SlideShare ist ein Scribd-Unternehmen logo
1 von 20
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
InformationGovernance
MaturityinFinancialServices
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2
Key Regulatory Changes
• Record Keeping in Dodd Frank and EMIR
Multi - Jurisdictional Regulatory Requirement
• FINRA (Financial Industries Regulatory Authority), SEC (Securities & Exchange
Commission), CFTC (Commodities & Futures Trading Commission), BoE (Bank of England)
Past Legal or Regulatory Issues or Fines
• Data Protection, Collusion, Corruption, Harassment, Insider Trading, Money Laundering,
80+ others
Reputational or Event Risk
• Keep out of the headlines
Intellectual Property (IP) or Non-Public Info (MNPI) Leaks
Cost Containment
• Storage
• Discovery
Typical Information Goverance Drivers in Banking
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3
Risk & Cost Impact Increasing Year on Year
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4
Example Regulation - Dodd Frank Background
• Regulations under Dodd Frank introduced new requirements for reporting and
record keeping of Swaps and Derivatives related content
• Generally require that relevant records be duplicated and retained for 5 years
following termination, execution, or expiration a contract
• Includes all of the information that is associated with execution of an agreement,
and provide basis for economic terms of a deal
• Retain records according to specific regulatory requirements for immutability and
third-party access within 24 / 36 / 72 hours
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5
HP Autonomy’s Information Governance Solution
Business
Analytics
Search &
Collaboration
Information
Governance
Legal Hold &
eDiscovery
Deal Reconstruction
Supervision
IBM CMOD
Symantec
EV
EMC Centera
NICE
Other
SourcesFile Shares
Social Media Video Audio Email Texts Transactional
Data
IT/OT Search Engine ImagesDocumentsMobile
HP
Bi-directional Connector Framework
RainStor
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6
Information Governance Defined
HP Autonomy Information Governance
A portfolio of modular solutions that help organisations access
and understand human and computer-generated information
without bias to repository or location, organise and control this
data with a centralised policy engine, and intelligently manage
and take action upon this data in accordance with business,
legal/compliance, and data management objectives.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7
Unaware:
unmanaged
Aware:
formative
Aware:
developing
Aware:
competent
Stages of Competency
• Vital records at risk
• Non-compliance
• Duplication of work
• High storage and
e-discovery costs
• No authoritative versions
• No info sharing
• Uncontrolled retention
• Decisions based on incomplete
info
• Incomplete chain of custody
• No recognisable business
context
• Poor information security
• Duplication of work
• High e-discovery cost
• No authoritative versions
• No sharing of information
• Poor retention
• Decisions based on incomplete
information
• Incomplete chain of custody
• No recognisable business
context
• Poor information security
• Duplication of work
• No authoritative versions
• Minimal sharing of
information
• Decisions based on
incomplete information
• No recognisable business
context
• Poor information security
• Cost of manual capture
• Distributed silos of records
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8
Stages of Competency – ARMA GARP Maturity Model
• There is no clear definition of the
records that the organisation is
obligated to keep
• Records and other business
documentation are not
systematically managed according
to records management principles
• Business groups define this to the
best of their ability based upon
their interpretation of rules and
regulations
• There is no central oversight
and/or consistently defensible
position
• There is no defined or understood
process for imposing ‘holds’
Sub Standard In Development Essential Proactive Transformational
• The organisation has identified
the rules and regulations that
govern its business
• The organisation has introduced
some compliance policies and
recordkeeping practices around
them
• The policies are not complete
• There is no apparent or well
defined accountability for
compliance
• There is a hold process, but it is
not well integrated with the
organisations information and
discovery processes
• The organisation has identified all
relevant compliance laws and
regulations
• Record creation and capture are
systematically carried out in
accordance with record
management principles
• The organisation has a strong
code of business conduct which is
integrated into its overall
information governance structure
and record keeping policies
• Compliance and the records that
demonstrate it are highly valued
and measurable
• The hold process is integrated into
the organisations information
management and discovery
processes for the “most critical”
systems
• The organisation has defined
specific goals related to
compliance
• The organisation has
implemented systems to capture
and protect records
• Records are linked with the
metadata used to demonstrate
and measure compliance
• Employees are trained
appropriately and audits are
conducted regularly
• Records of the audits and training
are available for review
• Lack of compliance is remedied
through implementation of
defined correctiveactions
• The hold process is well managed
with defined roles and a
repeatable process that is
integrated into the organisations
information management and
discovery processes
• The importance of compliance and
the role of records and
information in it are clearly
recognised at the senior
management and board levels
• Auditing and continuous
improvement processes are well
established and monitored by
senior management
• The roles and processes for
information management and
discovery are integration
• The organisations stated goals
related to compliance have been
met
• The organisation suffers few or no
adverse consequences based on
information governance and
compliance failures
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9
ARMA – Generally Accepted Recordskeeping Principles
Accountability
Transparency
Integrity
Protection
Compliance
Availability
Retention
Disposition
A senior executive (or person of comparable authority) oversees the recordkeeping program and delegates program responsibility to
appropriate individuals. The organisation adopts policies and procedures to guide personnel and ensure the program can be audited.
The processes and activities of an organisation’s recordkeeping program are documented in a manner that is open and verifiable and is
available to all personnel and interested parties.
A recordkeeping program shall be constructed so the records and information generated or managed by or for the organisation have a
reasonable and suitable guarantee of authenticity and reliability.
A recordkeeping program shall be constructed to ensure a reasonable level of protection to records and information that are private,
confidential, privileged, secret or essential to business continuity.
The recordkeeping program shall be constructed to comply with applicable laws and other binding authorities, as well as the organisation’s
policies.
An organisation shall maintain records in a manner that ensures timely, efficient and accurate retrieval of needed information.
An organisation shall maintain its records and information for an appropriate time, taking into account legal, regulatory, fiscal,
operational, and historical requirements.
An organisation shall provide secure and appropriate disposition for records that are no longer required to be maintained by applicable laws
and the organisation’s policies.
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10
Our Value Proposition
Enterprise Retention Management
Global policy and metadata management
Manage in Place
Single Pane of Glass View
Robust Out of Box Functionality
Manage in Place
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11
HP Autonomy Information Governance Framework
Ensure Retention
& Disposition
HP Information Governance
A platform approach for effectively managing all information,
enterprise-wide, in accordance with corporate policy and business goals
Gain Full
Understanding
Automate Policy
Application
Prepare &
Respond: legal &
regulatory
Store &
Manage in Place
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12
HP Information Governance Solution Stack
HP Records
Manager
CompleteRM
Lifecycle
ControlPoint
File Analytics,
Policy
Management
HP e-
Discovery
Complete
discoverylifecycle
management
HP Legal HoldEnd-to-endlegal
hold
Structured
Data Manager
Structured content
archiving
HP Information Governance
Application Architecture
Core Application Logic
CFS
Intelligent Data Operating Layer
Connectors
Enterprise Repositories
Indexing Services
Connection Services
The Power of the Platform
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13
HP Information Governance Logical Architecture
Connector
Framework
Enrich meta
Name lookups
Speech to text
OCR
Email
IM Voice
HP ControlPoint
-
Classification
HP RM
-
Records
Management
HP Structured
Data
Manager
Compliance Front Office Compliance
Files
Persist
ReviewManage
policy
Report
Unstructured
Applications
Scan/Fax
Structured
WORM /
Disk
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14
Making retention an enterprise reality
HP Information Governance Process Flow
• Allows organizations to identify “dark data:
• Understand its meaning and significant
• Classify and categorize
Control
• Treat related information consistently
• Apply policy to content typeApply Policy
• Make management decisions on access, availability, location and
disposition
• Complete audit trail
Take Action
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15
ControlPoint is an application that provides a user interface and an ‘engine’ for:
HP ControlPoint Introduction
Configuring the classification of files
Reviewing the results of classifications
Configuring and applying policies that
take actions, ‘about’ files that it manages
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16
HP Records Manager Introduction
HP Records Manager
Interactive Document
Management
SharePoint
Governance
ControlPoint Auto-Declare
In-Place Management
SAP
ArchiveLink
AIO Structured
Records
Physical
Records
COM/.NET SDK Services
API
Custom Solutions
ControlPoint Legacy
Data Cleanup
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17
HP Structured Data Manager Introduction
Reduce data
footprint &
storage costs
Enhance
operational
efficiency
Retire outdated
applications
Subset &
Masking for Test
Improve
search and
eDiscovery
SDM
Customized
Solutions
Groovy SDK
Application
Integrations
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18
In Place Management
Content
repositories
Content
repositories Know what
information you
have
Know where the
information is
located
Know your
information is
protected
Know the
information is
managed
appropriately
IDOLConnectorFramework
Manage in Place
• Content Creation
• Business Processes
• Collaboration
• Projects
• Events
ControlPoint
HP Records
Manager
Index, Analyze,
Auto-Classify
Declare
Retain and manage active information where it provides the best business value
HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19
Information Governance Functionality
Policy Management Content Collection Source Repositories
ConnectorFrameworkServer
On
Demand
FileShares
RainStor
SEV
SharePoint
Exchange
HP RM
• No additional content store
• Metadata Management
• Retention
• Search
• ILM
• Approval routing
• Legal Hold Mgmt and Support
• Notification and alerts
• Reporting
• Audit
CP
• Indexing Services
• MIP
• Collect Insert
• Delete/Remove
• Hold/Release
• Hold
• Synchronize
• View
• Audit
Basic
Available
Custom
Enterprise Retention Management
Copyright © 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners.
Craig Adams, EMEA Sales Director – Information Governance
Craig Adams, EMEA Sales Director – Information Governance
Email: craiga@hp.com craiga@hp.com
Mobile: +44 7717 850527
LinkedIn: www.linkedin.com/in/craigadamsuk

