Things You Need for the "Secret Sauce" An AIIM Webinar presented October 23, 2019
  2. 2. Underwritten by: #AIIMYour Digital Transformation Begins with Intelligent Information ManagementYour Digital Transformation begins with Intelligent Information Management
  3. 3. Underwritten by: Tips for Participating in Today’s Webinar Group Chat – to talk with each other, found in the icons along the bottom. Q&A – for questions to the speakers, held for the end (and tech help). Check out the Resources available to you today, in the box to the right of the slides. A Survey will open at the conclusion of the webinar – we value your feedback on how we did today.
  4. 4. Underwritten by: Today’s Speakers Peggy Winton President & CEO AIIM Ian Robert Moran VP Business Development Access Host: Theresa Resek, CIP Director AIIM
  5. 5. Underwritten by: Peggy Winton President & CEO AIIM Introducing our Featured Speaker
  6. 6. Underwritten by: A Major Shift in Perception of IG From something you “should do” To something you “must do”
  7. 7. Underwritten by:
  8. 8. Underwritten by: Why is IG becoming Must Do? 1. Technology Domino 2. IG perspective 3. Security Imperative 4. Privacy Demands
  9. 9. Underwritten by: An Ongoing Struggle
  10. 10. Underwritten by: “Our c-level executives are not engaged at all” 73%
  11. 11. Underwritten by: How to Sell Change? 1. PONC’ing usually fails 2. Information as an Asset 3. Solve a problem
  12. 12. Underwritten by: Changing the Conversation
  13. 13. Underwritten by: Establishing the Connection between IG & Strategy
  14. 14. Underwritten by: Ingredient #1: a successful cross-functional team LOBs Legal Sales/Marketing ? ?
  15. 15. Underwritten by: Ideal IG Team? 1. Ideal car, dinner entre or color….?? Depends on Organization 2. IT, Legal, Compliance, and Records for sure 3. The clients and protectors of the information: Operations, Marketing, Finance, Security
  16. 16. Underwritten by: Cross-functional Team Business Leader Marketing/Sales Finance Compliance Legal IT
  17. 17. Underwritten by: Ingredient #2: audit the information you have 2% 25% 21% 16% 10% 7% 5% 6% 2% 5% X 2X 3X 4X 5X 6X 7X 8X 9X 10X Think about the huge amounts of data and information currently coming into your organization (call this current volume “X”). What do you predict this volume will be in 2 years?
  18. 18. Underwritten by: What Do We Have??? 1. Consultative approach 2. Assess situation and admit there is a problem 3. Order to chaos
  19. 19. Underwritten by: Technology Ecosystems Integrated Machine Learning Automation
  20. 20. Underwritten by: Ingredient #3: get rid of the “ROT”
  21. 21. Underwritten by: Responsible De| …. | tion. 1. struct and …. let 2. Create a plan, use tools, execute plan 3. Create a plan of decisions, automate execution
  22. 22. Underwritten by: Retention Automation
  23. 23. Underwritten by: Ingredient #4: set, run, & automate your policies
  24. 24. Underwritten by: Ingredient #4: (continued)
  25. 25. Underwritten by: Ingredient #5: plan for the overall lifecycle – seamlessly!
  26. 26. Underwritten by: Ingredient #5: (continued) 8 lifecycle considerations: 1. Who created or received the information? 2. Who uses or accesses the information? 3. How is the information used? 4. Who manages the information on an ongoing basis? 5. Does a particular piece of information exist in more than one format rendition, or version? Which one is the copy of record? 6. What format(s) are used to contain the information? 7. Where is the information physically located? 8. What kinds of retention requirements govern the lifecycle of the information?
  27. 27. 27 | Copyright © 2019 Access - Confidential Access Supports the Entire Information Lifecycle Information Lifecycle Build the Management Tools and Processes Assessments & Essentials Gap analysis/audit Naming conventions Data structures Procedures (ex. file indexing) IT systems configuration Policy & Management Governance and management policies Retention schedules Privacy and data security management Strategic Planning & Governance C-suite discussions Strategic planning IT acquisition Manage the Information Assets Policy Execution Provide Storage Accessibility Hands-on records management Activate information Digitization Meta data Cloud storage Process/workflow automation Destruction Provide secure destruction as required by retention policy and risk profile
  28. 28. 28 | Copyright © 2019 Access - Confidential Ian Robert Moran Vice President Business Development imoran@accesscorp.com 1.877.345.3546 www.AccessCorp.com AccessCorp.comebooks Free eBook “From Vendor to Partner” WHAT NOW!?!?!
  29. 29. 29 | Copyright © 2019 Access - Confidential29 | Copyright © 2019 Access - Confidential Access Overview
  30. 30. 30 | Copyright © 2019 Access - Confidential Why Access Key Differentiators Complete product offering throughout the document lifecycle. ‒ from creation to destruction, paper and digital ‒ Full suite delivered in-house with one chain of custody. Your info never leaves our hands Better service, better client service and national / global scale. With Access, you get all three. Expertise in information governance, compliance and digital transformation, in your industry. Skate to where the puck will be with Access. Our people make us different, and make us better. We are wholly engaged with our clients, company and community every day
  31. 31. 31 | Copyright © 2019 Access - Confidential Lifecycle Document ManagementDigital Document Management Document Scanning Information Governance Document Destruction Offsite Storage Document Creation
  32. 32. 32 | Copyright © 2019 Access - Confidential • CartaDC & Conversion Services, CartaHR Document Management • LexiTrac Media Storage • Secure Vaulting • Environmentally Controlled Core Document Services • Document Storage • Document Scanning • File Indexing / FileBRIDGE Records • Secure Destruction Software / Digital Solutions Access Solutions Information Governance Advisory services Compliance / Policy / Implementation

×