SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
Information Governance Outcomes and
Benefits
Establishing Information Governance requires clarity of vision and leadership.
“Without Vision our INFORMATION will perish and our people will cast off restraint!”
In setting up an Information Governance team and organizational structures it is helpful to define
what are our expected outcomes and benefits. Corporate governance regulations, like King IV, hold
the corporate accountable for the capital outcomes based on the outputs from the inputs that it
consumes. This responsibility has challenged me in several areas of my life, professionally as the
current DAMA South African President, I have been challenged to define the outcomes of the DAMA
professional certifications and as an Information Governance Advisor to large organizations to
ensure that the road travelled as the appropriate outcomes and benefits.
I have found it very helpful to spend time thinking about and defining these outcomes for the
specific areas stated above and then to study the more abstract outcome and benefit definitions. In
my study of the abstract definitions I have found a useful definition of the principles by AHIMA:
Information Governance Principles for Healthcare (IGPHC). At the same time, I was struck by the fact
that most of the principles can be applied personally and it made a lot of sense when thinking of the
old cliché “People trust people, not data”.
Our information should embody the same principles of a trusted advisor, if we expect business to
make strategic decisions derived from data. This is Information Governance ultimate goal to enable
business performance and value.
I have defined my abstract vision of Information Governance by defining:
 Outcomes
o What is the single most important information governance outcome?
o What other outcomes are core to the information governance vision?
 Benefits
o How do we remove the Information STRIFE in our organizations?
 (S): Reduce Stress caused by bad or inadequate information
 (T): Effective and Efficient use of time associated with information
 (R): Remove risks when working with information
 (I): Increase the income through the use of information
 (F): Remove the fear and frustration caused by bad or inadequate
information
 (E): Reduce the costs (expense) of working with information
Outcomes
Major Outcome
Establish a SOLID EIM foundation based on information governance principles
that will enable business performance and outcomes.
We have to focus on the business value of information.
To do this, all our attention and efforts can only be applied to information that matters to the
business. We cannot put all information into this category which brings us to the realization and
cliché that “Not all information is equal”.
To ensure that we enable business performance and outcomes with information we need to
differentiate our efforts, targets and goals based on the value that information yields to the
business. This required a strict set of metrics and definition of the value of information.
Secondary Outcomes
The subsequent set of outcomes are based on the principles defined in IGPHC.
Accountability
Take ownership of what you can do to make information better at several levels:
Personal, Peer, Boss / Coach / Mentor, Public.
We need to establish a culture that publicly commits to take ownership of information at all levels.
Evidence of this outcome can be found in the maturity level of our data stewardship organization
and structure.
Transparency
We need to be aware of what is real and true.
This awareness will enable us to:
1. Solve information problems a lot faster
2. Build information collaboration easier
3. Grow authentic information relationships
4. Promote trust in the information provided
The net effect will be higher levels of business performance.
Protection
As we classify information based on its level on sensitivity, value and criticality,
we can determine baseline security controls for its protection.
The lack of information classification leads us to baseline our security controls as either non-existent
or Top-Secret. Neither level of control is appropriate for an organization.
Compliance
We need to assure that the appropriate information management controls have
been enforced with good record-keeping practices.
Compliance is one of the core business drivers and by not paying attention to the required controls
and practices it becomes a matter of when the organization is caught and not if. The reputation of
the business is at risk if we are found to be non-compliant and this will not enable business
performance and / or outcomes.
Availability
We need to ensure critical information availability by determining the appropriate
levels of redundancy, failover and contingencies needed based on the risk of non-
availability.
The bottom line is that we need address information demands by ensuring that the right information
is available at the right time for the right purpose.
Retention
Excessive information volume is detrimental to the business. Information
retention programs define what information to retain, how long to maintain it
and how to dispose of the information when it is no longer needed.
This is based on the concept of Information Lifecycle. The information lifecycle begins at its creation
and ends at its final disposition.
Disposition
We need to establish defensible disposition of data to ensure that we control the
volume of information.
Disposition includes not only the destruction but also any permanent change in information
custodianship. Custodianship can be transferred to another party due to merger or acquisition or
when an organisation discontinues a service.
Benefits
Stress Reduction
Achieving Business Performance levels can be very stressful if the required
information cannot be trusted.
Good and trustworthy information goes a long way to reducing stress in situations that require good
understanding of what is happening and making the right decision that will have long lasting
consequences.
Time effectiveness and efficiency
Bad and / or inadequate information will destroy effective and efficient use of a
resource(s) time. Running late for people and automated processes will increase
financial and reputational costs.
Good information doesn’t require all sorts of wrangling to get it into the format required to report
the business facts. Good information doesn’t lead to application and reporting failures. When the
information preparation runs smoothly, people can focus on delivering what is required.
Risk Removal
The ramifications of non-compliance and failure to deliver are getting higher and
higher and can lead to the demise of the organization.
We are expected to identify potential risks relating to information and assure the appropriate level
of controls are in place to address these risks.
Income Growth
Business Income is no longer restricted too physical and capital assets. Intangible
assets are playing a bigger role in the growth and well-being of a business.
Information is an intangible asset and opens up all sorts of opportunities for business diversification.
Fear and Frustration avoidance
The fear of making the wrong decision and the resulting frustration with
information technology cannot be ignored when doing an impact analysis of bad
business performance and outcomes.
Fear delays decision making and frustration of incorrect decisions is difficult to quantify and hard to
gauge its impact. The business cannot be assertive in its decision making if it has to struggle with
information that it does not trust.
Expense limitation
We all talk about information as an asset but how long does it take and how
much does it cost to get information to a point where it is starting to enable
income generation.
When the cost of production exceeds the derived value, Information is no longer an asset but a
liability. If information is a liability, it needs to be disposed of.
Looking a the POSMAD lifecycle as defined by Denette McGilvray, the only time we derive value is
during the Apply phase, all the other phases: Plan, Obtain, Store & Share, Maintain & Dispose cost
the business. We need to move through the other phases as quickly as possible.