Weitere ähnliche Inhalte

Was ist angesagt?

Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Everteam
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Druva
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...BigDataEverywhere
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big DataNicolas Morales
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Index Engines Inc.
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesTony Pearson
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionDigital Guardian
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness TestDruva
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17Everteam
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentationAndrey Karpov
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!cisoplatform
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the CloudPeak 10
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big DataSaurabh Kheni
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 

Was ist angesagt? (20)

Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2Doculabs Everteam houston breakfast 06.29.17 v0.2
Doculabs Everteam houston breakfast 06.29.17 v0.2
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
 
Security and Audit for Big Data
Security and Audit for Big DataSecurity and Audit for Big Data
Security and Audit for Big Data
 
Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017Building the Governance Ready Enterprise for GDPR Compliance December 2017
Building the Governance Ready Enterprise for GDPR Compliance December 2017
 
Storing Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance ChallengesStoring Archive Data to meet Compliance Challenges
Storing Archive Data to meet Compliance Challenges
 
The CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss PreventionThe CISO’s Guide to Data Loss Prevention
The CISO’s Guide to Data Loss Prevention
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Data Privacy Readiness Test
Data Privacy Readiness TestData Privacy Readiness Test
Data Privacy Readiness Test
 
Building the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR ComplianceBuilding the Governance Ready Enterprise for GDPR Compliance
Building the Governance Ready Enterprise for GDPR Compliance
 
InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17InfoDNA Everteam houston breakfast 06.29.17
InfoDNA Everteam houston breakfast 06.29.17
 
Record manager 8.0 presentation
Record manager 8.0  presentationRecord manager 8.0  presentation
Record manager 8.0 presentation
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
DLP
DLPDLP
DLP
 
Big data security challenges and recommendations!
Big data security challenges and recommendations!Big data security challenges and recommendations!
Big data security challenges and recommendations!
 
