SlideShare ist ein Scribd-Unternehmen logo
1 von 20
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
InformationGovernance
MaturityinFinancialServices
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
Key Regulatory Changes
• Record Keeping in Dodd Frank and EMIR
Multi - Jurisdictional Regulatory Requirement
• FINRA (Financial Industries Regulatory Authority), SEC (Securities & Exchange
Commission), CFTC (Commodities & Futures Trading Commission), BoE (Bank of England)
Past Legal or Regulatory Issues or Fines
• Data Protection, Collusion, Corruption, Harassment, Insider Trading, Money Laundering,
80+ others
Reputational or Event Risk
• Keep out of the headlines
Intellectual Property (IP) or Non-Public Info (MNPI) Leaks
Cost Containment
• Storage
• Discovery
Typical Information Goverance Drivers in Banking
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
Risk & Cost Impact Increasing Year on Year
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
Example Regulation - Dodd Frank Background
• Regulations under Dodd Frank introduced new requirements for reporting and
record keeping of Swaps and Derivatives related content
• Generally require that relevant records be duplicated and retained for 5 years
following termination, execution, or expiration a contract
• Includes all of the information that is associated with execution of an agreement,
and provide basis for economic terms of a deal
• Retain records according to specific regulatory requirements for immutability and
third-party access within 24 / 36 / 72 hours
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5
HP Autonomy’s Information Governance Solution
Business
Analytics
Search &
Collaboration
Information
Governance
Legal Hold &
eDiscovery
Deal Reconstruction
Supervision
IBM CMOD
Symantec
EV
EMC Centera
NICE
Other
SourcesFile Shares
Social Media Video Audio Email Texts Transactional
Data
IT/OT Search Engine ImagesDocumentsMobile
HP
Bi-directional Connector Framework
RainStor
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
Information Governance Defined
HP Autonomy Information Governance
A portfolio of modular solutions that help organisations access
and understand human and computer-generated information
without bias to repository or location, organise and control this
data with a centralised policy engine, and intelligently manage
and take action upon this data in accordance with business,
legal/compliance, and data management objectives.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7
Unaware:
unmanaged
Aware:
formative
Aware:
developing
Aware:
competent
Stages of Competency
• Vital records at risk
• Non-compliance
• Duplication of work
• High storage and
e-discovery costs
• No authoritative versions
• No info sharing
• Uncontrolled retention
• Decisions based on incomplete
info
• Incomplete chain of custody
• No recognisable business
context
• Poor information security
• Duplication of work
• High e-discovery cost
• No authoritative versions
• No sharing of information
• Poor retention
• Decisions based on incomplete
information
• Incomplete chain of custody
• No recognisable business
context
• Poor information security
• Duplication of work
• No authoritative versions
• Minimal sharing of
information
• Decisions based on
incomplete information
• No recognisable business
context
• Poor information security
• Cost of manual capture
• Distributed silos of records
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
Stages of Competency – ARMA GARP Maturity Model
• There is no clear definition of the
records that the organisation is
obligated to keep
• Records and other business
documentation are not
systematically managed according
to records management principles
• Business groups define this to the
best of their ability based upon
their interpretation of rules and
regulations
• There is no central oversight
and/or consistently defensible
position
• There is no defined or understood
process for imposing ‘holds’
Sub Standard In Development Essential Proactive Transformational
• The organisation has identified
the rules and regulations that
govern its business
• The organisation has introduced
some compliance policies and
recordkeeping practices around
them
• The policies are not complete
• There is no apparent or well
defined accountability for
compliance
• There is a hold process, but it is
not well integrated with the
organisations information and
discovery processes
• The organisation has identified all
relevant compliance laws and
regulations
• Record creation and capture are
systematically carried out in
accordance with record
management principles
• The organisation has a strong
code of business conduct which is
integrated into its overall
information governance structure
and record keeping policies
• Compliance and the records that
demonstrate it are highly valued
and measurable
• The hold process is integrated into
the organisations information
management and discovery
processes for the “most critical”
systems
• The organisation has defined
specific goals related to
compliance
• The organisation has
implemented systems to capture
and protect records
• Records are linked with the
metadata used to demonstrate
and measure compliance
• Employees are trained
appropriately and audits are
conducted regularly
• Records of the audits and training
are available for review
• Lack of compliance is remedied
through implementation of
defined correctiveactions
• The hold process is well managed
with defined roles and a
repeatable process that is
integrated into the organisations
information management and
discovery processes
• The importance of compliance and
the role of records and
information in it are clearly
recognised at the senior
management and board levels
• Auditing and continuous
improvement processes are well
established and monitored by
senior management
• The roles and processes for
information management and
discovery are integration
• The organisations stated goals
related to compliance have been
met
• The organisation suffers few or no
adverse consequences based on
information governance and
