Gimmal Blog

Read the latest thought leadership and industry news from the experts at Gimmal!

All Posts

Information Governance Ensures Long-Term Information Security

External protection from threats is obviously critical when it comes to cybersecurity. However, as these threats are constantly evolving, ensuring your information governance is effective is another approach to safeguard your data.

Data is hacked and stolen every day, causing a compliance risk nightmare. The Ponomen Institute estimates that data breaches cost companies an average of $174 per record. On top of the initial financial impact, organizations are often held liable and subject to legal and regulatory penalties.

As more information moves to the cloud, companies must be increasingly vigilant as their data isn't always under their control. As data storage has become more affordable, many businesses have kept redundant, obsolete and trivial (ROT) data "just in case". Unfortunately, there is significant inherent compliance risk in this strategy, as illustrated in the chart below.


As you can see, the longer the ROT data is held onto, the more the compliance risk of managing it increases. Despite advancements in security and new processes, hackers create new and sophisticated ways to breach company data. By implementing a solid information governance plan, an organization can prevent compliance risk in the case of a hack or accidental data leak.

Now let's tackle the key components of an information governance program to help mitigate the damage of a potential data breach.

1. Clearly establish ownership of compliance and data privacy


2. Assess the process for any information shared outside the organization


3. Identify any Personally Identifiable Information (PII) and create appropriate business processes that include IT, legal and the records management team


4. Ensure policies are in place to meet federal, state, local and industry regulations


5. PII must be limited not only by user but by location


6. Clean up ROT data based on an approved retention schedule


7. Use encryption techniques whenever possible


8. The ability to have audit trails, logging and monitoring is essential to defensible disposition


Posted by Andrew Borgschulte

Related Posts

Why Should Records Management be Important to You

Why should an organization care about records management? When users throughout all departments are creating new records without a thought to how they are cataloged or tagged, the sprawl of records can become a real threat. Unstructured data can lead to compliance issues for highly regulated industries. When proper records management isn’t a top priority, content that should have been disposed of for security purposes is left vulnerable for anyone to find and distribute.  

Creating Compliance in Chaos: A Consultant's Story

Records and Information Management (RIM) is constantly changing and evolving as record managers begin to realize the benefits of automation in their daily operations. In my 6 years of consulting, I have seen everything from heavily manual business processes to automated document management solutions.  Even as time goes by, information professionals continue to face the long-standing hardship of trying to get end users to comply with either internal or external regulations when it comes to records management.  Lately, there has been an apparent shift from ridged business centric solutions to end user centric solutions. 

Gimmal at ARMA International InfoCon 2019

Once a year, members in the records management community come together for ARMA’s annual conference to discuss the latest advancements and best practices for modern information managers.  ARMA, the global authority of information management and governance, hosted this year’s conference, ARMA InfoCon, in Nashville, TN. While attendees were not in the typical “record” industry that Nashville is known for, the location called for a great mix of music and information management knowledge.