360 likes | 669 Views
Secure and Sensitive Records: Technology and Information Management Considerations Cheryl McKinnon Product Manager, Government Solutions Hummingbird Cheryl.McKinnon@Hummingbird.com December 16, 2004 Agenda Technology and Information Management Challenges facing State Government
E N D
Secure and Sensitive Records:Technology and Information Management Considerations Cheryl McKinnon Product Manager, Government Solutions Hummingbird Cheryl.McKinnon@Hummingbird.com December 16, 2004
Agenda • Technology and Information Management Challenges facing State Government • Information Management Best Practices • Leveraging Technology to Overcome Challenges
Challenges Facing State Government • Public Sector Pressures • Government “On Line” / E-Gov Initiatives • Keep public sector on cutting edge of technologies to deliver services to constituents • Need to understand both limits and possibilities of new communication platforms • Internal paperwork reduction mandates
Challenges Facing State Government • Many Knowledge Workers Not Desk Bound • Professionals • Attorneys, Consultants, Executives, Political and Campaign Organizers • Law Enforcement • Field Officers, Supervisors, Inspectors, Detectives, Security Officials • Emergency Services • Disaster Relief, Project Officers, Military, Health Care Professionals • Inspection Agencies • Food System, Customs, Case Workers, Transportation, Labor or Health
Mobile, Distributed Knowledge Workers • Requirements: • Access to up-to-date policies and procedures, manuals, forms • Connectivity to corporate databases • Access to departmental intranets or portals • Ability to communicate and collaborate real-time • With Regional or Head Office • With contractors, clients or constituents • With other stakeholders • Stay informed while in field – act with current information
Challenges: Technology Rapidly Evolving • Slippery Slope of Instant Communication • Managers, Executives and Remote Workers become dependent on instant access to messaging capabilities • More data and information demanded • Access to documents and records • Be notified when certain events occur or information is completed • Ability to act on documents received • Know when colleagues are available
Challenges: Technology Rapidly Evolving • E-Mail • Many organizations still grappling with management of e-mail volume • Types of devices which can send and receive e-mail exploding • Broader use of Laptops and Wired Homes • Cell phones • Other PDAs: Blackberries, Palm Pilots • Structured Capture, Control and Management of E-mails • Still lagging compared to other electronic document forms • IT staff often still exerts lifecycle management authority • Often loss or inappropriate storage of e-mails which should be considered organizational records
Challenges: Technology Rapidly Evolving • E-Mail • Rate of adoption will continue to grow exponentially • IDC Survey, September 2002 • 16.2 billion messages per day worldwide, growth rate of 19% per year • Projecting 60 billion per day by 2006 • Continued proliferation of e-mail enabled-devices • Ubiquitous messaging, connectivity • Becoming dominant form of business communication
E-Mail Challenges • AIIM: 25% to 50% daily on e-mail tasks • Gartner: Over 75% of organizational know-how is buried in e-mail • 34% of business e-mail is unnecessary (occupational spam) • Survey by the AMA / U.S. News & World Report / ePolicy Institute finds: 50% of the largest U.S. companies have no e-mail retention and deletion policy in place
Challenges: Technology Rapidly Evolving • New Channels of Communication • Web Sites • On Line Collaboration • Text Messaging • Camera Phones • Instant Messaging • Wireless Networks
Challenges: Technology Rapidly Evolving • Next Wave of Information Explosion • Next generation of electronic records created through these new channels • How will organizations capture these records and ensure they are managed according to records principles? • Compliance Risks • Preservation Concerns • How do we apply same business rules and lifecycle requirements to this next generation of records? • What gap in the organizational or archival history will occur if we don’t plan now?
Challenges: Technology Rapidly Evolving • Organizations Driven by Productivity Gains from Mobility • Even most basic devices can immediately garner 10% efficiency gain for individual user (Gartner Research, March 2003) • Communication Platform does not release organization from meeting mandated industry regulations or corporate transparency legislation • Technologies that lend themselves to strong record keeping practices need to be evaluated
Challenges: Privacy Concerns • Information Practices Act • Individuals have a right of privacy in information pertaining to them. • The right to privacy is being threatened by the indiscriminate collection, maintenance, and dissemination of personal information and the lack of effective laws and legal remedies • The increasing use of computers and other sophisticated information technology has greatly magnified the potential risk to individual privacy that can occur from the maintenance of personal information. • In order to protect the privacy of individuals, it is necessary that the maintenance and dissemination of personal information be subject to strict limits.
Challenges: Privacy Concerns • Agencies required to • Protect personal information collected as part of government business • Limits on information use and disclosure • Must account for disclosures • Make collected information available to citizen upon request • Individual can lodge request to inspect files
Challenges: Freedom of Information • Public Records Act • Covers all state and local agencies • Includes records in all formats – including electronic • Onus on agency to justify non-disclosure of records • Defined categories of exempted information (partial list) • Personal, medical information • Attorney-client privileged information • Police data and arrest records • Financial data submitted for licenses, certificates, etc.