Contenu connexe

Tendances

Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkKannan Subbiah
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologistDonald Tabone
 
You may not need big data after all
You may not need big data after all You may not need big data after all
You may not need big data after all Abhi Rana
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax Technology
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...Kannan Subbiah
 
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....Dheepika Chokkalingam
 
Chief information officer Assignment
Chief information officer AssignmentChief information officer Assignment
Chief information officer AssignmentRabia Rajput
 

Tendances (10)

Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
 
You may not need big data after all
You may not need big data after all You may not need big data after all
You may not need big data after all
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Chief information officer Assignment
Chief information officer AssignmentChief information officer Assignment
Chief information officer Assignment
 

Similaire à Information Governance Outcomes and Benefits

The CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise ValueThe CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise ValueMark Albala
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information GovernanceMichael Curcio
 
Secure Group Management Model
Secure Group Management ModelSecure Group Management Model
Secure Group Management ModelSecure Group
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps FrameworkFeroot
 
Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Redspin, Inc.
 
The Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information ManagementThe Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information Managementkmortens
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationIrmaBrkic1
 
Strategic Information Management Principles
Strategic Information Management PrinciplesStrategic Information Management Principles
Strategic Information Management Principleskmortens
 
What You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data GovernanceWhat You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data GovernanceDATAVERSITY
 
Slide share Hyper-Decision Making - Short Version
Slide share   Hyper-Decision Making - Short VersionSlide share   Hyper-Decision Making - Short Version
Slide share Hyper-Decision Making - Short VersionDr. Ted Marra
 
Analytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureAnalytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureaNumak & Company
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?Norman Manley
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Redspin, Inc.
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...Redspin, Inc.
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal Leadershipjobdoctors
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipDwayne Jorgensen
 
0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights Brochure0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights BrochureThomas Pulling
 

Similaire à Information Governance Outcomes and Benefits (20)

The CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise ValueThe CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise Value
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
 
Secure Group Management Model
Secure Group Management ModelSecure Group Management Model
Secure Group Management Model
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps Framework
 
Article in Techsmart
Article in TechsmartArticle in Techsmart
Article in Techsmart
 
Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?
 
The Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information ManagementThe Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information Management
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
Strategic Information Management Principles
Strategic Information Management PrinciplesStrategic Information Management Principles
Strategic Information Management Principles
 
What You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data GovernanceWhat You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data Governance
 
Slide share Hyper-Decision Making - Short Version
Slide share   Hyper-Decision Making - Short VersionSlide share   Hyper-Decision Making - Short Version
Slide share Hyper-Decision Making - Short Version
 
Analytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureAnalytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven Culture
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal Leadership
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal Leadership
 
0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights Brochure0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights Brochure
 

Plus de Howard Diesel (CDMP BI, DW, DBA, Msc Elec Eng) (6)

DAMA International DMBOK V2 - Comparison with V1
DAMA International DMBOK V2 - Comparison with V1DAMA International DMBOK V2 - Comparison with V1
DAMA International DMBOK V2 - Comparison with V1
 
DAMA June 2017 User Group presentation on ECM
DAMA June 2017 User Group presentation on ECMDAMA June 2017 User Group presentation on ECM
DAMA June 2017 User Group presentation on ECM
 
5 Hot Trends for Data Analytics in 2017
5 Hot Trends for Data Analytics in 20175 Hot Trends for Data Analytics in 2017
5 Hot Trends for Data Analytics in 2017
 
Dama Southern Africa Vision
Dama Southern Africa VisionDama Southern Africa Vision
Dama Southern Africa Vision
 
Information classification
Information classificationInformation classification
Information classification
 
Information classification
Information classificationInformation classification
Information classification
 

Dernier

Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfAdmir Softic
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 

Dernier (20)

Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 

Information Governance Outcomes and Benefits

  • 1. Information Governance Outcomes and Benefits Establishing Information Governance requires clarity of vision and leadership. “Without Vision our INFORMATION will perish and our people will cast off restraint!” In setting up an Information Governance team and organizational structures it is helpful to define what are our expected outcomes and benefits. Corporate governance regulations, like King IV, hold the corporate accountable for the capital outcomes based on the outputs from the inputs that it consumes. This responsibility has challenged me in several areas of my life, professionally as the current DAMA South African President, I have been challenged to define the outcomes of the DAMA professional certifications and as an Information Governance Advisor to large organizations to ensure that the road travelled as the appropriate outcomes and benefits. I have found it very helpful to spend time thinking about and defining these outcomes for the specific areas stated above and then to study the more abstract outcome and benefit definitions. In my study of the abstract definitions I have found a useful definition of the principles by AHIMA: Information Governance Principles for Healthcare (IGPHC). At the same time, I was struck by the fact that most of the principles can be applied personally and it made a lot of sense when thinking of the old cliché “People trust people, not data”. Our information should embody the same principles of a trusted advisor, if we expect business to make strategic decisions derived from data. This is Information Governance ultimate goal to enable business performance and value. I have defined my abstract vision of Information Governance by defining:  Outcomes o What is the single most important information governance outcome? o What other outcomes are core to the information governance vision?  Benefits o How do we remove the Information STRIFE in our organizations?  (S): Reduce Stress caused by bad or inadequate information  (T): Effective and Efficient use of time associated with information  (R): Remove risks when working with information  (I): Increase the income through the use of information
  • 2.  (F): Remove the fear and frustration caused by bad or inadequate information  (E): Reduce the costs (expense) of working with information Outcomes Major Outcome Establish a SOLID EIM foundation based on information governance principles that will enable business performance and outcomes. We have to focus on the business value of information. To do this, all our attention and efforts can only be applied to information that matters to the business. We cannot put all information into this category which brings us to the realization and cliché that “Not all information is equal”. To ensure that we enable business performance and outcomes with information we need to differentiate our efforts, targets and goals based on the value that information yields to the business. This required a strict set of metrics and definition of the value of information. Secondary Outcomes The subsequent set of outcomes are based on the principles defined in IGPHC. Accountability Take ownership of what you can do to make information better at several levels: Personal, Peer, Boss / Coach / Mentor, Public. We need to establish a culture that publicly commits to take ownership of information at all levels. Evidence of this outcome can be found in the maturity level of our data stewardship organization and structure. Transparency We need to be aware of what is real and true. This awareness will enable us to: 1. Solve information problems a lot faster 2. Build information collaboration easier 3. Grow authentic information relationships 4. Promote trust in the information provided The net effect will be higher levels of business performance.
  • 3. Protection As we classify information based on its level on sensitivity, value and criticality, we can determine baseline security controls for its protection. The lack of information classification leads us to baseline our security controls as either non-existent or Top-Secret. Neither level of control is appropriate for an organization. Compliance We need to assure that the appropriate information management controls have been enforced with good record-keeping practices. Compliance is one of the core business drivers and by not paying attention to the required controls and practices it becomes a matter of when the organization is caught and not if. The reputation of the business is at risk if we are found to be non-compliant and this will not enable business performance and / or outcomes. Availability We need to ensure critical information availability by determining the appropriate levels of redundancy, failover and contingencies needed based on the risk of non- availability. The bottom line is that we need address information demands by ensuring that the right information is available at the right time for the right purpose. Retention Excessive information volume is detrimental to the business. Information retention programs define what information to retain, how long to maintain it and how to dispose of the information when it is no longer needed. This is based on the concept of Information Lifecycle. The information lifecycle begins at its creation and ends at its final disposition. Disposition We need to establish defensible disposition of data to ensure that we control the volume of information.
  • 4. Disposition includes not only the destruction but also any permanent change in information custodianship. Custodianship can be transferred to another party due to merger or acquisition or when an organisation discontinues a service. Benefits Stress Reduction Achieving Business Performance levels can be very stressful if the required information cannot be trusted. Good and trustworthy information goes a long way to reducing stress in situations that require good understanding of what is happening and making the right decision that will have long lasting consequences. Time effectiveness and efficiency Bad and / or inadequate information will destroy effective and efficient use of a resource(s) time. Running late for people and automated processes will increase financial and reputational costs. Good information doesn’t require all sorts of wrangling to get it into the format required to report the business facts. Good information doesn’t lead to application and reporting failures. When the information preparation runs smoothly, people can focus on delivering what is required. Risk Removal The ramifications of non-compliance and failure to deliver are getting higher and higher and can lead to the demise of the organization. We are expected to identify potential risks relating to information and assure the appropriate level of controls are in place to address these risks. Income Growth Business Income is no longer restricted too physical and capital assets. Intangible assets are playing a bigger role in the growth and well-being of a business. Information is an intangible asset and opens up all sorts of opportunities for business diversification.
  • 5. Fear and Frustration avoidance The fear of making the wrong decision and the resulting frustration with information technology cannot be ignored when doing an impact analysis of bad business performance and outcomes. Fear delays decision making and frustration of incorrect decisions is difficult to quantify and hard to gauge its impact. The business cannot be assertive in its decision making if it has to struggle with information that it does not trust. Expense limitation We all talk about information as an asset but how long does it take and how much does it cost to get information to a point where it is starting to enable income generation. When the cost of production exceeds the derived value, Information is no longer an asset but a liability. If information is a liability, it needs to be disposed of. Looking a the POSMAD lifecycle as defined by Denette McGilvray, the only time we derive value is during the Apply phase, all the other phases: Plan, Obtain, Store & Share, Maintain & Dispose cost the business. We need to move through the other phases as quickly as possible.