[webinar slides] 3 steps to organizing, finding, and governing your information
TRANSCRIPT
In Association with: Presented by:
Presented October 28, 2015
Three Steps for Finding & Organizing Information
In Association with: Presented by:
AIIM Presents:
Three Steps for Finding & Organizing Information
Host: Theresa ResekDirectorAIIM
Dan ElamVice PresidentContoural
Michelle PhillipsWW Product Marketing IGHewlett Packard
In Association with: Presented by:
Introducing our Featured Speaker
Dan ElamVice President
Contoural
In Association with: Presented by:
Disclaimer
Contoural provides information regarding business, compliance, and litigation trends for educational and planning purposes. However legal information is not the same as legal advice – the application of law to an individual or organization’s specific circumstances. Contoural and its consultants do not provide legal advice. Organizations should consult with competent legal counsel for professional assurance that our information, and any information of it, is appropriate to their particular situation.
In Association with: Presented by:
Big Data, Big Problems
• Data is increasing by 5,000% this decade
• One in three corporations is involved in eDiscovery averaging more than 2.5TB/matter
• Increasing by 25% per yearYear 1 Year 2 Year 3 Year 4 Year 5
In Association with: Presented by:
Data Catalog
• Inventory of the types of data• Must include third parties and cloud• Eventually gets integrated to the
System Inventory• Used to help identify integration
points for new systems
In Association with: Presented by:
System Inventory
• Master list of all systems in the organization
• List of data “concepts” if not actual metadata fields
• Don’t forget systems that have been schedule to be sunset
• Include third party systems and/or cloud
In Association with: Presented by:
ESI Map
• Has legal implications• Federal Rules of Civil Procedure expect
an electronically-stored information (ESI) map to meet the Rule 26f “Meet and Confer” conference
• Assigns “custodians” of information• Must address all data: including USB
drives, legacy systems, phones, etc.
ESIMap
StorageLocations
Systems
Custodians
ContentTypes
In Association with: Presented by:
ESI Map
• A list and a general description of relevant systems, including the nature, location, storage size, organization, and formats employed in each.
• Any limitations to the accessibility of information; electronic documents of limited accessibility may include those created or used by electronic media no longer in use, maintained in redundant electronic storage media, or for which retrieval involves substantial cost.
• Metadata, such as age, owner, date of last access, keywords, etc. associated with relevant information.
• A list of the most likely custodians of relevant electronic materials, including a brief description of each person's title and responsibilities.
• The name of the individual responsible for electronic document retention policies (typically, "the Records Manager or Coordinator"), as well as a general description of the electronic document retention policies for the systems identified above.
In Association with: Presented by:
Organize
Information ends up in one of seven types of content repositories:• Structured: Traditional databases and
legacy applications• Semi-structured: Systems that combine
databases with unstructured content. ECM systems, Some SharePoint implementations
• Unstructured: file shares, out of the box SharePoint• Messaging: email and chat• Video/Audio: voice mail, stored video• Backups: backup tapes, images, and VTLs for all of the above• Paper: Internal and external paper
In Association with: Presented by:
Migrate Data
• Get rid of ROT before the migration• Reduce unstructured• “Manage Appropriately”• Simplify content classification by repositories,
library, folders, doc types, and tags
• Use auto-classification when content volumes exceed ability cost-effectively manage with other approaches
In Association with: Presented by:
Avoiding Media Silos
Scanned Paper
Purchasing Records
Scanned Images
Compliance Documents
Purchasing Records
Compliance Documents
In Association with: Presented by:
Configuring Repositories
Employee ViewContractsWorking
Documents
Finance Records
Reference
2 Year Retention
Internal
Low Relevance
High Individual
Event-based Retention
Confidential
High Relevance
High Reference7 Year Retention
Highly Confid.
Medium Relev.
High Reference
Indefinite Retention
Internal
Medium Relev.
