1 1 Building RIM Programs Chattanooga Chapter of ARMA International by Helen Streck President and CEO Kaizen InfoSource LLC.

Slides:



Advertisements
Similar presentations
Museum Presentation Intermuseum Conservation Association.
Advertisements

Identification and Disposition of Official University Records University of Texas at Arlington Records Management.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Review Questions Business 205
Clean-up Days!.
Project Planning and Management in E-Discovery DAVID A. ELLIS – MAYER BROWN BROWNING E. MAREAN – DLA PIPER.
Auditor General’s Office One key audit focus area – Compliance with Laws and Regulations.
1 Introduction to Workforce Planning and Development in State of Alaska Executive Branch Departments.
Workforce Planning Training for Supervisors Presentation Subtitle/Description Presenter’s Name Date.
EDiscovery and Records Management. Records Management- Historical Perspective- Paper Historically- Paper was the “Corporate Memory” – a physical entity.
Security Controls – What Works
Developing a Records & Information Retention & Disposition Program:
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
SAFA- IFAC Regional SMP Forum
project management office(PMO)
RECORDS MANAGEMENT City of Oregon City “ That was then… this is now!”
Building a Compliance Risk Monitoring Program HCCA Compliance Institute New OrleansApril 19, 2005 Lois Dehls Cornell, Esq. Assistant Vice President, Deputy.
1 Business Continuity and Compliance Working Together Kristy Justice, AVP WaMu Card Services 08/19/2008.
Implementing Disaster Recovery Plans
Electronic Discovery (eDiscovery) Chad Meyer & John Vyhlidal ConAgra Foods.
Internal Auditing and Outsourcing
Why Information Governance….instead of Records & Information Management? Angela Fares, RHIA, CRM, CISA, CGEIT, CRISC, CISM or
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Continuity of Operations Planning COOP Overview for Leadership (Date)
Challenges Faced in Developing Audit Plans and Programs 21 st March, 2013.
By Helen Streck President/CEO Kaizen InfoSource LLC Litigation Readiness: Information Manager’s Role.
Staff Structure Support HCCA Special Interest Group New Regulations: A Strategy for Implementation Sharon Schmid Vice President, Compliance and.
Electronic Records Management: What Management Needs to Know May 2009.
1 Comp7780 Update  Why?  What?  How? What have you learnt? Comp
Developing an IS/IT Strategy
Slide 1 D2.TCS.CL5.04. Subject Elements This unit comprises five Elements: 1.Define the need for tourism product research 2.Develop the research to be.
IAEA International Atomic Energy Agency Reviewing Management System and the Interface with Nuclear Security (IRRS Modules 4 and 12) BASIC IRRS TRAINING.
Simplified Strategic Planning Taking Control, Involving Employees & Linking Systems Joseph Raible Senior Consultant 1The Millennium Group International,
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
CERTIFICATION In the Electronics Recycling Industry © 2007 IAER Web Site - -
Records & Information Management (RIM) Risk: Is Your Company Exposed? March 19, 2013.
Using the Intranet for Knowledge Management ISM 6021 By: Diana DeFazio - Carro.
Privacy Project Framework & Structure HIPAA Summit Brent Saunders
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
1.Summary of Needs Analysis 2.Summary of Action Plan 3.Systems Analysis between Microsoft SharePoint® and OpenText Content Server 4.System Recommendation.
September 12, 2004 Simplifying the Administration of HIPAA Security Angel Hoffman, RN, MSN Director, Corporate Compliance University of Pittsburgh Medical.
Systems Analysis and Design 8 th Edition Chapter 2 Analyzing the Business Case.
CRM Prep Workshop Part 4 Records Appraisal, Retention, Protection and Disposition.
Electronic Records Management: A New Understanding of Policy, Compliance, and Discovery Robert J. Sobie, Ph.D. Director Information Systems Department.
Our Professional staff with years of expert knowledge in management & operations of Federal records & experience in Indian program records (P.L )
CORPORATE RECORDS RETENTION POLICY TRAINING By: Diana C. Toman, Corporate Counsel & Assistant Secretary.
INSTRUCTOR'S MANUAL Chapter 3 ESTABLISHING A BUSINESS.
Welcome Georgia Infrastructure Transformation 2010 Kick-off Meeting January 30, 2008.
Unit 3: Identifying and Safeguarding Vital Records Unit Introduction and Overview Unit objective:  Describe the elements of an effective vital records.
1 Records Management Organization The Committee provides guidance on operating the company’s records management program.
All Employee Basic Records Management Training. Training Overview 1.Training Objectives 2.Clark County RIM Program 3.Key Concepts 4.Employee Responsibilities.
Confidential 1 HIPAA Compliance at Blue Cross Blue Shield of Minnesota: A Case Study Tim Wittenburg Director of Corporate Architecture & Data Management.
Legal Holds Department of State Division of Records Management Kevin Callaghan, Director.
03/08/1999UT Austin: GSLIS LIS Information Management LIS /8/99 Martha Richardson.
Continual Service Improvement Methods & Techniques.
The Marketing Plan Chapter 2. Section 2.1: Marketing Planning  Good marketing requires good planning Research your company Study your business environment.
Current risk and compliance priorities for law firms PETER SCOTT CONSULTING.
Leadership Guide for Strategic Information Management Leadership Guide for Strategic Information Management for State DOTs NCHRP Project Information.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Safety Management Systems Session Four Safety Promotion APTA Webinar June 9, 2016.
Records Coordinator Roles and Records Skills Kathryn Dan.
Data Minimization Framework
Electronic Records Management Program
Privacy Project Framework & Structure
RECORDS AND INFORMATION
Information Governance
Continuity of Operations Planning
Internal Audit Who? What? When? How? Why? In brief . . .
IUC Records Retention Tool: Zasio’s Versatile Retention
Introduction to the PACS Security
Presentation transcript:

