Retain Data Commensurate with Value

Slides:



Advertisements
Similar presentations
Organise Workplace Information
Advertisements

Presentation by Priyanka Sawarkar
Organizing Shared Drive
Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Separating Active from Inactive Records
Recordkeeping for Good Governance Toolkit
Review Questions Business 205
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
GMP Document and Record Retention
Records Management What to Keep and What to Toss.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Developing a Records & Information Retention & Disposition Program:
RECORDS MANAGEMENT City of Oregon City “ That was then… this is now!”
Kevin M. O’Sullivan Head of Records Management Texas A&M University Libraries An Introduction to Records Management.
Architecture of information systems Document managment system Peter Záhorák.
Creating and Maintaining Proper Systems for Electronic Record Keeping
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
David N. Wozei Systems Administrator, IT Auditor.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
Information Systems Security Operational Control for Information Security.
Implementing the Standard on digital recordkeeping.
Restructuring Mergers and CHANGE! Recordkeeping Advice Alice Patterson, Senior Advisor Government Recordkeeping Programme.
Information Asset Classification Community of Practicerev. 10/24/2007 Information Asset Classification What it means to employees.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
Component 8/Unit 9bHealth IT Workforce Curriculum Version 1.0 Fall Installation and Maintenance of Health IT Systems Unit 9b Creating Fault Tolerant.
Information and Records Management INFM 718X/LBSC 708X Seminar on E-Discovery.
National Archives and Records Administration, Preparing for the Unexpected ESSENTIAL ELEMENTS: ANALYSIS.
United States Army Records Management Training Module 1 Part B.
Managing the Paper Mountain Kaushika Patel, Rockland BOCES Maureen McCarthy, Lower Hudson Regional Information Center.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
ISO/IEC 27001:2013 Annex A.8 Asset management
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
03/08/1999UT Austin: GSLIS LIS Information Management LIS /8/99 Martha Richardson.
Checking and Corrective Action EPA Regions 9 & 10 and The Federal Network for Sustainability 2005.
Component 8 Installation and Maintenance of Health IT Systems Unit 9b Creating Fault-Tolerant Systems, Backups, and Decommissioning This material was developed.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Welcome! The Topic For Today Is…. Sample CRM Questions The RM Program & Management Principles Records Creation & Use Records Systems, Storage, & Retrieval.
Records Management with MOSS, K2, & PsiGen Deepa Patadia
© 2016 Chapter 6 Data Management Health Information Management Technology: An Applied Approach.
DOCUMENT AND DATA CONTROL
Selecting what to keep and what to bin
Auditing Concepts.
Slide Template for Module 4 Data Storage, Backup, and Security
Describe the responsibilities of financial-information management in an organization
Defining Electronic Systems
Headline Records Retention Policy Information December 2016.
Records Retention NYS Magistrates’ Association
Data Retention and Disposition
Electronic Records Management Program
Archive / Destruction / Disposal
DM Is Greater Than The DM Organization
Module P6 Principle 6: Establish and Maintain a Management Process for Intellectual Property, Proprietary Information, and Competition-Sensitive Data Learning.
Change Control Module P5 LEARNING OBJECTIVES: LEARNING OUTCOMES
4.5 Checking and Corrective Action Monitoring and Measurement
Introduction to Records Management, FOI & Data Protection
RECORDS AND INFORMATION
Storage Basic recommendations:
The Office Procedures and Technology
Module P4 Identify Data Products and Views So Their Requirements and Attributes Can Be Controlled Learning Objectives: Understand the value of data. Understand.
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Good Spirit School Division
RAMP-TRIM Training modules ppt Training Modules Overview Highlights
Outlook and Shared Drives
Electronic Discovery Sabrina Jones 4/14/2011.
Presentation transcript:

Retain Data Commensurate with Value Module P7 Principle 7: Retain Data Commensurate with Value LEARNING OBJECTIVES: Understand the importance of planning for Enterprise data retention Discuss the requirements for quality data asset maintenance Understand the method for assessing the current and potential future value of Enterprise data holdings Understand the guidelines for disposing of data Page to have graphic representing secure data – lock on a file cabinet or treasure chest perhaps.