High Reference
Available Filing Locations for This EmployeeRetention
Reference
Time--based
Event-bases
Working Documents
Transitory
Privacy and Sensitivity
Highly Confidential
Level 2 – Confidential, PII, IP, PFI, PCI
Level 3 – Internal
Level 4 – Public
Historical Discovery
High Volume, and Relevance
High Volume and Low Relevance
Medium Volume Low Relevance
Low Volume
Business Value
High Group
High Individual
Medium
Low
ECM
ECM
In Association with: Presented by:
Data Placement Strategy
• Map existing folders and repositories
• Determine “to-be” environments
• Consolidate and simplify withkey emphasis on records management
• Review with users as a prototype
In Association with: Presented by:
Migration Tools
• Critical factors– ROT analysis– Migration assistance (with security)– Auto-classification
• Low end tools can get rid of some ROT, but lack enterprise-class migration features. Enterprise tools can get rid of more.
• Migration is complex: security, document links• Auto-classification includes meta data, folders, and document
understanding• Enterprise-class platforms require tuning and can dramatically
improve conversion and defensible disposition• Enterprise tools can be used in production after the migration
In Association with: Presented by:
Summary
• Three steps: Map, Organize, and Migrate• A good Map can reduce both legal and
IT costs• Organization requires user involvement and can
improve user productivity• Migration can reduce costs, improve performance,
and provide for defensible disposition• Enterprise-class tools provide much better performance
even though high level features may be the same
In Association with: Presented by:
Introducing our Sponsor Speaker
Michelle PhillipsWorldwide Product Marketing IG
Hewlett Packard
In Association with: Presented by:
Big data is changing everything
Growing need to protect and retain all important information
High risk or high value – storage, discovery, opportunity and penalties.
Global regulation driving lengthy and complex retention requirements and audit
Organizations don’t understand what they have, where it lives, who owns it or its business context
Impacts business initiative and ability to deliver services and results
In Association with: Presented by:
And driving a new software category…
File Analysis
HP ControlPoint summary dashboard
In Association with: Presented by:
How do you value information?
23
Reduced cost to manage
Finding the right information when you need it
Insight to drive strategy & decisions
Speed to market / Improved service levels
“User pay” information services
Value: the regard that something is held to deserve; the importance, worth, or usefulness of something
In Association with: Presented by:
Consider the Big Data balance sheet
Monetize
Differentiate
Personalize
Monitor
Meter
Optimize
Predict
…and more
Regulate
Comply
Control
Secure
Address
Ensure
Assets Liabilities
In Association with: Presented by:
HP’s File Analysis software: ControlPoint
Part of a bigger Information Governance strategy
In Association with: Presented by:
Enterprise data clean-up
Understand the value of your information and reduce ROT
Records5-15% of all data
Intellectual Property
25-50% of all data
ROT30-70% of all data
Statistical data derived from Reference 2012 Compliance, Governance and Oversight Council Summit, as well as HP customer site data
In Association with: Presented by:
Policy based migration
Move information to where it offers most value
Information on-boarding
On-board acquired information or valuable legacy data
Vital information
Move business critical information to records/archive system
Quarantine ROT
Identify valuable information and quarantine ROT before migrating
Optimize storage
Migrate to tiered storage according to business value and access
Get your data cloud ready
In Association with: Presented by:
Automated records declaration
Ensure business critical information is managed appropriately
A safety net for ungoverned business critical information
Remove the burden of manual and time consuming classification
Improve records capture and classification accuracy
Reduce risk and improve your compliance state
In Association with: Presented by:
Retention and storage optimization
Intelligently retain information and store according to value – not source
Improve efficiency with complete information lifecycle management
Improve confidence retain information according to value - not uncertainty
Improve compliance
apply policy and manage at the object level – not source
Reduce risksecure critical and sensitive information
Reduce costs by optimising storage and system efficiency
In Association with: Presented by:
Thank You
Dan Elam Vice [email protected] @ElamGuru804-677-4467
Michelle PhillipsWorldwide Product Marketing IGHewlett [email protected] Website:www.hp.com/go/controlpoint
In Association with: Presented by:Visit aiim.org/informationgovernance
Information GovernanceResource Center
Want more information on this topic?
Learn how to transform your information into assets and insights.
Access Industry Tutorials, Research, Webinars, and Expert Advice Blogs - all in one place
In Association with: Presented by:
About AIIM
AIIM is the Global Community of Information Professionals
AIIM believes that the information systems we use at work should be simple, secure, and available anywhere, anytime, and
on any device.
Our mission is to improve organizational performance by empowering a community of leaders committed to information-
driven innovation.
Learn more at www.aiim.org