10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud10 Tips for CIOs - Data Security in the Cloud
10 Tips for CIOs - Data Security in the Cloud
 
A Little Security For Big Data
A Little Security For Big DataA Little Security For Big Data
A Little Security For Big Data
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 

Ähnlich wie Information Governance Maturity for Financial Services

Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentationIgor Swann
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsTrustArc
 
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumInformation Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumDeloitte United States
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiRobust Marketing & Consulting (Pty) Ltd
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance ProgramBohdiman
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information GovernanceMichael Curcio
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)Nick Inglis
 
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...ARMA International
 
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DATUM LLC
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategySustainableEnergyAut
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
Dark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File AnalysisDark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File AnalysisCraig Adams
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Lovejadams6
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 
How to Structure the Data Organization
How to Structure the Data OrganizationHow to Structure the Data Organization
How to Structure the Data OrganizationRobyn Bollhorst
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 
Information Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation SlidesInformation Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation SlidesSlideTeam
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseDenodo
 

Ähnlich wie Information Governance Maturity for Financial Services (20)

Information governance presentation
Information governance   presentationInformation governance   presentation
Information governance presentation
 
Data Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & AcquisitionsData Privacy: The Hidden Beast within Mergers & Acquisitions
Data Privacy: The Hidden Beast within Mergers & Acquisitions
 
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data ConundrumInformation Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
Information Rich, Knowledge Poor: Overcoming Insurers’ Data Conundrum
 
Cor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popiCor concepts information governance-protection-of-personal-information-act-popi
Cor concepts information governance-protection-of-personal-information-act-popi
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance Program
 
A Practical Guide To Information Governance
A Practical Guide To Information GovernanceA Practical Guide To Information Governance
A Practical Guide To Information Governance
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
 
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
 
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
DGIQ 2018 Presentation: How to be successful in the post GDPR landscape – bui...
 
RFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data StrategyRFT for Business Intelligence and Data Strategy
RFT for Business Intelligence and Data Strategy
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
Dark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File AnalysisDark Data Discovery & Governance with File Analysis
Dark Data Discovery & Governance with File Analysis
 
Building a Strategy customers and Auditors Love
Building a Strategy customers and Auditors LoveBuilding a Strategy customers and Auditors Love
Building a Strategy customers and Auditors Love
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
How to Structure the Data Organization
How to Structure the Data OrganizationHow to Structure the Data Organization
How to Structure the Data Organization
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
Information Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation SlidesInformation Governance Strategy Powerpoint Presentation Slides
Information Governance Strategy Powerpoint Presentation Slides
 
Regulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven EnterpriseRegulation and Compliance in the Data Driven Enterprise
Regulation and Compliance in the Data Driven Enterprise
 

Kürzlich hochgeladen

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceanilsa9823
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...panagenda
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Kürzlich hochgeladen (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female serviceCALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
CALL ON ➥8923113531 🔝Call Girls Badshah Nagar Lucknow best Female service
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 

