In: Operations Management
1.What is Information Governance?
2.What are a minimum of four best practices for Information Governance?
3.What are the Federal Rules of Civil Procedure (FRCP) and their relationship with e-Discovery?
4.Identify the role of Information Governance on
Social Media
Mobile Devices
Cloud Computing
1) Information Governance is a strategy of strictly protecting, maintaining, distributing and authorizing for deletion of some exclusive data, that are related to a business firm. This includes both digital and paper files. It is a much more complex process than an ordinary record maintenance system. These data contains details about business strategy, legal compliance policies and risk assessment modes etc.
2) 4 best practices for Information Governance
(a) Prioritize the objectives
As per the company policy Executive members should analyze and decide the objectives required for Information Governance.
(b) Involving IT and Legal department
These people are very important when it comes to Information Governance. Their opinion must be prioritized even before setting goals because the IT department ensures the technological competency and legal department takes care of the legal compliance of a company.
(c) Regular Monitoring
With the help of the IT department make sure that everything has been properly maintained and coordinated.
(d) Final Assessment
After the implementation and monitoring, a final assessment is necessary to ensure the effectiveness of Information Governance
3) FRCP is a government body that is responsible to manage and resolve civil procedures or civil cases. E-discovery is the process of creation, review and submission of a valid electronic data in the court for legal proceedings. So in FRCP, it's been used as an evidence for civil cases.
4) Role of Information Governance
(a) Companies usually implement certain policies that ban the usage of official e-mails for causal activities and only allow any personal communication through it when there is an absolute necessity. ‘E-mail achieving’ is one of the best methods of securing your official mails and is widely using for Information Governance. Immediate disposal of confidential emails are also being practiced due to security concerns.
(b) Due to the lack of required digital norms, it is somewhat a difficult task to ensure the Information Governance of social media. So companies usually imply protection on their internet connectivity and prohibits any unauthorized access to social media pages owned by the company.
(c) An entity prohibits the usage of unsecured apps in mobile devices including smartphones, laptops, notebooks, etc. Some companies have exclusively developed apps for their safe communication protocol. To prevent the staff from careless usage of their mobile devices with the internet provided by the company, the IT department applies activated firewalls that prohibit both incoming and outgoing connection towards unsafe servers. It helps to avoid the exposure to any security vulnerability and to avoid any outside intrusion.
(d) Cloud computing uses remote host servers to store and obtain data whenever it's necessary. Information Governance for the cloud is not much different from e-mail and internet protocols. Since the data can be accessed from any location its mainly been using for storing E-discovery etc. Only top management people have access to the login credentials for the cloud database.