PART ONE—Information Governance Concepts, Definitions, and Principles
CHAPTER 1 The Onslaught of Big Data and the Information Governance Imperative
Defining Information Governance
IG Is Not a Project, But an Ongoing Program
Failures in Information Governance
Form IG Policies, Then Apply Technology for Enforcement
CHAPTER 2 Information Governance, IT Governance, Data Governance: What's the Difference?
Impact of a Successful IG Program
CHAPTER 3 Information Governance Principles
Generally Accepted Recordkeeping Principles®
Contributed by Charmaine Brooks, CRM
Assessment and Improvement Roadmap
Who Should Determine IG Policies?
PART TWO—Information Governance Risk Assessment and Strategic Planning
CHAPTER 4 Information Risk Planning and Management
Step 1: Survey and Determine Legal and Regulatory Applicability and Requirements
Step 2: Specify IG Requirements to Achieve Compliance
Step 4: Perform Risk Analysis and Assessment
Step 5: Develop an Information Risk Mitigation Plan
Step 6: Develop Metrics and Measure Results
Step 7: Execute Your Risk Mitigation Plan
Step 8: Audit the Information Risk Mitigation Program
CHAPTER 5 Strategic Planning and Best Practices for Information Governance
Crucial Executive Sponsor Role
Evolving Role of the Executive Sponsor
Assigning IG Team Roles and Responsibilities
Align Your IG Plan with Organizational Strategic Plans
Survey and Evaluate External Factors
Formulating the IG Strategic Plan
CHAPTER 6 Information Governance Policy Development
A Brief Review of Generally Accepted Recordkeeping Principles®
Benefits and Risks of Standards
Key Standards Relevant to IG Efforts
Major National and Regional ERM Standards
Making Your Best Practices and Standards Selections to Inform Your IG Framework
Program Communications and Training
Program Controls, Monitoring, Auditing and Enforcement
PART THREE—Information Governance Key Impact Areas Based on the IG Reference Model
CHAPTER 7 Business Considerations for a Successful IG Program
By Barclay T. Blair
Changing Information Environment
Big Data Opportunities and Challenges
Full Cost Accounting for Information
Calculating the Cost of Owning Unstructured Information
Future State: What Will the IG-Enabled Organization Will Look Like?
CHAPTER 8 Information Governance and Legal Functions
By Robert Smallwood with Randy Kahn, Esq., and Barry Murphy
Introduction to e-Discovery: The Revised 2006 Federal Rules of Civil Procedure Changed Everything
More Details on the Revised FRCP Rules
Landmark E-Discovery Case: Zubulake v. UBS Warburg
The Intersection of IG and E-Discovery
By Barry Murphy
Building on Legal Hold Programs to Launch Defensible Disposition
By Barry Murphy
Destructive Retention of E-Mail
Newer Technologies That Can Assist in E-Discovery
Defensible Disposal: The Only Real Way To Manage Terabytes and Petabytes
By Randy Kahn, Esq.
Retention Policies and Schedules
By Robert Smallwood, edited by Paula Lederman, MLS
CHAPTER 9 Information Governance and Records and Information Management Functions
Records Management Business Rationale
Why Is Records Management So Challenging?
Benefits of Electronic Records Management
Additional Intangible Benefits
Generally Accepted Recordkeeping Principles®
E-Records Inventory Challenges
Ensuring Adoption and Compliance of RM Policy
General Principles of a Retention Scheduling
Developing a Records Retention Schedule
Why Are Retention Schedules Needed?
What Records Do You Have to Schedule? Inventory and Classification
Rationale for Records Groupings
Records Series Identification and Classification
How Long Should You Keep Old E-Mails?