compliance failures
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
ARMA – Generally Accepted Recordskeeping Principles
Accountability
Transparency
Integrity
Protection
Compliance
Availability
Retention
Disposition
A senior executive (or person of comparable authority) oversees the recordkeeping program and delegates program responsibility to
appropriate individuals. The organisation adopts policies and procedures to guide personnel and ensure the program can be audited.
The processes and activities of an organisation’s recordkeeping program are documented in a manner that is open and verifiable and is
available to all personnel and interested parties.
A recordkeeping program shall be constructed so the records and information generated or managed by or for the organisation have a
reasonable and suitable guarantee of authenticity and reliability.
A recordkeeping program shall be constructed to ensure a reasonable level of protection to records and information that are private,
confidential, privileged, secret or essential to business continuity.
The recordkeeping program shall be constructed to comply with applicable laws and other binding authorities, as well as the organisation’s
policies.
An organisation shall maintain records in a manner that ensures timely, efficient and accurate retrieval of needed information.
An organisation shall maintain its records and information for an appropriate time, taking into account legal, regulatory, fiscal,
operational, and historical requirements.
An organisation shall provide secure and appropriate disposition for records that are no longer required to be maintained by applicable laws
and the organisation’s policies.
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10
Our Value Proposition
Enterprise Retention Management
Global policy and metadata management
Manage in Place
Single Pane of Glass View
Robust Out of Box Functionality
Manage in Place
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
HP Autonomy Information Governance Framework
Ensure Retention
& Disposition
HP Information Governance
A platform approach for effectively managing all information,
enterprise-wide, in accordance with corporate policy and business goals
Gain Full
Understanding
Automate Policy
Application
Prepare &
Respond: legal &
regulatory
Store &
Manage in Place
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12
HP Information Governance Solution Stack
HP Records
Manager
CompleteRM
Lifecycle
ControlPoint
File Analytics,
Policy
Management
HP e-
Discovery
Complete
discoverylifecycle
management
HP Legal HoldEnd-to-endlegal
hold
Structured
Data Manager
Structured content
archiving
HP Information Governance
Application Architecture
Core Application Logic
CFS
Intelligent Data Operating Layer
Connectors
Enterprise Repositories
Indexing Services
Connection Services
The Power of the Platform
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13
HP Information Governance Logical Architecture
Connector
Framework
Enrich meta
Name lookups
Speech to text
OCR
Email
IM Voice
HP ControlPoint
-
Classification
HP RM
-
Records
Management
HP Structured
Data
Manager
Compliance Front Office Compliance
Files
Persist
ReviewManage
policy
Report
Unstructured
Applications
Scan/Fax
Structured
WORM /
Disk
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14
Making retention an enterprise reality
HP Information Governance Process Flow
• Allows organizations to identify “dark data:
• Understand its meaning and significant
• Classify and categorize
Control
• Treat related information consistently
• Apply policy to content typeApply Policy
• Make management decisions on access, availability, location and
disposition
• Complete audit trail
Take Action
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15
ControlPoint is an application that provides a user interface and an ‘engine’ for:
HP ControlPoint Introduction
Configuring the classification of files
Reviewing the results of classifications
Configuring and applying policies that
take actions, ‘about’ files that it manages
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16
HP Records Manager Introduction
HP Records Manager
Interactive Document
Management
SharePoint
Governance
ControlPoint Auto-Declare
In-Place Management
SAP
ArchiveLink
AIO Structured
Records
Physical
Records
COM/.NET SDK Services
API
Custom Solutions
ControlPoint Legacy
Data Cleanup
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17
HP Structured Data Manager Introduction
Reduce data
footprint &
storage costs
Enhance
operational
efficiency
Retire outdated
applications
Subset &
Masking for Test
Improve
search and
eDiscovery
SDM
Customized
Solutions
Groovy SDK
Application
Integrations
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18
In Place Management
Content
repositories
Content
repositories Know what
information you
have
Know where the
information is
located
Know your
information is
protected
Know the
information is
managed
appropriately
IDOLConnectorFramework
Manage in Place
• Content Creation
• Business Processes
• Collaboration
• Projects
• Events
ControlPoint
HP Records
Manager
Index, Analyze,
Auto-Classify
Declare
Retain and manage active information where it provides the best business value
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19
Information Governance Functionality
Policy Management Content Collection Source Repositories
ConnectorFrameworkServer
On
Demand
FileShares
RainStor
SEV
SharePoint
Exchange
HP RM
• No additional content store
• Metadata Management
• Retention
• Search
• ILM
• Approval routing
• Legal Hold Mgmt and Support
• Notification and alerts
• Reporting
• Audit
CP
• Indexing Services
• MIP
• Collect Insert
• Delete/Remove
• Hold/Release
• Hold
• Synchronize
• View
• Audit
Basic
Available
Custom
Enterprise Retention Management
Copyright © 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.
Craig Adams, EMEA Sales Director – Information Governance
Craig Adams, EMEA Sales Director – Information Governance
Email: craiga@hp.com craiga@hp.com
Mobile: +44 7717 850527
LinkedIn: www.linkedin.com/in/craigadamsuk

