In this blog series we're going to look at the practical implications of making Information Governance (IG) stick. We're doing this because it’s clear that most people think IG is important (few people dispute it) but, in practical terms, it’s tough to execute, especially when it comes to governance of unstructured (or user-generated) data.
There are many reasons for this apparent contradiction. Probably the most important is that IG is a lot like an insurance policy. That is, in today's world, IG can seem like a luxury when you haven't been at the sharp end of a data breach, a fine from a regulator or some painful data event where the accumulation of years of poor (or non-existing practices) come home to roost.
This series is going to cover (as the title suggests) governing unstructured, user generated, data during its normal daily use. If you’re not familiar with the Electronic Discovery Reference Model (EDRM) you can learn more here; very briefly, the left-hand side of this model refers to IG and the management of data in use, as opposed to when a legal discovery event has been initiated. As a result, we'll be looking at preventive (or proactive) activity and practices. The good work that protects the organization and, when done well, reduces the cost and liability of data ownership and, in the most mature cases, can add value to the bottom line. At its core, this is all about developing practices that drive the organization to get better and better at storing less data. To be more specific, that means storing less data in the wrong places (unprotected in the wild) and, to complement that, to get better at recognizing, storing and re-using valuable and sensitive data in the right places.
At this point it’s important to recognize more formal work done in this area. In no particular order, we should recognize ARMA's IG Implementation Model as well as the EDRM's IG Reference Model mentioned above. Each provide a common vocabulary and foundations that can be used to develop a range of IG strategies, policies and processes for any organization. We'll treat these (and others we've surely missed) as context while exploring some real-world issues that so often get in the way of their successful deployment.
Alongside these models, analyst organizations such as Gartner and Forrester continue to write on the subject and its supporting technologies, although, in our opinion, they often fall short of providing actionable advice beneath the strategic level. That notwithstanding, we would characterize their view as, increasingly, organizations need to complement their information security posture with the people, process and technology capabilities that enable them to proactively understand and classify their information assets inside the defensive perimeter.
In the course of working with customers, partners, analysts and opportunities alike, what's clear to us is that most organizations are struggling to land their information governance programs, if they have a program at all. To put another way, when we presented at this year’s HIMSS Conference, we coined the headline ‘Bad Information Governance comes as standard’. Common threads include:
That said, we see success too. While it can be in pockets, we have seen plenty of organization-wide programs establish themselves and deliver benefits. These programs often have their origins in some change event (such a migration or divestiture or, increasingly, in response to some security event). Cool practices (that we'll return to in the future) include:
Overall, the state of play, in our opinion, is patchy. If we think about governance of unstructured data using a generalized maturity model framework (such as the CMMI) we might describe many or most organizations as being at Level 1 (initial) or even Level 0 (unaware or unknown). Clearly there are plenty that are well beyond that mark but we’re generalizing here, while noting that there’s some great practice to circle back to for future articles.
Many have written on the implications of poor IG and, as we said at the beginning, it seems that most understand them, even if they don't feel compelled to act. What's clear is that the global march of data privacy regulation and awareness will continue to raise the bar for IG. These will increasingly drive organizations to invest in becoming better stewards of their customers' and their own data and, in turn, start to attend to the lefthand side of the EDRM.
Our customers are beginning to prioritize IG because the following things are grabbing their attention:
Looking ahead to the rest of this series, here's a preview of the dimension we think organizations and their leadership need to account for as real-world considerations for getting better at storing less data:
This blog series will explore each of these in pursuit of what we think should be a foundational goal of any IG program - achieving a state of Zero Dark Data. In this state the organization can take defensible, practical decisions about how and whether to retain any of its data and, in turn, reduce its risk and cost of ownership, mitigate potential regulatory sanctions and, in time, increase the value of its information. Why not join us by commenting as we go? We'd love to hear your feedback.