Challenges: Freedom of Information • Agency required to provide prompt access • Must provide assistance in identifying records • Access is free • Subject to photocopy or production cost recovery • Specific timelines to produce off site or large volumes of records
Agenda • Technology and Information Management Challenges facing State Government • Information Management Best Practices • Leveraging Technology to Overcome Challenges
Policy Considerations • Security • Risk assessment and needs analysis before implementing electronic records policy • Compliance • Monitor systems for security and network maintenance purposes • Appropriate Use • Guide end users, avoid exposing organization to risk
Policy Considerations • Confidentiality • Users to understand what information can be disclosed • Privacy • Understand legislation and level of privacy users should/should not expect when using agency email systems • Encryption • Identify under what circumstances email encryption is required • Policies around key protection important to avoid loss of records
E-mail Content Management • Content of e-mail to drive retention • Distinguish transitory, personal, spam e-mail from corporate content • Policy to address management of attachments, drafts, multiple copies or duplicates • Attachments: maintain links to messages, relationships • Drafts: can often be purged when final version approved • Copies/Duplicates: creator’s copy often viewed as original, forward considered owned by forwarder • Threads: final message should prompt filing • Limit or control locations to which messages can be saved • Appropriate content guidelines
E-mail Integrity • Authentic, trustworthy, and complete e-mail records • Must capture who, what, when, and where of original e-mail messages to have legal or business value as records – message metadata • Header information • Body Content • Attachments • Signatures • “An e-mail printed to paper without its routing information and metadata is simply a piece of paper with words on it.” (Randolph Kahn)
Retention & Disposition Considerations • Appraisal and Classification • Specify how email is designated a record • Procedures give users guidance • Preservation • Ensure structure, content, attachments, metadata, links, distribution lists, etc are protected and preserved • Storage medium and format must protect above aspects • Ensure authenticity, reliability and integrity maintained
Retention & Disposition Considerations • User Training • Ongoing • Ensure intent of records program is communicated • Disaster Recovery • Backup programs • Identification of vital records • Business Continuity programs in place
Other Standards • Other standards to consider • DoD 5015.2 – Functional Requirements for ERM software • ISO 15489 – Best Practices Standard • “Performance Guidelines for the Legal Acceptance of Records Produced by Information Technology Systems” (ANSI/AIIM TR31-2003 • “Vital Records Programs: Identifying, Managing and Recovering Business-Critical Records” (ANSI/ARMA 5-2003)
Develop Strategy for Electronic Records Management • IT Concerns: • Must work within existing IT environment • Retention & Disposition of electronic records, including email based on records retention schedule • Outline appropriate use policies • Manage security policies • Manage hardware and network infrastructure • Ensure confidentiality of personal or sensitive data, identify and preserve vital records • Disaster recovery programs • Capture metadata and audit trails
Develop Strategy for Electronic Records Management • Records Managers • Acknowledge e-mail systems and office authoring tools as sources of records • Treat email as any other recorded information • Not separate category of retention/disposition • Look at content and context of message • Assist in retention schedules for e-mail and other electronic records • Work with Legal Counsel to be aware of new legislation and discovery requirements
Develop Strategy for Electronic Records Management • Archives • Mandate is to preserve historically significant records of the state government • Focus on preservation issues • Maintain relationships between records and context of creation
Agenda • Technology and Information Management Challenges facing State Government • Information Management Best Practices • Leveraging Technology to Overcome Challenges
Leveraging Technology • Access Controls • Enterprise Content Management Systems • Ability to secure individual documents/records by groups or users • Who can edit, view, copy, change metadata? • Restrict information returned as part of search result • Ability to default background access controls to ensure compliance • Functional Security Controls • Configure who has access to particular user functions • Declare Records, Set Retention/Disposition Lifecycle, Deletion, Publish
Leveraging Technology • Metadata • Agency can collect specific metadata attributes in order to categorize, sort, search and report on electronic and physical records • Use metadata elements to restrict access to sensitive records • Caveats, codewords, roles, markings • Records exempted from FOI or containing personal data can be marked • Accessible only by authorized users/groups within the agency • Manage records with according to security clearance levels • Secret, Confidential • Restrict access even for IT or LAN administration
Leveraging Technology • Secure Communication Platforms • Work in Progress documents often need collaborative input from internal AND external parties • Other levels of government, other agencies, external counsel or contractors • Protect integrity of internal repositories from external access • Collaboration Sites / Extranets • Push selected documents into secure collaborative site with full encryption • Mirror revisions back into corporate systems
Leveraging Technology • Secure Communication Platforms • Instant Messaging • Rate of adoption slower in government than in private sector • Typically more “locked down” desktop environment • Concerns that “freeware” IM products are not secure, no method by which to capture business related discussions as records • Emergence of Corporate Instant Messaging Platforms • Encrypted communication • Ability to capture chats and discussions as electronic records • Controlled user/group lists • “Presence” notification across desktop tools
Leveraging Technology • Electronic Capture • E-Mail Management • Automated capture of incoming/outgoing e-mail • Client side or server side rules • Capture e-mail specific metadata • Set retention and disposition lifecycle based on content and metadata • Integration with mainstream authoring tools • Capture wordprocessing, spreadsheet, graphic, image, CAD formats • Apply agency metadata, access controls and retention lifecycle
Leveraging Technology • Digital Signatures • Increasing acceptance of electronic and digital signature as part of E-Gov initiatives and other commercial transactions • Non repudiation • Verify integrity of electronic document
Questions? Thank You Please see us at Booth 8 in the Vendor Showcase Cheryl McKinnon Cheryl.McKinnon@Hummingbird.com