MODERN SECURITY INFORMATION AND GOVERNANCE by EDWARD JONES

MODERN SECURITY INFORMATION AND GOVERNANCE by EDWARD JONES

Author:EDWARD JONES [JONES, EDWARD]
Language: eng
Format: epub
Published: 2017-05-30T07:00:00+00:00


6.

Rudy Moliere, Leigh Isaacs, and Samantha Lofton, “Predictive Coding for Information Governance,” in Emerging Trends in Law Firm Information Governance (Iron Mountain Inc., 2013), p. 6, accessed December 2013. http://www.greenheartllc.com/images/LFIGS2013Emerging_Trends_

in_ Information_Governance_2013.pdf.

7. Logan, “What is Information Governance?”

8. David Cowan, “Comment: Too Much Security May Affect Business Practices,” June 27, 2012, accessed December 2013. http://www.infosecurity-magazine.com/view/26550/comment-too-much-security-may-affect-business-processes/.

9. Ibid.

Chapter 8

Balancing

Information

Governance and

Your Company’s

Mission

To this point, we have spent quite a bit of time exploring the various aspects of information governance and the clear benefits a solid plan can bring to an organization. However, the question remains whether an information governance plan will be compatible with your organization’s current structure. How difficult will it be? How much will it positively or adversely impact the bottom-line?

While these questions might seem to imply that information governance is being forced upon a business, the fact remains that some business models were established without ever taking information governance into account and are therefore not designed in a manner that would easily permit the introduction of internal checks and balances, policies, and procedures regarding your IT systems and data.

None of this is to suggest that you should re-create your business model from

the ground up to incorporate information governance, although doing so can pay dividends in corporate security. The phrasing of the question seems to suggest that information governance and a profitable business are in some ways mutually exclusive. That is to say, any gain to one comes at the expense of the other. To move toward adopting information governance would be to move away from profitability.

It is understandable that it may be difficult to move away from this line of thinking while you are metaphorically trying to fit the square information governance peg into Information Governance and Security. http://dx.doi.org/10.1016/B978-0-12-800247-6.00008-X

107

Copyright © 2015 Elsevier Inc. All rights reserved.

108 Information Governance and Security

a round business model hole. After all, the corporate environment is in the business of being profitable. The very ecosystem of a successful corporation seems to ensure that any procedures, checks and balances, or behaviors acting in contradiction to that goal are identified and neutralized. If information governance is one of those things that are inhibiting profitability, then surely it will be discounted.

The question of how a business should draw the line between having information governance policies protect their important data while not inhibiting the ability to conduct business is difficult to answer. Information governance can be a matter of two extremes: either being protected or not protected. Will giving too many resources to the former inhibit the ability for a company as a whole to function? After all, how much protection is too much? It is definitely not an easy question to answer, and the issues of increased efficiency, improved productivity, and fewer losses need to be evaluated.

Policies

All businesses should have some form of plan or system in which information is handled or gathered. Systems such as the Generally Accepted Privacy Principles are the mainstay in most businesses today.1 Having a system to follow will limit the possibility of mishandled information while streamlining in-business dealings to be faster and more efficient.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.