Proper planning and protection avoids data re-creation! Plan to Ensure Data are Available When Needed Later Planned Retention Requirements Data Stewardship Repository and Process Control Risk Reduction Presentation: Graphic to emphasize risk reduction – something that will reflect data redundancy or duplication (backup) Explanatory Material: Intro: Any data assets that are of potential business, project, operational, or historic value should be retained until their value is depleted. Data of sustained value to the enterprise should be retained and evaluated on an ongoing basis. Accurate and up-to-date data aids in critical business decisions. Timeliness of the decision-making process with value-added data increases competitive advantage. Planned Retention Requirements: Data assets should, upon their creation and initial storage, have planned retention requirements identified and documented. Such business processes should cover archive formats, frequency of reviews, purge planning, disposition funding, and related activities. Clearly defined methods for data retention help ensure that the data will be available when and if needed. Data Stewardship: To ensure proper planning for eventual disposition of data assets, the enterprise should identify an appropriate data steward for planning disposition dates early in the data life cycle. These stewards should be trained in the organization’s retention and disposal processes. Data stewards ensure that data is stored at authorized locations. They maintain backup copies at locations separate from the masters for best disaster recovery practice. They ensure that backup copies are not maintained or stored at unapproved locations, such as personal residences. They make certain that the physical location of data assets is known and that those assets are easily retrievable by those who need them. Repository and Process Control: Maintaining control of the repository and the associated processes or data holdings is a DM function. The data manager should pay special attention to changes of stewardship in order to avoid data loss. Risk Reduction: An essential element of preservation planning is to ensure planning for adequate protection of data against potential disaster commensurate with the value of the data. The enterprise should review risk areas where singular versions of data could be lost in the event of a disaster and develop plans to mitigate such risks. Mitigation may include developing duplicate copies or scanning paper documents to provide backup, as well as by maintaining electronic versions (tapes, CD, etc.) of files and associated software. Reference Material: ANSI/GEIA 859 - Principle 7 Intro and section 7.1 Proper planning and protection avoids data re-creation!

Maintain Data Assets Accurate and Complete records Security Requirements Storage Considerations Data Migration and Refresh Presentation: Graphic to reflect migration Explanatory Material: Accurate and Complete Records: Accurate and complete records of data assets should be available for view by those with a valid business need, controlled, retained, protected, and subsequently disposed of in accordance with the requirements set forth for the data assets. To ensure that data assets are well identified, the enterprise should use appropriate metadata—identifying data pertinent to the items—to enable retrieval of those assets. Effectively identified data assets enable timely retrieval and destruction as appropriate. Security Requirements: To protect data assets from unauthorized viewing, the enterprise should place security requirements on data assets as appropriate. Enterprise data assets may be of a proprietary, government classified, or other sensitive nature, warranting protection against unauthorized viewing. In a paper environment, protection may be ensured through physical security. In an electronic environment, protection may be ensured through segregation of data by server, by firewall, by password, and similar means. Storage Considerations: When evaluating how to store data, the following questions may assist with decision making: Will the data ever be used as direct source information in the creation of new material? How long will the data likely have value to the enterprise? How difficult will it be to retain compatible (and potentially obsolescent) equipment and software in order to provide for retrievability and readability of the files over their anticipated lives? Data Migration and Refresh: Data media types require migration and refresh to ensure future retrievability. Paper – migrate to electronic neutral format as inks fade and single copies can be destroyed. Electronic non-neutral software – migrate to neutral format for portability to future software versions. Portable electronic media (CDs, floppy disks, tape) – refresh to new media as shelf life limits present a risk to readability and retrievability. Reference Material: ANSI/GEIA 859 - Principle 7 section 7.2

