SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
Information Governance Outcomes and
Benefits
Establishing Information Governance requires clarity of vision and leadership.
“Without Vision our INFORMATION will perish and our people will cast off restraint!”
In setting up an Information Governance team and organizational structures it is helpful to define
what are our expected outcomes and benefits. Corporate governance regulations, like King IV, hold
the corporate accountable for the capital outcomes based on the outputs from the inputs that it
consumes. This responsibility has challenged me in several areas of my life, professionally as the
current DAMA South African President, I have been challenged to define the outcomes of the DAMA
professional certifications and as an Information Governance Advisor to large organizations to
ensure that the road travelled as the appropriate outcomes and benefits.
I have found it very helpful to spend time thinking about and defining these outcomes for the
specific areas stated above and then to study the more abstract outcome and benefit definitions. In
my study of the abstract definitions I have found a useful definition of the principles by AHIMA:
Information Governance Principles for Healthcare (IGPHC). At the same time, I was struck by the fact
that most of the principles can be applied personally and it made a lot of sense when thinking of the
old cliché “People trust people, not data”.
Our information should embody the same principles of a trusted advisor, if we expect business to
make strategic decisions derived from data. This is Information Governance ultimate goal to enable
business performance and value.
I have defined my abstract vision of Information Governance by defining:
 Outcomes
o What is the single most important information governance outcome?
o What other outcomes are core to the information governance vision?
 Benefits
o How do we remove the Information STRIFE in our organizations?
 (S): Reduce Stress caused by bad or inadequate information
 (T): Effective and Efficient use of time associated with information
 (R): Remove risks when working with information
 (I): Increase the income through the use of information
 (F): Remove the fear and frustration caused by bad or inadequate
information
 (E): Reduce the costs (expense) of working with information
Outcomes
Major Outcome
Establish a SOLID EIM foundation based on information governance principles
that will enable business performance and outcomes.
We have to focus on the business value of information.
To do this, all our attention and efforts can only be applied to information that matters to the
business. We cannot put all information into this category which brings us to the realization and
cliché that “Not all information is equal”.
To ensure that we enable business performance and outcomes with information we need to
differentiate our efforts, targets and goals based on the value that information yields to the
business. This required a strict set of metrics and definition of the value of information.
Secondary Outcomes
The subsequent set of outcomes are based on the principles defined in IGPHC.
Accountability
Take ownership of what you can do to make information better at several levels:
Personal, Peer, Boss / Coach / Mentor, Public.
We need to establish a culture that publicly commits to take ownership of information at all levels.
Evidence of this outcome can be found in the maturity level of our data stewardship organization
and structure.
Transparency
We need to be aware of what is real and true.
This awareness will enable us to:
1. Solve information problems a lot faster
2. Build information collaboration easier
3. Grow authentic information relationships
4. Promote trust in the information provided
The net effect will be higher levels of business performance.
Protection
As we classify information based on its level on sensitivity, value and criticality,
we can determine baseline security controls for its protection.
The lack of information classification leads us to baseline our security controls as either non-existent
or Top-Secret. Neither level of control is appropriate for an organization.
Compliance
We need to assure that the appropriate information management controls have
been enforced with good record-keeping practices.
Compliance is one of the core business drivers and by not paying attention to the required controls
and practices it becomes a matter of when the organization is caught and not if. The reputation of
the business is at risk if we are found to be non-compliant and this will not enable business
performance and / or outcomes.
Availability
We need to ensure critical information availability by determining the appropriate
levels of redundancy, failover and contingencies needed based on the risk of non-
availability.
The bottom line is that we need address information demands by ensuring that the right information
is available at the right time for the right purpose.
Retention
Excessive information volume is detrimental to the business. Information
retention programs define what information to retain, how long to maintain it
and how to dispose of the information when it is no longer needed.
This is based on the concept of Information Lifecycle. The information lifecycle begins at its creation
and ends at its final disposition.
Disposition
We need to establish defensible disposition of data to ensure that we control the
volume of information.
Disposition includes not only the destruction but also any permanent change in information
custodianship. Custodianship can be transferred to another party due to merger or acquisition or
when an organisation discontinues a service.
Benefits
Stress Reduction
Achieving Business Performance levels can be very stressful if the required
information cannot be trusted.
Good and trustworthy information goes a long way to reducing stress in situations that require good
understanding of what is happening and making the right decision that will have long lasting
consequences.
Time effectiveness and efficiency
Bad and / or inadequate information will destroy effective and efficient use of a
resource(s) time. Running late for people and automated processes will increase
financial and reputational costs.
Good information doesn’t require all sorts of wrangling to get it into the format required to report
the business facts. Good information doesn’t lead to application and reporting failures. When the
information preparation runs smoothly, people can focus on delivering what is required.
Risk Removal
The ramifications of non-compliance and failure to deliver are getting higher and
higher and can lead to the demise of the organization.
We are expected to identify potential risks relating to information and assure the appropriate level
of controls are in place to address these risks.
Income Growth
Business Income is no longer restricted too physical and capital assets. Intangible
assets are playing a bigger role in the growth and well-being of a business.
Information is an intangible asset and opens up all sorts of opportunities for business diversification.
Fear and Frustration avoidance
The fear of making the wrong decision and the resulting frustration with
information technology cannot be ignored when doing an impact analysis of bad
business performance and outcomes.
Fear delays decision making and frustration of incorrect decisions is difficult to quantify and hard to
gauge its impact. The business cannot be assertive in its decision making if it has to struggle with
information that it does not trust.
Expense limitation
We all talk about information as an asset but how long does it take and how
much does it cost to get information to a point where it is starting to enable
income generation.
When the cost of production exceeds the derived value, Information is no longer an asset but a
liability. If information is a liability, it needs to be disposed of.
Looking a the POSMAD lifecycle as defined by Denette McGilvray, the only time we derive value is
during the Apply phase, all the other phases: Plan, Obtain, Store & Share, Maintain & Dispose cost
the business. We need to move through the other phases as quickly as possible.