Weitere ähnliche Inhalte

Was ist angesagt?

Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Index Engines Inc.
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesTony Pearson
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17Everteam
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentationAndrey Karpov
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!cisoplatform
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big DataSaurabh Kheni
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 

Was ist angesagt? (20)

Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentation
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DLP
DLPDLP
DLP
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big Data
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 

Ähnlich wie Information Governance Maturity for Financial Services

Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentationIgor Swann
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
 
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumInformation Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumDeloitte United States
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiRobust Marketing & Consulting (Pty) Ltd
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance ProgramBohdiman
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information GovernanceMichael Curcio
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)Nick Inglis
 
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...ARMA International
 
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DATUM LLC
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategySustainableEnergyAut
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Dark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File AnalysisDark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File AnalysisCraig Adams
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Lovejadams6
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 
How to Structure the Data Organization
How to Structure the Data OrganizationHow to Structure the Data Organization
How to Structure the Data OrganizationRobyn Bollhorst
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Information Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation SlidesInformation Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation SlidesSlideTeam
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseDenodo
 

Ähnlich wie Information Governance Maturity for Financial Services (20)

Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumInformation Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance Program
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
 
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
 
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data Strategy
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Dark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File AnalysisDark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File Analysis
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Love
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
How to Structure the Data Organization
How to Structure the Data OrganizationHow to Structure the Data Organization
How to Structure the Data Organization
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Information Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation SlidesInformation Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation Slides
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven Enterprise
 

Kürzlich hochgeladen

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalLionel Briand
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 

Kürzlich hochgeladen (20)

Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Precise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive GoalPrecise and Complete Requirements? An Elusive Goal
Precise and Complete Requirements? An Elusive Goal
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 

