Successful information governance program

Assignment Help Basic Computer Science
Reference no: EM132367567

Discussion-1 (90 words) - Comments with a reference

The main benefit of Information governance is to maintain quality data to access safe and securely. Following are some of the important principles that needs to be address for the implementation of successful Information Governance.

• Consultation of Business End Users: It is important to consider the requirements of the end users or stakeholders to identify the policies for the Information Technology team before finalizing by the Information Governance team. It is also important to consider the legal rules and regulations before finalizing the IT Governance rules (Robert,2015).

• Information policy development and communication: Standard policies and protocols are required to access the data and folders containing the customers sensitive information and organizational classified information. Folder level access or designate level access control procedures should be defined in the organization protocols. For example, a receptionist does not require physical access to physical data centers. Also, management clearly explains these protocols and consequences of violation of these rules to all employees (Robert,2015).

Following are some of the benefits if the organization can maintain the proper IT Governance procedures in the company.

• Reduce risk of data exposure: If the Information Governance is maintaining successfully in the company then it will reduce the risk of exposing sensitive information to outside intruders.

• Accountability: It is important for maintaining the separate team for auditing the access of the data based on designation and provide the feedback to the higher management can increase the accountability among the employee who are handling the sensitive information and management. So that communication will be simple during the data outage situations (Jason,2018).

In my current organization we do have proper rules while accessing the production data. Only certain level of people has the write access to the databases. Most of the junior and mid-level developers had restricted read access to the production database. Any changes to production environment should go through the separate approval board before making changes.

Discussion-2 (90 words)-Comments with a reference

Successful Information Governance Program

Successful implementation of Information governance requires the team tasked for its application to understand what it takes to design and implement such a function in an organization. The first things such a group must first understand are the principles that drive the implementation of the IG in an organization. The ten principles of successful IG program can be categorized into three main sections with various characteristics essential for the implementation of this program regardless of the size of the institution.

The first three principles rotate concerned about the involvement of the people. Executive sponsorship, stakeholder's involvement, and Information policy development and communication principles are characterized by people being aware of what the security programs entail and what is needed from them for the success of such a program (Smallwood, 2014). Effective communication and involvement of the key individuals is essential for the success of such a sensitive program that is likely to meet resistance in an organization.

The principle of Information organization and classification, Information security and privacy, Information accessibility and that of the information integrity are concerned with the characteristics of the program and security measures that are making the program beneficial without limiting the users significantly (Amoroso, 2012). A successful IG program should not be a limiting factor for the maximum use of institution resources but rather foster the use while ensuring maximum protection of such resources.

Lastly, the principle of Information control, Information governance monitoring and auditing and that of continuous improvement require implementers not to assume the program and its success but work closely identifying the weaknesses and suggesting the remedy. In every organization, this principle makes all other people aware of the need to remain focused (Firch, 2019). For instance, continuers monitoring ensure that people are on track towards achieving the desired requirements. In every organization, these principles will be applied as a measure of ensuring smooth implementation of the IG program.

Reference no: EM132367567

Questions Cloud

Course conclusion : Course Conclusion. Explain what order you would place the modules in, and why
Policy-making and its subsequent implementation : "Policy-making and its subsequent implementation is necessary to deal with societal problems."
Compare between different formal cloud definition : Compare between different formal Cloud definition? Based on stale and standards? What are the Key Security and Privacy Issues?
Define what is meant by outsourcing : BBA 3551- Define what is meant by outsourcing. Summarize the management advantages, cost reduction, and risk reduction of outsourcing.
Successful information governance program : Successful implementation of Information governance requires team tasked for its application to understand what it takes to design and implement such function
Definition of privacy and privacy issues : Definition of Privacy. Difference between Privacy and InfoSec. Threats to Privacy. Privacy Issues
What is normalization and de-normalisation : What is normalization and de-normalisation? What is a functional dependency in relation to normalisation process? What are advantages of de-normalisation?
Analysis of traditional policy-developments in policy-making : Write a short analysis of traditional policy-making vs. new developments in policy-making. iscuss three competencies required by a policy informatics analyst.
Information governance semester project : INFORMATION GOVERNANCE SEMESTER PROJECT -ecurity Transport Professionals Incorporated (STP), has its home office located in Lexington,

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd