InfoGov Basics – Foundational Training
New Global Privacy Standard Established
By Andrew Ysasi
As privacy regulations continue to be introduced around the global, organizations now have an ISO standard they can look to for guidance. In August of 2019, ISO 27701:2019 was published and included the requirements and guidance for establishing, implementing, ...
10 Guiding Principles Every Data Governance Program should Follow
By George Firican
Data governance (DG) can be a challenging initiative for any enterprise launching such a program, but DG is also challenging for enterprises with a fairly mature program in place. There are a lot of success factors that need to ...
Private Eyes Electronic Privacy and US Law
By Mark Driskill
The European Union, with GDPR, now has privacy regulation that is consistent and pervasive and crosses state and national boundaries. The U.S., by contrast, has a piecemeal, loose patchwork of federal and state privacy regulations that at times overlap ...
Six Strategies to Consider When Implementing IG
By Rita Bowen
These approaches can help hospitals to effectively implement IG Assemble a multidisciplinary team. Make sure all disciplines — information technology, health information management, compliance, C-suite, legal, revenue cycle, risk management, quality, finance, security — are represented. Define everyone’s role ...
What is Master Data Management?
By IGW Staff
Master data management (MDM) is a key process for IG success in the IT department, which extends to involved business units. An emerging discipline, MDM came into prominence around 2010 to 2012, coinciding with the Big Data trend. The goal ...
Information Governance: A Primer
By IGW Staff
Information Governance: A Primer According to the Sedona Conference, Information Governance (IG) is about minimizing information risks and costs while maximizing information value. This is a compact way to convey the key aims of IG programs. The definition of IG ...
Stepping into Security Assessments Part 2
By Baird Brueseke
Stepping into Security Assessments – Metrics & Executive Engagement Part II in the Series Before jumping into the topic of assessment metrics, first, a quick update regarding the Center for Internet Security (CIS) controls. Recently released Version 7 separates ...
10 Key Records Management System Considerations
By Bud Porter-Roth
Perfect Ten While Information Governance (IG) is the overall framework for managing all types of corporate information, Records Management (RM) is the specific area of IG that allows you to manage and control documents according to a records policy and ...
IG Assessment Models: Use the Right Tool for the Job
By Robert Smallwood
Tool Time Organizations are ramping up IG programs in today’s risk and regulatory environment that increasingly emphasize the need to reduce information risks and costs, while maximizing information value. The first principle from The Sedona Conference’s® Commentary on Information Governance ...
Why Archive Digital Records
By IGW Staff
Electronic archiving is a long-standing practice, particularly in heavily regulated industries like financial services and healthcare in which regulators have required industry participants retain business records for long periods. However, long-term data retention is a requirement across a wide range ...
What is Security Awareness Training?
By Baird Brueseke
Employees’ human errors are the weakest link in securing an organization’s confidential information. However, there are some small, inexpensive steps (through employee training) that can reduce information risk. Security Awareness Training (SAT) programs educate an organization’s workforce about the risks ...
Backups, Archiving, Preservation—Oh My!
By IGW Staff
Comparing routine backups, content archiving, and long-term digital preservation Digital information, which relies on complex computing platforms and networks, is created, received, and used daily to deliver services to citizens, consumers and customers, businesses, and to government agencies. Organizations face ...
Content Services 101 – Eyes Wide Open – EFSS Benefits and Risks for Users
By IGW Staff
Teamwork in project management is key to successful project completion. Facilitated by information and communications technology (ICT), businesses with global footprints can strategize and collaborate in real-time with professionals half a world away. Electronic File Synch & Share (EFSS) vendors ...
e-Discovery 101
By Andrew Ysasi
Electronic Discovery or eDiscovery is the term used for the initial phase of litigation where the parties in a dispute are required to provide each other relevant information and records, along with all other evidence related to the case (AIIM). ...
e-Discovery Overview
By IGW Staff
We here at InfoGov World realize we are attempting something challenging: we are trying to unite disparate Information Governance elements under one umbrella. Part of that effort is to educate and illuminate areas that you might not otherwise be familiar ...
The Relationship Between Audit and Compliance
By IGW Staff
In the IG world, audit and compliance have a unique relationship: one that ensures a business or other organization does not break any laws, regulations, rules, or standards. An auditor asks the question: Is the business doing what it said ...
Infonomics – An excerpt from Doug Laney’s new INFONOMICS book
By Doug Laney
Infonomics is the theory, study, and discipline of asserting economic significance to information. It provides the framework for businesses to monetize, manage, and measure information as an actual asset. Infonomics endeavors to apply both economic and asset management principles and ...
Analytics 101–The Four Types of Analytics and Their Uses
By IGW Staff
As this is a magazine about Information Governance, it behooves us to offer an introduction to analytics. Don’t worry, there won’t be a test. Let’s start with a term that is bandied about in academic and professional circles with reckless ...
The Role of Analytics in IG Programs
By Sam Fossett
For nearly four decades, data analytics has been used by leading organizations to gain new insights and track emerging market trends. Now, in the era of Big Data, increasingly sophisticated analytics capabilities are being used to help guide and monitor ...
Stepping Into Security Assessments Part 1
By Baird Brueseke
Part 1, Selecting a framework In today’s cyber threat landscape, companies have a fiduciary duty to assess their cyber security posture. This is the root function of a Cyber Security Assessment. Typically, 3rd party vendors are contracted to perform the ...
What is a Vulnerability Assessment?
By Baird Brueseke
The term vulnerability assessment applies to a broad range of systems. For example, in the context of a disaster recovery plan, the vulnerability assessment would include the likelihood of flooding, earthquakes, and other potential disasters. In the digital sphere, a ...
What is Penetration Testing?
By Baird Brueseke
Reduce Risk with Simulated Attacks Penetration testing (“pen test”) is a technique used by information security (InfoSec) professionals to find weaknesses in an organization’s InfoSec defenses. In a penetration test, authorized cybersecurity professionals play the hacker’s role. Penetration testing attempts ...