information governance

 
Chapter 10: From this chapter, in addition, the previous ones, we continue to enhance our knowledge and understanding about IG best business practices, and how good data governance can ensure that downstream negative effects of poor data can be avoided and subsequent reports, analyses, and conclusions based on reliable, and trusted data could be achieved.  From the risk management perspective, data governance is a critical activity that supports decision-makers and can mean the difference between retaining a customer and losing one.  On the same token, protecting your business data is protecting the lifeblood of your business, and improving the quality of the data will improve decision making, foster compliance efforts, and yield competitive advantages; thence business profits would be earned.  To provide meaningful support to business owners, the Data Governance Institute has created a data governance framework, a visual model to help guide planning efforts and a logical structure for classifying, organizing, and communicating complex activities involved in making decisions about and taking action on enterprise data. 
Q1: With this framework in mind that allows for a conceptual look at data governance processes, rules, and people requirements identify and briefly explain the 10 levels of the DGI Data Governance framework from the Data Governance Institute? Conduct library research and identify two organizations that apply some of this framework and explain by giving examples.
Chapter 11 – According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business.  As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered a huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations. 

Q2: From this research revelation in chapter 11, briefly explain and name the countries and organizations identified as the targeted victims? Conduct library research and identify about three recent security breaches from 2017 to date and explain the implications and recommendations.

Chapter 12 – From the chapter reading, we learned that e-mail is a major area of focus for information governance (IG) efforts, and has become the most common business software application and the backbone of business communications today.  In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective.  The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact. 
Q3: With this detail in mind, briefly explain why the e-Mail has become a critical component for IG implementation? Also, explain the effective ways to manage e-Mail in organizations, it impacts, and challenges.
Discussion Expectations:
Be substantive and clear and use examples to reinforce your ideas. Grammar, spelling, punctuation, and format should be correct and professional.
  1. Question Attachments

    1 attachments —

Answer Detail

Get This Answer

Invite Tutor