Destructive Retention of E-Mail
Legal Requirements and Compliance Research
Event-Based Retention Scheduling for Disposition of E-Records
Prerequisites for Event-Based Disposition
Final Disposition and Closure Criteria
Implementation of the Retention Schedule and Disposal of Records
Ongoing Maintenance of the Retention Schedule
Audit to Manage Compliance with the Retention Schedule
CHAPTER 10 Information Governance and Information Technology Functions
Steps to Governing Data Effectively
IG Best Practices for Database Security and Compliance
CHAPTER 11 Information Governance and Privacy and Security Functions
Insider Threat: Malicious or Not
Controlling Access Using Identity Access Management
Enforcing IG: Protect Files with Rules and Permissions
Challenge of Securing Confidential E-Documents
Apply Better Technology for Better Enforcement in the Extended Enterprise
Secure Communications Using Record-Free E-Mail
Data Loss Prevention (DLP) Technology
Missing Piece: Information Rights Management (IRM)
Hybrid Approach: Combining DLP and IRM Technologies
Securing Trade Secrets after Layoffs and Terminations
Persistently Protecting Blueprints and CAD Documents
Approaches for Securing Data Once It Leaves the Organization
PART FOUR—Information Governance for Delivery Platforms
CHAPTER 12 Information Governance for E-Mail and Instant Messaging
Employees Regularly Expose Organizations to E-Mail Risk
E-Mail Polices Should Be Realistic and Technology Agnostic
E-Record Retention: Fundamentally a Legal Issue
Preserve E-Mail Integrity and Admissibility with Automatic Archiving
Best Practices for Business IM Use
CHAPTER 13 Information Governance for Social Media
By Patricia Franks, Ph.D, CRM, and Robert Smallwood
Types of Social Media in Web 2.0
Additional Social Media Categories
Social Media in the Enterprise
Key Ways Social Media Is Different from E-Mail and Instant Messaging
Legal Risks of Social Media Posts
IG Considerations for Social Media
Key Social Media Policy Guidelines
Records Management and Litigation Considerations for Social Media
Emerging Best Practices for Managing Social Media Records
CHAPTER 14 Information Governance for Mobile Devices
Current Trends in Mobile Computing
Security Risks of Mobile Computing
Building Security into Mobile Applications
Best Practices to Secure Mobile Applications
Developing Mobile Device Policies
CHAPTER 15 Information Governance for Cloud Computing
By Monica Crocker CRM, PMP, CIP, and Robert Smallwood
Key Characteristics of Cloud Computing
What Cloud Computing Really Means
Security Threats with Cloud Computing
Managing Documents and Records in the Cloud
IG Guidelines for Cloud Computing Solutions
CHAPTER 16 SharePoint Information Governance
By Monica Crocker, CRM, PMP, CIP, edited by Robert Smallwood
Where to Begin the Planning Process
PART FIVE—Long-Term Program Issues
CHAPTER 17 Long-Term Digital Preservation
By Charles M. Dollar and Lori J. Ashley
Defining Long-Term Digital Preservation
Key Factors in Long-Term Digital Preservation
Digital Preservation Standards
PREMIS Preservation Metadata Standard
Recommended Open Standard Technology-Neutral Formats
Digital Preservation Requirements
Long-Term Digital Preservation Capability Maturity Model®
Scope of the Capability Maturity Model
Digital Preservation Capability Performance Metrics
Digital Preservation Strategies and Techniques
CHAPTER 18 Maintaining an Information Governance Program and Culture of Compliance
Continuous Process Improvement
Why Continuous Improvement Is Needed
APPENDIX A Information Organization and Classification: Taxonomies and Metadata
By Barb Blackburn, CRM, with Robert Smallwood; edited by Seth Earley
Importance of Navigation and Classification
When Is a New Taxonomy Needed?
Taxonomies Improve Search Results
Metadata Governance, Standards, and Strategies
International Metadata Standards and Guidance
Business Classification Scheme, File Plans, and Taxonomy
Prebuilt versus Custom Taxonomies
Taxonomy Testing: A Necessary Step
Social Tagging and Folksonomies
APPENDIX B Laws and Major Regulations Related to Records Management
By Ken Chasse, J.D., LL.M.
APPENDIX C Laws and Major Regulations Related to Privacy
3.144.90.182