Information Governance Maturity for Financial Services

  • 1. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. InformationGovernance MaturityinFinancialServices
  • 2. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2 Key Regulatory Changes • Record Keeping in Dodd Frank and EMIR Multi - Jurisdictional Regulatory Requirement • FINRA (Financial Industries Regulatory Authority), SEC (Securities & Exchange Commission), CFTC (Commodities & Futures Trading Commission), BoE (Bank of England) Past Legal or Regulatory Issues or Fines • Data Protection, Collusion, Corruption, Harassment, Insider Trading, Money Laundering, 80+ others Reputational or Event Risk • Keep out of the headlines Intellectual Property (IP) or Non-Public Info (MNPI) Leaks Cost Containment • Storage • Discovery Typical Information Goverance Drivers in Banking
  • 3. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3 Risk & Cost Impact Increasing Year on Year
  • 4. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4 Example Regulation - Dodd Frank Background • Regulations under Dodd Frank introduced new requirements for reporting and record keeping of Swaps and Derivatives related content • Generally require that relevant records be duplicated and retained for 5 years following termination, execution, or expiration a contract • Includes all of the information that is associated with execution of an agreement, and provide basis for economic terms of a deal • Retain records according to specific regulatory requirements for immutability and third-party access within 24 / 36 / 72 hours
  • 5. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5 HP Autonomy’s Information Governance Solution Business Analytics Search & Collaboration Information Governance Legal Hold & eDiscovery Deal Reconstruction Supervision IBM CMOD Symantec EV EMC Centera NICE Other SourcesFile Shares Social Media Video Audio Email Texts Transactional Data IT/OT Search Engine ImagesDocumentsMobile HP Bi-directional Connector Framework RainStor
  • 6. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6 Information Governance Defined HP Autonomy Information Governance A portfolio of modular solutions that help organisations access and understand human and computer-generated information without bias to repository or location, organise and control this data with a centralised policy engine, and intelligently manage and take action upon this data in accordance with business, legal/compliance, and data management objectives. © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  • 7. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7 Unaware: unmanaged Aware: formative Aware: developing Aware: competent Stages of Competency • Vital records at risk • Non-compliance • Duplication of work • High storage and e-discovery costs • No authoritative versions • No info sharing • Uncontrolled retention • Decisions based on incomplete info • Incomplete chain of custody • No recognisable business context • Poor information security • Duplication of work • High e-discovery cost • No authoritative versions • No sharing of information • Poor retention • Decisions based on incomplete information • Incomplete chain of custody • No recognisable business context • Poor information security • Duplication of work • No authoritative versions • Minimal sharing of information • Decisions based on incomplete information • No recognisable business context • Poor information security • Cost of manual capture • Distributed silos of records
  • 8. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8 Stages of Competency – ARMA GARP Maturity Model • There is no clear definition of the records that the organisation is obligated to keep • Records and other business documentation are not systematically managed according to records management principles • Business groups define this to the best of their ability based upon their interpretation of rules and regulations • There is no central oversight and/or consistently defensible position • There is no defined or understood process for imposing ‘holds’ Sub Standard In Development Essential Proactive Transformational • The organisation has identified the rules and regulations that govern its business • The organisation has introduced some compliance policies and recordkeeping practices around them • The policies are not complete • There is no apparent or well defined accountability for compliance • There is a hold process, but it is not well integrated with the organisations information and discovery processes • The organisation has identified all relevant compliance laws and regulations • Record creation and capture are systematically carried out in accordance with record management principles • The organisation has a strong code of business conduct which is integrated into its overall information governance structure and record keeping policies • Compliance and the records that demonstrate it are highly valued and measurable • The hold process is integrated into the organisations information management and discovery processes for the “most critical” systems • The organisation has defined specific goals related to compliance • The organisation has implemented systems to capture and protect records • Records are linked with the metadata used to demonstrate and measure compliance • Employees are trained appropriately and audits are conducted regularly • Records of the audits and training are available for review • Lack of compliance is remedied through implementation of defined correctiveactions • The hold process is well managed with defined roles and a repeatable process that is integrated into the organisations information management and discovery processes • The importance of compliance and the role of records and information in it are clearly recognised at the senior management and board levels • Auditing and continuous improvement processes are well established and monitored by senior management • The roles and processes for information management and discovery are integration • The organisations stated goals related to compliance have been met • The organisation suffers few or no adverse consequences based on information governance and compliance failures
