InfoGov Basics – Foundational Training

New Global Privacy Standard Established

  As privacy regulations continue to be introduced around the global, organizations now have an ISO standard they can look to for guidance. In August of 2019, ISO 27701:2019 was published and included the requirements and guidance for establishing, implementing, ...
IG Academy

Information Governance: A Primer

Information Governance:  A Primer According to the Sedona Conference, Information Governance (IG) is about minimizing information risks and costs while maximizing information value. This is a compact way to convey the key aims of IG programs. The definition of IG ...
Electronic-Discovery-Reference-Model

e-Discovery 101

Electronic Discovery or eDiscovery is the term used for the initial phase of litigation where the parties in a dispute are required to provide each other relevant information and records, along with all other evidence related to the case (AIIM). ...
Analytics-101-Four-types-and-uses

Analytics 101–The Four Types of Analytics and Their Uses

As this is a magazine about Information Governance, it behooves us to offer an introduction to analytics. Don’t worry, there won’t be a test. Let’s start with a term that is bandied about in academic and professional circles with reckless ...
Eyes-Wide-Open-EFSS-Benefits-Risks-for-Users

Content Services 101 – Eyes Wide Open – EFSS Benefits and Risks for Users

Teamwork in project management is key to successful project completion. Facilitated by information and communications technology (ICT), businesses with global footprints can strategize and collaborate in real-time with professionals half a world away. Electronic File Synch & Share (EFSS) vendors ...

10 Guiding Principles Every Data Governance Program should Follow

  Data governance (DG) can be a challenging initiative for any enterprise launching such a program, but DG is also challenging for enterprises with a fairly mature program in place. There are a lot of success factors that need to ...

What is Master Data Management?

Master data management (MDM) is a key process for IG success in the IT department, which extends to involved business units. An emerging discipline, MDM came into prominence around 2010 to 2012, coinciding with the Big Data trend. The goal ...

Six Strategies to Consider When Implementing IG

  These approaches can help hospitals to effectively implement IG Assemble a multidisciplinary team. Make sure all disciplines — information technology, health information management, compliance, C-suite, legal, revenue cycle, risk management, quality, finance, security — are represented. Define everyone’s role ...

Stepping into Security Assessments Part 2

  Stepping into Security Assessments – Metrics & Executive Engagement Part II in the Series Before jumping into the topic of assessment metrics, first, a quick update regarding the Center for Internet Security (CIS) controls. Recently released Version 7 separates ...

10 Key Records Management System Considerations

Perfect Ten While Information Governance (IG) is the overall framework for managing all types of corporate information, Records Management (RM) is the specific area of IG that allows you to manage and control documents according to a records policy and ...

IG Assessment Models: Use the Right Tool for the Job

Tool Time Organizations are ramping up IG programs in today’s risk and regulatory environment that increasingly emphasize the need to reduce information risks and costs, while maximizing information value. The first principle from The Sedona Conference’s® Commentary on Information Governance ...

Why Archive Digital Records

Electronic archiving is a long-standing practice, particularly in heavily regulated industries like financial services and healthcare in which regulators have required industry participants retain business records for long periods. However, long-term data retention is a requirement across a wide range ...

Private Eyes Electronic Privacy and US Law

  The European Union, with GDPR, now has privacy regulation that is consistent and pervasive and crosses state and national boundaries. The U.S., by contrast, has a piecemeal, loose patchwork of federal and state privacy regulations that at times overlap ...
InfoGov-World-Backups-Archiving-Preservation

Backups, Archiving, Preservation—Oh My!

Comparing routine backups, content archiving, and long-term digital preservation Digital information, which relies on complex computing platforms and networks, is created, received, and used daily to deliver services to citizens, consumers and customers, businesses, and to government agencies. Organizations face ...
InfoGov-World-e-Discover-Overview

e-Discovery Overview

We here at InfoGov World realize we are attempting something challenging: we are trying to unite disparate Information Governance elements under one umbrella. Part of that effort is to educate and illuminate areas that you might not otherwise be familiar ...
The-Relationship-Between-Audit-and-Compliance

The Relationship Between Audit and Compliance

In the IG world, audit and compliance have a unique relationship: one that ensures a business or other organization does not break any laws, regulations, rules, or standards. An auditor asks the question: Is the business doing what it said ...
Doug-Laney-New-Book-Infonomics

Infonomics – An excerpt from Doug Laney’s new INFONOMICS book

Infonomics is the theory, study, and discipline of asserting economic significance to information. It provides the framework for businesses to monetize, manage, and measure information as an actual asset. Infonomics endeavors to apply both economic and asset management principles and ...
Role-of-analytics-in-IG-Programs

The Role of Analytics in IG Programs

For nearly four decades, data analytics has been used by leading organizations to gain new insights and track emerging market trends. Now, in the era of Big Data, increasingly sophisticated analytics capabilities are being used to help guide and monitor ...
Stepping-into-security-assessment-part-1

Stepping Into Security Assessments Part 1

Part 1, Selecting a framework In today’s cyber threat landscape, companies have a fiduciary duty to assess their cyber security posture.  This is the root function of a Cyber Security Assessment. Typically, 3rd party vendors are contracted to perform the ...
What-is-a-vulnerability-assessment

What is a Vulnerability Assessment?

The term vulnerability assessment applies to a broad range of systems. For example, in the context of a disaster recovery plan, the vulnerability assessment would include the likelihood of flooding, earthquakes, and other potential disasters. In the digital sphere, a ...
What-is-Penetration-Testing

What is Penetration Testing?

Reduce Risk with Simulated Attacks Penetration testing (“pen test”) is a technique used by information security (InfoSec) professionals to find weaknesses in an organization’s InfoSec defenses. In a penetration test, authorized cybersecurity professionals play the hacker’s role. Penetration testing attempts ...
Infogovworld-What-is-security-awareness-training

What is Security Awareness Training?

Employees’ human errors are the weakest link in securing an organization’s confidential information. However, there are some small, inexpensive steps (through employee training) that can reduce information risk. Security Awareness Training (SAT) programs educate an organization’s workforce about the risks ...

Digital Editions

Read Our Latest Edition

Scroll to Top