What was Old is New (Again)… or How Information Governance is Bringing Sexy Back

IGRM Revisited

Two years ago I asked folks from Big 4, cutting edge technologists, staffing mavens and fellow eDiscovery Geeks “What’s next in eDiscovery?“ in 2014 and beyond. The usual suspects kept cropping up – Big Data, technology-leveraged solutions, TAR, BYOD, social media.  But, when I took a step further back, envisioning 3, 5 years of evolution one thing stuck out in my mind above all else, Information Governance writ large.

36d8e99

The big picture, in my mind, goes well beyond merely eDiscovery.  In the next few years, there will be a unified approach to information management that is not siloed but rather fluidly constructed to manage information proactively, in real-time and reactively across cyber security, eDiscovery, operational and business needs.  These multi-disciplinary structures, policies, procedures, processes and controls will be implemented to manage information at an enterprise level, supporting an organization’s immediate and future regulatory, legal, risk, environmental and operational requirements.

At LTNY 2015, I attended several panels where this vision was not only discussed but expanded upon.  The need for a Chief Information Governance Officer (CIGO) was debated about at length and  Jason Baron had this to say:

“I think the moment has come for one of two things. A designated head of info governance as a sub-function of legal … or a fully mature model where you have a C-suite person who stands as a peer of the CIO of an organization.”

Information Governance was the “belle of the ball” this year, much as Predictive coding, Big Data and the ever present specter of Social media were in previous years.  However, a clear concise explanation of what the heck people meant by Information Governance was notably lacking.  In a Panel entitled “Information Governance – 2020” Alison North of ARMA summed it up nicely, Big Data and Security are the 2 key components. Corporations are racing to  monetize every last bit of data for profit, competitive advantage, and cost-justification of their huge IT investments on the one hand and scrambling to mitigate the exponential cost (both monetary and reputational risk) of security breaches.  The Sony Data breech and an $80 Million record breach announced by Anthem just that morning hammered home the cost of poor IG with regards to Personally Identifiable Information (PII) in particular.  The latter case is especially egregious in that the records contained names, birthdays and Social Security numbers of countless children who are now at risk of identity theft.

Tim Rohrbaugh, chief experience officer at Identity Guard, calls the Anthem breach “catastrophic”

“Every terrible outcome that can occur as the result of an identity theft will happen to the children who were on that database.”

Information Governance Writ Large

Gartner Inc., defines information governance (IG) as the specification of decision rights and an accountability framework to encourage desirable behavior in the valuation, creation, storage, use, archival and deletion of information. It includes the processes, roles, standards and metrics that ensure the effective and efficient use of information in enabling an organization to achieve its goals.  For  IBM, information governance is a holistic approach to managing and leveraging information for business benefits and encompasses information quality, information protection and information life cycle management.

In essence, information government is the superset encompassing eDiscovery, access controls, cyber security, privacy compliance and the overall architecture for a corporation or government entity’s data.  Information governance was given national recognition in November, 2011 with a directive from President Obama to overhaul current records management processes within the government to encompass current needs more comprehensively, this top down support will further advance the integrated view of true IG

The New Vision Integrated IG

In order to support Information Governance (IG) in the widest possible sense, practitioners across all the disciplines that IG touches, need to step back and look at the bigger picture, where there is a deep interconnection between the information access and control needs of an organization.

A broader view of IG, the EDRM and Cyber Concerns copyright Cat Casey 2013

A Broader View of Information Governance, the EDRM and Cyber
Copyright Cat Casey 2013

Many companies have taken the  first step in this transformation comes with re-envisioning how we model the processes associated with reactive information management.  The protocols and tools used to proactively and in real-time manage data are unified under one set of controls or series of control within most organizations.  However as soon as there is an incident, legal hold, compliance issue, independent experts in cyber, eDiscovery and or audit experts are called in and begin to manage the data without regard for the other future needs associated with the data.  Companies and providers alike understand the integration of data throughout the organization and the need to look holistically at the IG.  Service providers with solutions along the full spectrum of IG needs will dominate the market and much like the current end-to-end discovery solution providers, provide a seamless approach to all possible IG needs.

There needs to be an ongoing dialogue between internal IT resources and the providers of services that fall under the IG umbrella, and the adversarial relationship between the two in many instances will need to be ameliorated. That being said the forward progress over the last two years towards a collaborative approach to all aspects of data management is a welcomed improvement.

Interesting Graphic on IG

By: Cat Casey, CEDS

Cat Casey Vice President, Managed Review

Cat Casey
Director KPMG

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: