SlideShare uma empresa Scribd logo
1 de 17
Adhering to appropriate Information
Management governance structures

      RMAA Industry showcase
          October 2008
Why are governance structures important?


• You can add new text slides by clicking
  on the „new slide‟ icon at top or by
  clicking Insert then New slide
• You can use the multiple slide view at
  the bottom to copy and paste slides.
Information management governance
What am l covering today?


“governance is a multi-faceted discipline that not only includes
the formulation and implementation of strategy, but the
establishment of systems and processes that enable effective
risk management as well as legal and regulatory compliance.”

                      ASX Corporate Governance Council (2003)




“information governance is emerging as a critical competency”

                                                    Gartner (2007)
The governance framework of Information
                Management……
“the audit identified that there is an increasing
   range of legislation, standards, policies and
   guidance that is issued by a number of
   Australian Government entities that has
   recordkeeping implications. The status of this
   material ranged from mandatory legislative
   requirements to better practice advice and
   guidance, the majority of which is issued by
   Archives. The ANAO found there was differing
   levels of awareness of this material in the entities
   audited.”

              Australian National Audit Office (2006)
Information Management standards
•ISO 15489 Records management by IT/21 (Standards Australia)
•ISO9000 Quality certification compliance
•ISO 2788:1986 Guidelines for the establishment and development of
 monolingual thesauri
•ISO TC 46 SC11 Archives/Records Management
•ISO/TC171/SC2N450 - ISO/DTR 22957 Document management -
 Analysis, selection, and implementation of Electronic Document
 Management Systems (EDMS)
•ISO/TC171/SC2N451 - ISO/CD 12029 Electronic imaging – Forms
 design optimization for electronic image management
•W3C Web content accessibility & Mobile Web Best Practices a
 Candidate Recommendation
•AS 5037-2005 Knowledge management
•AS17799 s. 9 – Information Technology Code of Practice for Information
 Security Management - design and use of access controls & digital
 signatures
•AS17799 - section 8.7.4 security risks and guidelines for items to be
 included in an email management policy
•Australian Government Locator Service/Dublin core metadata
•Anglo American Cataloguing rules
Information Management regulation

• Disposal schedules
• National Archives Australia (2006). Functional requirements for
  Electronic Records Management Software
• International Model requirements for the management of electronic
  records (MorEq)
• Policy and procedures identified by Archives as delegated by the
  relevant Act
• Designing and Implementing Recordkeeping Systems (DIRKS)
• Codes of ethics – NSW Professional Conduct regulation
• VERS toolkit
• Private sector Privacy Codes
• Litigation plan
• US Department of Defense (DOD) Directive 5015.2
Information Management legislation case law
  Common law
  • Evidence Act 2004 (NT)
  • Commonwealth Evidence Act 1995
  • Archives Act 1983
  • Legal Deposit
  • Sarbanes Oxley 2002
  • Tax Ruling TR 2004/D23
  • Electronic Transactions Act 1999 (Commonwealth)
  • Corporations Act
  • Income Tax Assessment Act 1936
  • Crimes (Document Destruction) Act 2006
  • Information Act
  • Freedom of Information
  • Copyright
  • Privacy Act 1988 (Cth)


  Case law
  • Consistency of behaviour – policy and procedures
Cost of non compliance – Valuing information models



   “the wealth of an organisation is based on its
      accumulation of useful knowledge - its
      knowledge capital. The value added to an
      organisation by information, discussed ..... under
      `information productivity' can be regarded as an
      annual return on its accumulated knowledge
      capital.“

                                      Strassman (1996)
Information valuation models
  Focus on human, customer                   Focus on market
    and structural capital                capitalization, return on
                                        assets, and other monetary
                                                valuations.
•Intangible asset monitor (Sveiby,    •Tobin's Q, economic value added
1997);                                (EVA), Market-to-Book Value,
•Balanced scorecard (Kaplan and       Intellectual Asset Valuation, Total
Norton, 1992; 1996;75 2000);          Value Creation, Total Value
•Skandia value scheme (Edvinsson      •Creation, Knowledge Capital
and Malone, 1997).                    Earnings, citation weighted patents,
•IC-Index Model and HVA Model (Roos   etc. (see for instance: Stewart (1997);
and colleagues 1997)                  Bontis (2001); Bontis et al. (1999); Lev
                                      (1999); Sullivan (2000))
•Technology Broker Model (Brooking
(1996, pp. 13-14)                     •Value Chain Scoreboard Lev (2002)
                                      •Net Present Value (NPV)
Cost of non compliance
•   Tax compliance
•   Knowledge recreated/lost
•   Damages awarded
•   Loss of business critical records
•   Loss of reputation
•   Fines/e-discovery time
•   Job loss
•   Lost productivity
Case study – Government Owned Corporation
NT Power Generation Pty Ltd v Power and Water Authority [2004]
"There is no other procedure established under the PAWA Act by which the minister could control
    the operations of PAWA. As a matter of practice, as the communications between PAWA and
    the minister demonstrate, the procedure of a minute from the chief executive officer and his
    response by endorsement on that minute was the normal means by which the minister
    (where he considered it appropriate) gave directions under s 16 of the PAWA Act. There is
    no evidence to indicate any other means by which directions under s 16 were given."