Data Evaluation is Key to Efficient Retention! Assess the Current and Potential Future Value of Enterprise Data Holdings Evaluation and Reevaluation Intervals Evaluation Considerations Active Data vs. Inactive Data Storage Presentation: Graphics as presented Explanatory Material: Evaluation and Reevaluation Intervals: To make sure that it does not retain non-value-added data, the enterprise should assess its data periodically. As a minimum, data should be reevaluated at the time originally designated for disposition, its original default retention date. Reevaluation considers the latest of dates set by law, by local policy, or by ascertained potential need to the enterprise or potential need to the customer. Evaluation Considerations: When evaluating the current and future value of data, some questions that may be asked are as follows: What data is currently stored and for what purpose? Is the data accurate and up-to-date? What are the criteria for the storage life of data? What are the costs associated with data retention? Will retaining the data enhance network security? Is there potential for this data to satisfy contractual or other legal requirements? Active vs. Inactive Data Storage: Active data needs to be readily available to the enterprise for regular reference. Inactive data still retains value but is not considered to have a regular, continuing need. Such data needs to be retrievable, but can be stored less centrally, generally saving cost to and resource of the organization. Non-active data should be periodically reviewed for continuing value. Reference Material: ANSI/GEIA 859 - Principle 7, section 7.3 Data Evaluation is Key to Efficient Retention!

Data Disposal Obtain Disposal Authorization Generate and Maintain Accurate Disposal Records Disposal Methods Presentation: Include graphic of shredder or trashcan Explanatory Material: Intro: Upon determination that data retained is not of continued value, the enterprise should arrange for disposal so that costly resources are not required to maintain non-value assets. Disposal Authorization and Records: An enterprise needs to have an effective process to ensure that qualified individuals or teams of potentially interested parties authorize destruction. In some cases, as in merger environments, other enterprises may be required to jointly authorize destruction. A record should be retained to identify what documents were destroyed, when they were destroyed, and who authorized the destruction Disposal Methods: The enterprise should ensure that data assets of potential value to other parties are destroyed in a way that prevents those assets from becoming publicly available. For example, such measures as electronic deletion, shredding, or burning may be appropriate methods for destruction. Effective destruction processes ensure that the enterprise’s non-value-added data—its trash—is not compromised, becoming another enterprise’s treasure. Reference Material: ANSI/GEIA 859 - Principle 7, section 7.4

Quiz Questions – P7 Which of the following statements best explains why an Enterprise should plan for data retention: a. Planning for data retention ensures appropriate funding is available for archiving when needed. b. Clearly defined methods for data retention help ensure that the data will be available when and if needed. c. Plans for data retention are needed to ensure facilities will be available to store data. d. It is important to plan for data retention to ensure tasking is assigned to the Data Manager. An essential element of preservation planning is to ensure planning for adequate protection of data against potential disaster commensurate with the age of the data. True or False Why is it important to use appropriate metadata when identifying retained data? a. To enable retrieval of those assets. b. To enable development of detailed reports. c. To enable timely destruction as appropriate. d. All of the above.

Quiz Questions – P7 True or False Which of the following is not a method to ensure data assets are protected in an electronic environment? a. Segregation of data by server b. Padlock c. Firewall d. Password When evaluating the current and future value of data, some questions that may be asked are as follows: What data is currently stored and for what purpose? Is the data accurate and up-to-date? What are the criteria for the storage life of data? What are the costs associated with data retention? Will retaining the data enhance network security? Is there potential for this data to satisfy contractual or other legal requirements? True or False

Quiz Questions – P7 Once data is considered non-value, which of the following is true: a. The enterprise should arrange for disposal so that costly resources are not required to maintain non-value assets. b. A record should be retained to identify what documents were destroyed, when they were destroyed, and who authorized the destruction. c. Data assets of potential value to other parties should be destroyed in a way that prevents those assets from becoming publicly available. d. All of the above