Information Governance Maturity for Financial Services

  • 1. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. InformationGovernance MaturityinFinancialServices
  • 2. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2 Key Regulatory Changes • Record Keeping in Dodd Frank and EMIR Multi - Jurisdictional Regulatory Requirement • FINRA (Financial Industries Regulatory Authority), SEC (Securities & Exchange Commission), CFTC (Commodities & Futures Trading Commission), BoE (Bank of England) Past Legal or Regulatory Issues or Fines • Data Protection, Collusion, Corruption, Harassment, Insider Trading, Money Laundering, 80+ others Reputational or Event Risk • Keep out of the headlines Intellectual Property (IP) or Non-Public Info (MNPI) Leaks Cost Containment • Storage • Discovery Typical Information Goverance Drivers in Banking
  • 3. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3 Risk & Cost Impact Increasing Year on Year
  • 4. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4 Example Regulation - Dodd Frank Background • Regulations under Dodd Frank introduced new requirements for reporting and record keeping of Swaps and Derivatives related content • Generally require that relevant records be duplicated and retained for 5 years following termination, execution, or expiration a contract • Includes all of the information that is associated with execution of an agreement, and provide basis for economic terms of a deal • Retain records according to specific regulatory requirements for immutability and third-party access within 24 / 36 / 72 hours
  • 5. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5 HP Autonomy’s Information Governance Solution Business Analytics Search & Collaboration Information Governance Legal Hold & eDiscovery Deal Reconstruction Supervision IBM CMOD Symantec EV EMC Centera NICE Other SourcesFile Shares Social Media Video Audio Email Texts Transactional Data IT/OT Search Engine ImagesDocumentsMobile HP Bi-directional Connector Framework RainStor
  • 6. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6 Information Governance Defined HP Autonomy Information Governance A portfolio of modular solutions that help organisations access and understand human and computer-generated information without bias to repository or location, organise and control this data with a centralised policy engine, and intelligently manage and take action upon this data in accordance with business, legal/compliance, and data management objectives. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 7. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7 Unaware: unmanaged Aware: formative Aware: developing Aware: competent Stages of Competency • Vital records at risk • Non-compliance • Duplication of work • High storage and e-discovery costs • No authoritative versions • No info sharing • Uncontrolled retention • Decisions based on incomplete info • Incomplete chain of custody • No recognisable business context • Poor information security • Duplication of work • High e-discovery cost • No authoritative versions • No sharing of information • Poor retention • Decisions based on incomplete information • Incomplete chain of custody • No recognisable business context • Poor information security • Duplication of work • No authoritative versions • Minimal sharing of information • Decisions based on incomplete information • No recognisable business context • Poor information security • Cost of manual capture • Distributed silos of records
  • 8. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8 Stages of Competency – ARMA GARP Maturity Model • There is no clear definition of the records that the organisation is obligated to keep • Records and other business documentation are not systematically managed according to records management principles • Business groups define this to the best of their ability based upon their interpretation of rules and regulations • There is no central oversight and/or consistently defensible position • There is no defined or understood process for imposing ‘holds’ Sub Standard In Development Essential Proactive Transformational • The organisation has identified the rules and regulations that govern its business • The organisation has introduced some compliance policies and recordkeeping practices around them • The policies are not complete • There is no apparent or well defined accountability for compliance • There is a hold process, but it is not well integrated with the organisations information and discovery processes • The organisation has identified all relevant compliance laws and regulations • Record creation and capture are systematically carried out in accordance with record management principles • The organisation has a strong code of business conduct which is integrated into its overall information governance structure and record keeping policies • Compliance and the records that demonstrate it are highly valued and measurable • The hold process is integrated into the organisations information management and discovery processes for the “most critical” systems • The organisation has defined specific goals related to compliance • The organisation has implemented systems to capture and protect records • Records are linked with the metadata used to demonstrate and measure compliance • Employees are trained appropriately and audits are conducted regularly • Records of the audits and training are available for review • Lack of compliance is remedied through implementation of defined correctiveactions • The hold process is well managed with defined roles and a repeatable process that is integrated into the organisations information management and discovery processes • The importance of compliance and the role of records and information in it are clearly recognised at the senior management and board levels • Auditing and continuous improvement processes are well established and monitored by senior management • The roles and processes for information management and discovery are integration • The organisations stated goals related to compliance have been met • The organisation suffers few or no adverse consequences based on information governance and compliance failures
  • 9. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9 ARMA – Generally Accepted Recordskeeping Principles Accountability Transparency Integrity Protection Compliance Availability Retention Disposition A senior executive (or person of comparable authority) oversees the recordkeeping program and delegates program responsibility to appropriate individuals. The organisation adopts policies and procedures to guide personnel and ensure the program can be audited. The processes and activities of an organisation’s recordkeeping program are documented in a manner that is open and verifiable and is available to all personnel and interested parties. A recordkeeping program shall be constructed so the records and information generated or managed by or for the organisation have a reasonable and suitable guarantee of authenticity and reliability. A recordkeeping program shall be constructed to ensure a reasonable level of protection to records and information that are private, confidential, privileged, secret or essential to business continuity. The recordkeeping program shall be constructed to comply with applicable laws and other binding authorities, as well as the organisation’s policies. An organisation shall maintain records in a manner that ensures timely, efficient and accurate retrieval of needed information. An organisation shall maintain its records and information for an appropriate time, taking into account legal, regulatory, fiscal, operational, and historical requirements. An organisation shall provide secure and appropriate disposition for records that are no longer required to be maintained by applicable laws and the organisation’s policies.
  • 10. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10 Our Value Proposition Enterprise Retention Management Global policy and metadata management Manage in Place Single Pane of Glass View Robust Out of Box Functionality Manage in Place
  • 11. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11 HP Autonomy Information Governance Framework Ensure Retention & Disposition HP Information Governance A platform approach for effectively managing all information, enterprise-wide, in accordance with corporate policy and business goals Gain Full Understanding Automate Policy Application Prepare & Respond: legal & regulatory Store & Manage in Place
  • 12. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12 HP Information Governance Solution Stack HP Records Manager CompleteRM Lifecycle ControlPoint File Analytics, Policy Management HP e- Discovery Complete discoverylifecycle management HP Legal HoldEnd-to-endlegal hold Structured Data Manager Structured content archiving HP Information Governance Application Architecture Core Application Logic CFS Intelligent Data Operating Layer Connectors Enterprise Repositories Indexing Services Connection Services The Power of the Platform
  • 13. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13 HP Information Governance Logical Architecture Connector Framework Enrich meta Name lookups Speech to text OCR Email IM Voice HP ControlPoint - Classification HP RM - Records Management HP Structured Data Manager Compliance Front Office Compliance Files Persist ReviewManage policy Report Unstructured Applications Scan/Fax Structured WORM / Disk
  • 14. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14 Making retention an enterprise reality HP Information Governance Process Flow • Allows organizations to identify “dark data: • Understand its meaning and significant • Classify and categorize Control • Treat related information consistently • Apply policy to content typeApply Policy • Make management decisions on access, availability, location and disposition • Complete audit trail Take Action
  • 15. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15 ControlPoint is an application that provides a user interface and an ‘engine’ for: HP ControlPoint Introduction Configuring the classification of files Reviewing the results of classifications Configuring and applying policies that take actions, ‘about’ files that it manages
  • 16. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16 HP Records Manager Introduction HP Records Manager Interactive Document Management SharePoint Governance ControlPoint Auto-Declare In-Place Management SAP ArchiveLink AIO Structured Records Physical Records COM/.NET SDK Services API Custom Solutions ControlPoint Legacy Data Cleanup
  • 17. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17 HP Structured Data Manager Introduction Reduce data footprint & storage costs Enhance operational efficiency Retire outdated applications Subset & Masking for Test Improve search and eDiscovery SDM Customized Solutions Groovy SDK Application Integrations
  • 18. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18 In Place Management Content repositories Content repositories Know what information you have Know where the information is located Know your information is protected Know the information is managed appropriately IDOLConnectorFramework Manage in Place • Content Creation • Business Processes • Collaboration • Projects • Events ControlPoint HP Records Manager Index, Analyze, Auto-Classify Declare Retain and manage active information where it provides the best business value
  • 19. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19 Information Governance Functionality Policy Management Content Collection Source Repositories ConnectorFrameworkServer On Demand FileShares RainStor SEV SharePoint Exchange HP RM • No additional content store • Metadata Management • Retention • Search • ILM • Approval routing • Legal Hold Mgmt and Support • Notification and alerts • Reporting • Audit CP • Indexing Services • MIP • Collect Insert • Delete/Remove • Hold/Release • Hold • Synchronize • View • Audit Basic Available Custom Enterprise Retention Management
  • 20. Copyright © 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners. Craig Adams, EMEA Sales Director – Information Governance Craig Adams, EMEA Sales Director – Information Governance Email: craiga@hp.com craiga@hp.com Mobile: +44 7717 850527 LinkedIn: www.linkedin.com/in/craigadamsuk

Hinweis der Redaktion

  1. HP’s Meaning Based Information Governance framework consists of 5 pillars spanning the full information management lifecycle. Gain Full Understanding of all information including its location, business meaning and governance state Automate Policy Application across all repositories, data types and social media interactions in a consistent and effective manner Prepare for and Respond to audits, discovery & compliance (e.g. FOI Requests) obligations to reduce costs & mitigate systemic risk exposure Protect, Archive, and Secure information to meet business SLA’s based on its meaning and value Ensure Retention and Disposition assets in a defensible manner in accordance with all applicable policies and workflows
  2. AIO: Can render data back based on the view that was used to capture. Don’t need application to exist. No one else can do this.
  3. .