S. 132
PAWA has not demonstrated error in the reasoning of Finkelstein J. PAWA took this Court to
     some oral evidence of Mr Gardner in an endeavour to counter Finkelstein J's conclusion that
     the Minister's desire to have PAWA act as he wished was not always conveyed by direction.
     That oral evidence was vague, was undermined by other evidence, and, in any event, did not
     falsify Finkelstein J's conclusion. The PAWA Act does not stipulate that s 16 "directions" are
     to take any particular form, and the Court was not taken to any other legislation which did.
     Even if Mr Gardner's evidence establishes that he thought he had received a s 16 direction in
     August 1998, that does not prove that he did. Everything depends on the terms of the briefing
     note: no other possible "direction" was relied on. But it is not possible to infer from the
     briefing note that any direction was given. The acceptance of the recommendation in the
     briefing note was too vague to amount to a s 16 direction. It did not refer to s 16, yet citation
     of the source of power could be a crucial matter in the event of later political or forensic
     controversy about whether any directions had been given or obeyed - for Mr Gardner had a
     duty to obey them. It did not speak in the language of command or mandate or instruction - it
     did not direct.
Case study – Private Sector – British American
                   Tobacco
  • McCabe v British American Tobacco Services
     Limited (BAT)

   • Review was completed by Professor Peter A
     Sallmann in May 2004 for the Victorian
     Attorney-General on Document Destruction
     and Civil Litigation in Victoria

   • Resulted in the Document Destruction Act
     2006

   • Fines of $314,430 for companies and $62,886
     or 5 years imprisonment for individuals
Case study – Health provider
H v Health Service Provider [2007] PrivCmrA 10

• Inappropriate disclosure of information

• National Privacy Principles 2 and 4 in Schedule 3
  of the Privacy Act 1988 (Cth) breached

• Extensive Privacy Commissioner audit of
  processes and policy

• Medical centre offered complainant compensation
  without admitting liability
Case study – Law firm
KATRINA NUGENT 9.39am: Yesterday I put my lunch in the fridge on Level 19 which included a
packet of ham, some cheese slices and two slices of bread which was going to be for my lunch
today. Over night it has gone missing and as I have no spare money to buy another lunch today, I
would appreciate being reimbursed for it.
MELINDA BIRD 9.55: Katrina, There are items fitting your exact description in the level 20 fridge.
Are you sure you didn't place your lunch in the wrong fridge yesterday?
KATRINA NUGENT 10.06: Melinda, probably best you don't reply to all next time, would be
annoyed to the lawyers. The kitchen was not doing dinner last night, so obviously someone has
helped themselves to my lunch. Really sweet of you to investigate for me!
MELINDA BIRD 10.14: Katrina, since I used to be a float and am still on the level 19 email list I
couldn't help but receive your ridiculous email - lucky me! You use our kitchen all the time for some
unknown reason and I saw the items you mentioned in the fridge so naturally thought you may
have placed them in the wrong fridge. Thanks I know I'm sweet and I only had your best interests
at heart. Now as you would say, "BYE"!
KATRINA NUGENT 10.15: I'm not blonde!!
!MELINDA BIRD 10.16: Being a brunette doesn't mean you're smart though!
KATRINA NUGENT 10.17: I definitely wouldn't trade places with you for "the world"!
MELINDA BIRD 10.19: I wouldn't trade places with you for the world... I don't want your figure!
KATRINA NUGENT 10.21: Let's not get person (sic) "Miss Can't Keep A Boyfriend". I am in a
happy relationship, have a beautiful apartment, brand new car, high pay job...say no more!!
MELINDA BIRD 10.23: Oh my God I'm laughing! happy relationship (you have been with so many
guys), beautiful apartment (so what), brand new car (me too), high pay job (I earn more)....say
plenty more... I have 5 guys at the moment! haha.
Achieving, auditing and maintaining compliance -
              Whitehorse services

    •   Information technology governance
    •   Information technology and telecommunications strategy, planning, and acquisition
    •   Systems Integration and Facilities Management services
    •   Information, records, library, and knowledge management labour hire, archiving, disposal
        schedules, cataloguing, advise, strategic planning
    •   Risk evaluation and planning
    •   IT outsourcing management
    •   Scanning solutions through our business partner INFORG Information Solutions
    •   Electronic Commerce, including business analysis and process design
    •   HP Tower and Outback Imaging (Ezescan) accredited business partners
    •   Laptop training network and Training facilities in Darwin and Melbourne
    •   Sharepoint & TRIM installations, upgrades, integration, reviews and tailored add ons
    •   Regional telecommunication and other infrastructure planning and implementation
    •   Negotiation and funding access
    •   Federal and State Government liaison
    •   Policy evaluation, advice, business planning
    •   ICT resource and industry research analysis publications
    •   Project management
    •   TRIM/Sharepoint training
    •   Certified staff
References
http://www.anao.gov.au/uploads/documents/2006-
   07_Audit_Report_61.pdf
Chua and Van Toorn (2005). Documents, risk and the fate
  of your organisation:Document management in the age
  of corporate accountability
Priest, M. (2006). Document destruction could be costly.
   Australian Financial Review, 8/9/2006, p. 58

Moneycontrol.com (2007). Blogging will be the future
  management tool: Accenture

Standards Australia

www.austlii.edu.au

Mais conteúdo relacionado

Destaque

Data quality presentation oct 2006 23092006
Data quality presentation oct 2006 23092006Data quality presentation oct 2006 23092006
Data quality presentation oct 2006 23092006Anastasia Govan Kuusk
 
10 Tools: A starter kit of web interactives
10 Tools: A starter kit of web interactives10 Tools: A starter kit of web interactives
10 Tools: A starter kit of web interactivesmlbalmeo
 
Look again
Look againLook again
Look againmlbalmeo
 
Before and after photos
Before and after photosBefore and after photos
Before and after photosCynthia Frost
 
Paper a govan v3 incorpating ref report comments 1
Paper a govan v3 incorpating ref report comments 1Paper a govan v3 incorpating ref report comments 1
Paper a govan v3 incorpating ref report comments 1Anastasia Govan Kuusk
 
Incredible embeddables
Incredible embeddablesIncredible embeddables
Incredible embeddablesmlbalmeo
 
Breaking news online, on time
Breaking news online, on timeBreaking news online, on time
Breaking news online, on timemlbalmeo
 
How to integrate operational and information technologies
How to integrate operational and information technologies How to integrate operational and information technologies
How to integrate operational and information technologies Anastasia Govan Kuusk
 
Land h+development+ +110110+(1)
Land h+development+ +110110+(1)Land h+development+ +110110+(1)
Land h+development+ +110110+(1)Cynthia Frost
 
Now I'm teaching video, too?!
Now I'm teaching video, too?!Now I'm teaching video, too?!
Now I'm teaching video, too?!mlbalmeo
 

Destaque (10)

Data quality presentation oct 2006 23092006
Data quality presentation oct 2006 23092006Data quality presentation oct 2006 23092006
Data quality presentation oct 2006 23092006
 
10 Tools: A starter kit of web interactives
10 Tools: A starter kit of web interactives10 Tools: A starter kit of web interactives
10 Tools: A starter kit of web interactives
 
Look again
Look againLook again
Look again
 
Before and after photos
Before and after photosBefore and after photos
Before and after photos
 
Paper a govan v3 incorpating ref report comments 1
Paper a govan v3 incorpating ref report comments 1Paper a govan v3 incorpating ref report comments 1
Paper a govan v3 incorpating ref report comments 1
 
Incredible embeddables
Incredible embeddablesIncredible embeddables
Incredible embeddables
 
Breaking news online, on time
Breaking news online, on timeBreaking news online, on time
Breaking news online, on time
 
How to integrate operational and information technologies
How to integrate operational and information technologies How to integrate operational and information technologies
How to integrate operational and information technologies
 
Land h+development+ +110110+(1)
Land h+development+ +110110+(1)Land h+development+ +110110+(1)
Land h+development+ +110110+(1)
 
Now I'm teaching video, too?!
Now I'm teaching video, too?!Now I'm teaching video, too?!
Now I'm teaching video, too?!
 

