Since we are living in an information-rich world, there are three things that describe enterprise data management: concept, business objective and system. Enterprise data management is basically about the successful data integration into different business applications and effective data retrieval for business processes utilization. Every firm is a hodgepodge of different kinds of data or information that must be managed efficiently otherwise other entities might gain access to such and use them against the company. This is where the role of information management governance comes in. Information governance may mean a lot of things to any individual or firm, but the meanings are always related to proper utilization, distribution, retrieval and disposal of information. Information management governance is also about specifying the decisions and accountabilities surrounding the manipulation of information for any given purpose. For some, information governance is also about encouraging desirable behaviors among the users of the information to properly value, create, store, use, archive and delete information. The concept of information management governance is actually derived from the concept of information technology (IT) governance. IT governance is described as a set of processes which ensure effective utilization of IT to enable the organization of achieving its goals. The same concept applies to information governance minus the IT emphasis. Based on the given definitions and conceptualizations above, information governance highlights accountability of the users wherein the appropriate behaviors are encouraged. Accountability is almost always associated with challenges wherein the lack of such certainly leads to problems. What we didn’t realize is that information may eventually become futile or obsolete when its integrity is tarnished. The information will lose meaning and the business might no longer deem it necessary, relevant or important regardless of all the hard work and resources (time and money) involved in creating and storing that information. Perhaps, this is the reason why efficient management and governance is critical – so that information will not lose its integrity and will be useful for the organization for the longest time possible. Further, the users of the information are the people who knew how valuable the information is. Thus, their behaviors must be controlled, so that they will use the information diligently and generally, treat it as a valuable asset as it really is. So evidently, more than the information component of information governance, it is more lenient to the human component. After all, the people are the ones who created and using them.
#informationmanagement #datamanagement #governance #dataaudit #datacontrol #EIM #datasecurity #datagovernance #enterpriseinformationmanagement #EnterpriseDataManagement
0 Comments
A few years ago, I had given a presentation on how increasing use of computer systems in cars, makes us vulnerable to increased risk of malicious hacking into the computer system and taking up total control of the car, i.e. how the Car Computer System Hacking is becoming an increasing threat to individual and public safety. The hacker could then steer the car and even if you are right there inside the car, you would be unable to prevent safe and appropriate use of your own vehicle. I read this news article today on CBC, titled: Toyota, Lexus owners warned about thefts that use 'relay attacks', where they were saying how car thieves are using some kind of an amplifier equipment which allows them to boost the key fob radio signal (even if the actual fob is within the car owner’s home) of certain Toyota and Lexus cars, start the vehicle and also be able to drive off with it!! At the present time, hackers are using this to target and steal more expensive cars such as consumer-favorite Toyota models as well as high-end Lexus vehicles. But in today’s day and age where terrorists and other anti-social elements are increasingly using cars as a “weapon of destruction” by rampaging into crowds, car computer system hacking should be taken up very seriously by various government authorities, not just from a consumer-security perspective, but also from the public security and safety standpoint. It is high time that we have appropriate anti-hacking software and other device/application to monitor the safety of our car’s computer system. Once we start discussing ‘monitoring’, we inevitably have to discuss privacy implications. With the increasing use of computer security systems in our homes and offices, there needs to be proper governance regulations around how consumer privacy, safety and security is monitored and managed. Which further means that there needs to be a comprehensive Governance & Controls model to ensure fair-use management of innovative consumer technology systems. As of now, authorities ‘react’ after hacks and thefts have taken place. Which means, our rules and regulations play catch-up to such breaches and assaults, instead of proactively monitoring and curtailing such occurrences from happening in the first place. Given our increasing drive towards innovative information technology products, can we incorporate Audit, Governance & Controls as part of the design thinking lifecycle? How can innovators work with the various authorities (government, industry-specific and so on) to chalk out viable Rules of Engagement- where creativity is protected and fostered, but at the same time, innovators are given a Security-Governance framework which they can incorporate to proactively address potential privacy and security challenges. Some questions to think about as we strive ahead towards an increasingly connected and information governed society…
About the author:Sandhya Bhat MSc, CSSMBB, CSSE is the Knowledge Expert & Lead Editor for Macro2Micro Learning portal. You can read more about her work by visiting her website. You can engage with her via our contact form. #carcomputersystem #carcomputersafety #carsystemhacking #hacking #privacy #governance #itcontrols #securityaudit #privacyframework #securityframework #innovation #designthinking
Would you let a stranger, a courier person go inside your house in your absence? It seems Amazon is currently, testing out a new service which is designed to do just that! Amazon Key, this new service (currently being tested in 37 cities across the US), involves Cloud Cam imaging device and a compatible smart lock. If you are using this service, then once the courier person arrives at your doorstep, they will request entry. Using an encrypted process, Amazon will then verify that they are there at the designated time and then unlock the door. A camera then records the courier's activity while they are inside the house… Interesting, but who holds the liability? Will existing home insurance need modification to include special clauses? Uber, AirBnB and now Amazon. Technology is continuing to evolve at a rapid pace and it is changing the way we live. It seems like it is time we had an agile technology governance model that can keep pace with our continued fast changing and technology-dependent social evolution. #TechThursday #EmergingTechnology #SandhyaBhat
|
Categories
All
Business BooksInspiring ReadsHealthy Living |