1 1 Building RIM Programs Chattanooga Chapter of ARMA International by Helen Streck President and CEO Kaizen InfoSource LLC

2 2 Answering the Proverbial WHY? Why spend money on an RIM Program: – Lowest productivity of employees in U.S. ever – Different departments trying to solve their part of the puzzle alone Least effective team work in solving an enterprise issue Ever evolving technology and company demands Duplicate work by employees – Cost of chaos – hard numbers and total lost value – Information the new currency – Inoperability between systems – no info connection – Bad press – is it worth the risk? – Is compliance a real “Why?” 2

3 3 What is a Program? 3 Programs do not have start and end dates Have governance or rules Have a budget allotted Have staffing Have a mission, strategy, and ongoing initiatives and activities

4 4 What a Program is NOT? 4 Programs are NOT projects Retention Schedules and Policy(s) are not Programs Assigning RIM oversight to non-RIM professionals Hoping file shares will clean themselves up Rules without training and education

5 5 Benefits of RIM Documents compliance with laws and regulations Increases employee productivity Reduces expenses (e.g. servers and offsite) Reduces risk exposure Reduces eDiscovery costs 5

6 6 Area of ROI with a RIM Program eDiscovery savings Storage costs Improved ability to search and find Improved ability to mine data Increased employee productivity 6

7 7 Where to Start? 7 1.Know where your organization is today 2.Identify pain points 3.Determine the mission of the RIM Program 4.Identify initiatives and resource requirements 5.Define the rules 6.Build the governance 7.Apply Change Management

8 8 Start with an SWOT Start with a SWOT – Assessment of Strengths, Weaknesses, Opportunities and Threats – Describes your current electronic information state – Identifies gaps between current state and best practices Then recommend next steps based on risks, priorities, and resources 8