  • 9. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9 ARMA – Generally Accepted Recordskeeping Principles Accountability Transparency Integrity Protection Compliance Availability Retention Disposition A senior executive (or person of comparable authority) oversees the recordkeeping program and delegates program responsibility to appropriate individuals. The organisation adopts policies and procedures to guide personnel and ensure the program can be audited. The processes and activities of an organisation’s recordkeeping program are documented in a manner that is open and verifiable and is available to all personnel and interested parties. A recordkeeping program shall be constructed so the records and information generated or managed by or for the organisation have a reasonable and suitable guarantee of authenticity and reliability. A recordkeeping program shall be constructed to ensure a reasonable level of protection to records and information that are private, confidential, privileged, secret or essential to business continuity. The recordkeeping program shall be constructed to comply with applicable laws and other binding authorities, as well as the organisation’s policies. An organisation shall maintain records in a manner that ensures timely, efficient and accurate retrieval of needed information. An organisation shall maintain its records and information for an appropriate time, taking into account legal, regulatory, fiscal, operational, and historical requirements. An organisation shall provide secure and appropriate disposition for records that are no longer required to be maintained by applicable laws and the organisation’s policies.
  • 10. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10 Our Value Proposition Enterprise Retention Management Global policy and metadata management Manage in Place Single Pane of Glass View Robust Out of Box Functionality Manage in Place
  • 11. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11 HP Autonomy Information Governance Framework Ensure Retention & Disposition HP Information Governance A platform approach for effectively managing all information, enterprise-wide, in accordance with corporate policy and business goals Gain Full Understanding Automate Policy Application Prepare & Respond: legal & regulatory Store & Manage in Place
  • 12. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12 HP Information Governance Solution Stack HP Records Manager CompleteRM Lifecycle ControlPoint File Analytics, Policy Management HP e- Discovery Complete discoverylifecycle management HP Legal HoldEnd-to-endlegal hold Structured Data Manager Structured content archiving HP Information Governance Application Architecture Core Application Logic CFS Intelligent Data Operating Layer Connectors Enterprise Repositories Indexing Services Connection Services The Power of the Platform
  • 13. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13 HP Information Governance Logical Architecture Connector Framework Enrich meta Name lookups Speech to text OCR Email IM Voice HP ControlPoint - Classification HP RM - Records Management HP Structured Data Manager Compliance Front Office Compliance Files Persist ReviewManage policy Report Unstructured Applications Scan/Fax Structured WORM / Disk
  • 14. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.14 Making retention an enterprise reality HP Information Governance Process Flow • Allows organizations to identify “dark data: • Understand its meaning and significant • Classify and categorize Control • Treat related information consistently • Apply policy to content typeApply Policy • Make management decisions on access, availability, location and disposition • Complete audit trail Take Action
  • 15. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.15 ControlPoint is an application that provides a user interface and an ‘engine’ for: HP ControlPoint Introduction Configuring the classification of files Reviewing the results of classifications Configuring and applying policies that take actions, ‘about’ files that it manages
  • 16. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16 HP Records Manager Introduction HP Records Manager Interactive Document Management SharePoint Governance ControlPoint Auto-Declare In-Place Management SAP ArchiveLink AIO Structured Records Physical Records COM/.NET SDK Services API Custom Solutions ControlPoint Legacy Data Cleanup
  • 17. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17 HP Structured Data Manager Introduction Reduce data footprint & storage costs Enhance operational efficiency Retire outdated applications Subset & Masking for Test Improve search and eDiscovery SDM Customized Solutions Groovy SDK Application Integrations
  • 18. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18 In Place Management Content repositories Content repositories Know what information you have Know where the information is located Know your information is protected Know the information is managed appropriately IDOLConnectorFramework Manage in Place • Content Creation • Business Processes • Collaboration • Projects • Events ControlPoint HP Records Manager Index, Analyze, Auto-Classify Declare Retain and manage active information where it provides the best business value
  • 19. HP and Autonomy Confidential © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19 Information Governance Functionality Policy Management Content Collection Source Repositories ConnectorFrameworkServer On Demand FileShares RainStor SEV SharePoint Exchange HP RM • No additional content store • Metadata Management • Retention • Search • ILM • Approval routing • Legal Hold Mgmt and Support • Notification and alerts • Reporting • Audit CP • Indexing Services • MIP • Collect Insert • Delete/Remove • Hold/Release • Hold • Synchronize • View • Audit Basic Available Custom Enterprise Retention Management
  • 20. Copyright © 2013 HP Autonomy. All rights reserved. Other trademarks are registered trademarks and the properties of their respective owners. Craig Adams, EMEA Sales Director – Information Governance Craig Adams, EMEA Sales Director – Information Governance Email: craiga@hp.com craiga@hp.com Mobile: +44 7717 850527 LinkedIn: www.linkedin.com/in/craigadamsuk

Hinweis der Redaktion

  1. HP’s Meaning Based Information Governance framework consists of 5 pillars spanning the full information management lifecycle. Gain Full Understanding of all information including its location, business meaning and governance state Automate Policy Application across all repositories, data types and social media interactions in a consistent and effective manner Prepare for and Respond to audits, discovery & compliance (e.g. FOI Requests) obligations to reduce costs & mitigate systemic risk exposure Protect, Archive, and Secure information to meet business SLA’s based on its meaning and value Ensure Retention and Disposition assets in a defensible manner in accordance with all applicable policies and workflows
  2. AIO: Can render data back based on the view that was used to capture. Don’t need application to exist. No one else can do this.
  3. .