Weitere ähnliche Inhalte

Was ist angesagt?

Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkKannan Subbiah
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologistDonald Tabone
 
You may not need big data after all
You may not need big data after all You may not need big data after all
You may not need big data after all Abhi Rana
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax Technology
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced AnalyticsHaystax Technology
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...Kannan Subbiah
 
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....Dheepika Chokkalingam
 
Chief information officer Assignment
Chief information officer AssignmentChief information officer Assignment
Chief information officer AssignmentRabia Rajput
 

Was ist angesagt? (10)

Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
 
You may not need big data after all
You may not need big data after all You may not need big data after all
You may not need big data after all
 
Haystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous EvaluationHaystax carbon for Insider Threat Management & Continuous Evaluation
Haystax carbon for Insider Threat Management & Continuous Evaluation
 
The Future of Advanced Analytics
The Future of Advanced AnalyticsThe Future of Advanced Analytics
The Future of Advanced Analytics
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
Analysis of "You may not need big data after all - Jeanne W. Ross, Cynthia M....
 
IT Security & Governance Template
IT Security & Governance TemplateIT Security & Governance Template
IT Security & Governance Template
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Chief information officer Assignment
Chief information officer AssignmentChief information officer Assignment
Chief information officer Assignment
 

Ähnlich wie Information Governance Outcomes and Benefits

The CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise ValueThe CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise ValueMark Albala
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information GovernanceMichael Curcio
 
Secure Group Management Model
Secure Group Management ModelSecure Group Management Model
Secure Group Management ModelSecure Group
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps FrameworkFeroot
 
Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Redspin, Inc.
 
The Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information ManagementThe Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information Managementkmortens
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationIrmaBrkic1
 
Strategic Information Management Principles
Strategic Information Management PrinciplesStrategic Information Management Principles
Strategic Information Management Principleskmortens
 
What You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data GovernanceWhat You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data GovernanceDATAVERSITY
 
Slide share Hyper-Decision Making - Short Version
Slide share   Hyper-Decision Making - Short VersionSlide share   Hyper-Decision Making - Short Version
Slide share Hyper-Decision Making - Short VersionDr. Ted Marra
 
Analytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureAnalytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureaNumak & Company
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?Norman Manley
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...Redspin, Inc.
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Redspin, Inc.
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipDwayne Jorgensen
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal Leadershipjobdoctors
 
0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights Brochure0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights BrochureThomas Pulling
 

Ähnlich wie Information Governance Outcomes and Benefits (20)

The CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise ValueThe CDO and the Delivery of Enterprise Value
The CDO and the Delivery of Enterprise Value
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
 
Secure Group Management Model
Secure Group Management ModelSecure Group Management Model
Secure Group Management Model
 
PrivacyOps Framework
PrivacyOps FrameworkPrivacyOps Framework
PrivacyOps Framework
 
Article in Techsmart
Article in TechsmartArticle in Techsmart
Article in Techsmart
 
Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?Healthcare IT Security Who's Responsible, Really?
Healthcare IT Security Who's Responsible, Really?
 
The Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information ManagementThe Legal Issues Of Strategic Information Management
The Legal Issues Of Strategic Information Management
 
ISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementationISO-27001-Beginners-Guide.pdf guidline for implementation
ISO-27001-Beginners-Guide.pdf guidline for implementation
 
Strategic Information Management Principles
Strategic Information Management PrinciplesStrategic Information Management Principles
Strategic Information Management Principles
 
What You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data GovernanceWhat You Should & Shouldn't Tell Your Management about Data Governance
What You Should & Shouldn't Tell Your Management about Data Governance
 
Slide share Hyper-Decision Making - Short Version
Slide share   Hyper-Decision Making - Short VersionSlide share   Hyper-Decision Making - Short Version
Slide share Hyper-Decision Making - Short Version
 
Analytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven CultureAnalytics Isn’t Enough To Create A Data–Driven Culture
Analytics Isn’t Enough To Create A Data–Driven Culture
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
Who needs business intelligence?
Who needs business intelligence?Who needs business intelligence?
Who needs business intelligence?
 
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...Step by Step Guide to Healthcare IT Security Risk Management  - Redspin Infor...
Step by Step Guide to Healthcare IT Security Risk Management - Redspin Infor...
 
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
Ensuring Security, Privacy, and Compliance in Healthcare IT - Redspin Informa...
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal Leadership
 
Combining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal LeadershipCombining Corporate Governance with Internal Leadership
Combining Corporate Governance with Internal Leadership
 
0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights Brochure0. RAS Data assurance & insights Brochure
0. RAS Data assurance & insights Brochure
 

Mehr von Howard Diesel (CDMP BI, DW, DBA, Msc Elec Eng) (6)

DAMA International DMBOK V2 - Comparison with V1
DAMA International DMBOK V2 - Comparison with V1DAMA International DMBOK V2 - Comparison with V1
DAMA International DMBOK V2 - Comparison with V1
 
DAMA June 2017 User Group presentation on ECM
DAMA June 2017 User Group presentation on ECMDAMA June 2017 User Group presentation on ECM
DAMA June 2017 User Group presentation on ECM
 
5 Hot Trends for Data Analytics in 2017
5 Hot Trends for Data Analytics in 20175 Hot Trends for Data Analytics in 2017
5 Hot Trends for Data Analytics in 2017
 
Dama Southern Africa Vision
Dama Southern Africa VisionDama Southern Africa Vision
Dama Southern Africa Vision
 
Information classification
Information classificationInformation classification
Information classification
 
Information classification
Information classificationInformation classification
Information classification
 

