Information Governance Tips with the Business User in Mind

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7
Next Next

User Behavior

Request input on users' workflow.

Get a better understanding of why and how business users create, file, delete/not delete data. Examine the pros and cons of potential processes, and create an environment where supporting IG is part of the corporate DNA.

Data is expanding at a rate that outpaces the speed at which IT practitioners are becoming compliance experts, and information governance (IG) practices that create specific rules regarding the management of data are still largely undefined and difficult to enforce. Perhaps the most perplexing and pressing challenge related to IG is governing unstructured data, which is not found within an organized database.

Unstructured data typically includes Word documents, PowerPoint presentations, PDFs, media text files, emails, audio files and images. According to reports from IDG and Gartner, unstructured data is growing at a rate of 62 percent per year, and by 2022, 93 percent of digital data will be unstructured. Further complicating the issue is that this data is often created and saved over a multitude of repositories like ECM systems, shared drives, desktops, cloud environments, etc.

According to Rob Hamilton, vice president and digital market leader, Recall, corralling unstructured data is possible, but it cannot occur if IG decision-makers create policies that drastically impact business user workflow. If policies make their job significantly more difficult, they'll find workarounds for managing data that may put the organization at risk. The following suggestions can shrink the amount of unstructured data, help maintain compliance and gain buy-in from those most impacted by IG policies.

 

Related Topics : A Big Market for Big Data Jobs, Midmarket CIO, IT Management Automation, SharePoint, Technology Markets

 
More Slideshows

infra97-290x195 7 Tips to Improve Data Backup and Ensure Business Continuity

With today's modern solutions, enterprises should be able to transform backup and recovery from a low-level legacy IT function to a modern function delivering continuity and value to the entire business. ...  More >>

NETSCOUTShadowIT0x 6 Tips for Combating Shadow IT Once and for All

To mitigate the risks of shadow IT, organizations must demonstrate the necessary agility and high quality of complex service assurance that users are looking for. ...  More >>

IT_Man85-290x195 Business in the Front, Balance All Around: Working with Gen Z

In order to attract Gen Z talent, employers will need to take into account that this group of the workforce may expect a different set of benefits. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.