9 9 9

10 StrengthsOpportunities  Executive/Corporate Secretary Support  RMP staff commitment  Improved collaboration with IT  Good vendor services for hard copy storage  Commitment of Records Manager  Existence of RMP policy and procedures  Expand scope of RIMP to include all information types  Revise rules, controls and processes and to be comprehensive in the appropriate documentation  Defining and building formal partnerships both internal and external  Creating educational courses to increase understanding and knowledge  Updating RIMP strategy, mission and scope in line with industry best practices WeaknessesThreats  Lack of RIM professional staff on RIMP team  Formal partnerships with other departments  Outdated policy, records retention schedule and procedures  Lack of adequate procedures  RIMP scope does not include all information  Increased volume of information in multiple formats  Increased litigation and demands for more information access and preservation  Increased risk of data loss or exposure of private information due to uninformed employees  Loss of vital or critical data for Company operations  Increase demand on corporate resources to store, find and access information because of lack of classification

11 Benefits of a SWOT Objective view of the state Tool to obtain consensus and buy in Suggests RIM is an ongoing effort and identifies areas of risk Serves as an internal marketing tool to raise awareness and senior-level support A place to work from to build the strategy and initiatives 11

12

13 Elements of a RIM Program 13 Mission/Vision Governance – Policy, Retention Schedule, Standards Training and Education Process(es) – Procedures Automation Accountability

14 Conflict of Ownership and Accountability Departments own the work process and product deliverables Organization “owns” the data Documentation and the need for standardization Understanding the risk of poor documentation Productivity vs. Compliance (us vs them) 14

15 Retention “An organization shall maintain its information for an appropriate time, taking into account legal, regulatory, fiscal, operational, and historical requirements.” 15

16 Using the Retention Schedule List of records series Primary level of classification Primary level of classification Associated documents Defining metadata at the primary level Length to maintain each series Risk of “over-keeping” data 16

17 Importance of Classification RIM provides good classification – Document/Data categories – Identification of records vs. non-records – Legal identification of retention requirements – Workflows across departments – Classification/Index/Taxonomies – Multiple views – people and computers 17

18 What Protection and Security? Protection and security – Private information – knowing if entire category is confidential and/or private – Security classes of information – Rights and access to the various classes – Protection of restricted/classified information – HIPAA and other laws and regulations – Procedures and standards 18

19 Vital and Important Information The loss of important information may disrupt business but not jeopardize the mission. Important records may be cost prohibitive to replace. Important records are not required to have special protection, but often they do. 19

20 What is the Vital Records Component of RIM? It’s the systematic, comprehensive, and economical control associated with vital information It prepares an organization for nearly any threatening situation. It has evaluated the risks and determined the necessary level of protection. 20

21 Keys of Managing Vital Information Identifies information that MUST be available during or after a disaster to resume business Identifies potential and existing exposures to risk for a class of documents Establishes ways to measure and evaluate such risks Determines actions to remove or reduce risks Implements Change Management for improved behaviors Provides ongoing scrutiny against future risks 21

22 Conundrums of RIM 22 Starting after years of amassing data Takes time to build Needs resources for a time before ROI Getting Management’s attention to the need Building in “doable” steps Defining who is in charge of the team – accountability Applying change management so employees are enabled to make change

23 BUILDING AN RIM PROGRAM 23

24 Steps and Elements of RIM Program 1.Conduct a SWOT 2.Assign accountability and responsibility for the Program 3.Identify the internal and external partners 4.Define the strategy and approach 5.Develop the right level of Governance 6.Develop an implementation plan and training 7.Train employees and implement procedures 8.Develop and implement Change Management and Communication 24

25 Develop Governance Policies – Records and Information Management Policy Retention Schedule - Primary level classification Standards and Procedures – Multiple procedures for active, inactive, legal hold, etc. 25

26 Legal Holds Component Legal holds can suspend disposition while actual or pending litigation is in process. Need documented procedures Coordination between Legal and RIM Be sure employees know 26

27 Session Summary What is a RIM Program Where to Start RIM Team Building the Framework Special Considerations – DRBC – Privacy – Security 27

28 Closing Notes The scope of RIM for information is broader than just storing the records. There are many factors that affect good recordkeeping—standards, litigation, disasters, privacy. They all must be addressed in an RIM program. Start with know what you have Develop a strong team 28

29 THANK YOU! Helen Streck President and CEO Kaizen InfoSource LLC 29