Kürzlich hochgeladen

The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfShashank Mehta
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfASGITConsulting
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxShruti Mittal
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfJamesConcepcion7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Aggregage
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsIndiaMART InterMESH Limited
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdfChris Skinner
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckHajeJanKamps
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxappkodes
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesDoe Paoro
 

Kürzlich hochgeladen (20)

The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Darshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdfDarshan Hiranandani [News About Next CEO].pdf
Darshan Hiranandani [News About Next CEO].pdf
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
Types of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdfTypes of Cyberattacks - ASG I.T. Consulting.pdf
Types of Cyberattacks - ASG I.T. Consulting.pdf
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
business environment micro environment macro environment.pptx
business environment micro environment macro environment.pptxbusiness environment micro environment macro environment.pptx
business environment micro environment macro environment.pptx
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
WSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdfWSMM Technology February.March Newsletter_vF.pdf
WSMM Technology February.March Newsletter_vF.pdf
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
Strategic Project Finance Essentials: A Project Manager’s Guide to Financial ...
 
NAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors DataNAB Show Exhibitor List 2024 - Exhibitors Data
NAB Show Exhibitor List 2024 - Exhibitors Data
 
Welding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan DynamicsWelding Electrode Making Machine By Deccan Dynamics
Welding Electrode Making Machine By Deccan Dynamics
 
20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf20200128 Ethical by Design - Whitepaper.pdf
20200128 Ethical by Design - Whitepaper.pdf
 
Pitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deckPitch Deck Teardown: Xpanceo's $40M Seed deck
Pitch Deck Teardown: Xpanceo's $40M Seed deck
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
Appkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptxAppkodes Tinder Clone Script with Customisable Solutions.pptx
Appkodes Tinder Clone Script with Customisable Solutions.pptx
 
Unveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic ExperiencesUnveiling the Soundscape Music for Psychedelic Experiences
Unveiling the Soundscape Music for Psychedelic Experiences
 

Information Governance Outcomes and Benefits

  • 1. Information Governance Outcomes and Benefits Establishing Information Governance requires clarity of vision and leadership. “Without Vision our INFORMATION will perish and our people will cast off restraint!” In setting up an Information Governance team and organizational structures it is helpful to define what are our expected outcomes and benefits. Corporate governance regulations, like King IV, hold the corporate accountable for the capital outcomes based on the outputs from the inputs that it consumes. This responsibility has challenged me in several areas of my life, professionally as the current DAMA South African President, I have been challenged to define the outcomes of the DAMA professional certifications and as an Information Governance Advisor to large organizations to ensure that the road travelled as the appropriate outcomes and benefits. I have found it very helpful to spend time thinking about and defining these outcomes for the specific areas stated above and then to study the more abstract outcome and benefit definitions. In my study of the abstract definitions I have found a useful definition of the principles by AHIMA: Information Governance Principles for Healthcare (IGPHC). At the same time, I was struck by the fact that most of the principles can be applied personally and it made a lot of sense when thinking of the old cliché “People trust people, not data”. Our information should embody the same principles of a trusted advisor, if we expect business to make strategic decisions derived from data. This is Information Governance ultimate goal to enable business performance and value. I have defined my abstract vision of Information Governance by defining:  Outcomes o What is the single most important information governance outcome? o What other outcomes are core to the information governance vision?  Benefits o How do we remove the Information STRIFE in our organizations?  (S): Reduce Stress caused by bad or inadequate information  (T): Effective and Efficient use of time associated with information  (R): Remove risks when working with information  (I): Increase the income through the use of information
  • 2.  (F): Remove the fear and frustration caused by bad or inadequate information  (E): Reduce the costs (expense) of working with information Outcomes Major Outcome Establish a SOLID EIM foundation based on information governance principles that will enable business performance and outcomes. We have to focus on the business value of information. To do this, all our attention and efforts can only be applied to information that matters to the business. We cannot put all information into this category which brings us to the realization and cliché that “Not all information is equal”. To ensure that we enable business performance and outcomes with information we need to differentiate our efforts, targets and goals based on the value that information yields to the business. This required a strict set of metrics and definition of the value of information. Secondary Outcomes The subsequent set of outcomes are based on the principles defined in IGPHC. Accountability Take ownership of what you can do to make information better at several levels: Personal, Peer, Boss / Coach / Mentor, Public. We need to establish a culture that publicly commits to take ownership of information at all levels. Evidence of this outcome can be found in the maturity level of our data stewardship organization and structure. Transparency We need to be aware of what is real and true. This awareness will enable us to: 1. Solve information problems a lot faster 2. Build information collaboration easier 3. Grow authentic information relationships 4. Promote trust in the information provided The net effect will be higher levels of business performance.
  • 3. Protection As we classify information based on its level on sensitivity, value and criticality, we can determine baseline security controls for its protection. The lack of information classification leads us to baseline our security controls as either non-existent or Top-Secret. Neither level of control is appropriate for an organization. Compliance We need to assure that the appropriate information management controls have been enforced with good record-keeping practices. Compliance is one of the core business drivers and by not paying attention to the required controls and practices it becomes a matter of when the organization is caught and not if. The reputation of the business is at risk if we are found to be non-compliant and this will not enable business performance and / or outcomes. Availability We need to ensure critical information availability by determining the appropriate levels of redundancy, failover and contingencies needed based on the risk of non- availability. The bottom line is that we need address information demands by ensuring that the right information is available at the right time for the right purpose. Retention Excessive information volume is detrimental to the business. Information retention programs define what information to retain, how long to maintain it and how to dispose of the information when it is no longer needed. This is based on the concept of Information Lifecycle. The information lifecycle begins at its creation and ends at its final disposition. Disposition We need to establish defensible disposition of data to ensure that we control the volume of information.
  • 4. Disposition includes not only the destruction but also any permanent change in information custodianship. Custodianship can be transferred to another party due to merger or acquisition or when an organisation discontinues a service. Benefits Stress Reduction Achieving Business Performance levels can be very stressful if the required information cannot be trusted. Good and trustworthy information goes a long way to reducing stress in situations that require good understanding of what is happening and making the right decision that will have long lasting consequences. Time effectiveness and efficiency Bad and / or inadequate information will destroy effective and efficient use of a resource(s) time. Running late for people and automated processes will increase financial and reputational costs. Good information doesn’t require all sorts of wrangling to get it into the format required to report the business facts. Good information doesn’t lead to application and reporting failures. When the information preparation runs smoothly, people can focus on delivering what is required. Risk Removal The ramifications of non-compliance and failure to deliver are getting higher and higher and can lead to the demise of the organization. We are expected to identify potential risks relating to information and assure the appropriate level of controls are in place to address these risks. Income Growth Business Income is no longer restricted too physical and capital assets. Intangible assets are playing a bigger role in the growth and well-being of a business. Information is an intangible asset and opens up all sorts of opportunities for business diversification.
  • 5. Fear and Frustration avoidance The fear of making the wrong decision and the resulting frustration with information technology cannot be ignored when doing an impact analysis of bad business performance and outcomes. Fear delays decision making and frustration of incorrect decisions is difficult to quantify and hard to gauge its impact. The business cannot be assertive in its decision making if it has to struggle with information that it does not trust. Expense limitation We all talk about information as an asset but how long does it take and how much does it cost to get information to a point where it is starting to enable income generation. When the cost of production exceeds the derived value, Information is no longer an asset but a liability. If information is a liability, it needs to be disposed of. Looking a the POSMAD lifecycle as defined by Denette McGilvray, the only time we derive value is during the Apply phase, all the other phases: Plan, Obtain, Store & Share, Maintain & Dispose cost the business. We need to move through the other phases as quickly as possible.