Semelhante a Whsg rmaa industry showcase oct 2008 compliance

Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2Ken O'Connor
 
IP Value Summit 2018 - Agenda
 IP Value Summit 2018 - Agenda IP Value Summit 2018 - Agenda
IP Value Summit 2018 - AgendaDuff & Phelps
 
RIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KMRIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KMDavid Williams
 
Inovação em Políticas Públicas: o exemplo da Austrália - Gary Banks
Inovação em Políticas Públicas: o exemplo da Austrália - Gary BanksInovação em Políticas Públicas: o exemplo da Austrália - Gary Banks
Inovação em Políticas Públicas: o exemplo da Austrália - Gary BanksFundação Fernando Henrique Cardoso
 
Achieving Regulatory Compliance The Devil Is In The Data Governance
Achieving Regulatory Compliance   The Devil Is In The Data GovernanceAchieving Regulatory Compliance   The Devil Is In The Data Governance
Achieving Regulatory Compliance The Devil Is In The Data GovernanceIAIDQ Community
 
The Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionThe Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionAtlas_Cloud
 
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...TrustArc
 
Institutions to promote pro productivity policies logic and lessons_Gary Bank...
Institutions to promote pro productivity policies logic and lessons_Gary Bank...Institutions to promote pro productivity policies logic and lessons_Gary Bank...
Institutions to promote pro productivity policies logic and lessons_Gary Bank...Structuralpolicyanalysis
 
Quality Associates - NIH Presentation
Quality Associates - NIH PresentationQuality Associates - NIH Presentation
Quality Associates - NIH PresentationMarciDeVriesTodtz
 
Chief I P Counsel Exchange Agenda 2015
Chief I P  Counsel Exchange Agenda 2015Chief I P  Counsel Exchange Agenda 2015
Chief I P Counsel Exchange Agenda 2015Fredrick Coleman
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
Delivering mobile analytics
Delivering mobile analyticsDelivering mobile analytics
Delivering mobile analyticsDoug Melville
 
Lecture 4 intellectual capital
Lecture 4 intellectual capitalLecture 4 intellectual capital
Lecture 4 intellectual capitalmoduledesign
 
ACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRMACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRMPatrickBilgere
 
TA Compliance Guide 101: Getting to Know NICSA's Essential Reference Guide
TA Compliance Guide 101: Getting to Know NICSA's Essential Reference GuideTA Compliance Guide 101: Getting to Know NICSA's Essential Reference Guide
TA Compliance Guide 101: Getting to Know NICSA's Essential Reference GuideNICSA
 

Semelhante a Whsg rmaa industry showcase oct 2008 compliance (20)

Info governance apla 2010
Info governance apla 2010Info governance apla 2010
Info governance apla 2010
 
Privacy ark oct 2007
Privacy ark oct 2007Privacy ark oct 2007
Privacy ark oct 2007
 
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
Achieving Regulatory Compliance   The Devil Is In The Data Governance V2Achieving Regulatory Compliance   The Devil Is In The Data Governance V2
Achieving Regulatory Compliance The Devil Is In The Data Governance V2
 
IP Value Summit 2018 - Agenda
 IP Value Summit 2018 - Agenda IP Value Summit 2018 - Agenda
IP Value Summit 2018 - Agenda
 
RIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KMRIKM3 Leveraging the relationship between RM, IM and KM
RIKM3 Leveraging the relationship between RM, IM and KM
 
Inovação em Políticas Públicas: o exemplo da Austrália - Gary Banks
Inovação em Políticas Públicas: o exemplo da Austrália - Gary BanksInovação em Políticas Públicas: o exemplo da Austrália - Gary Banks
Inovação em Políticas Públicas: o exemplo da Austrália - Gary Banks
 
Achieving Regulatory Compliance The Devil Is In The Data Governance
Achieving Regulatory Compliance   The Devil Is In The Data GovernanceAchieving Regulatory Compliance   The Devil Is In The Data Governance
Achieving Regulatory Compliance The Devil Is In The Data Governance
 
Regulation and Procurement
Regulation and ProcurementRegulation and Procurement
Regulation and Procurement
 
The Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and ProtectionThe Future of the Modern Workplace Event 2019 - Data Security and Protection
The Future of the Modern Workplace Event 2019 - Data Security and Protection
 
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
Interoperable Solutions for Cross Border Data Transfers – APEC, CBPR, BCR fro...
 
Institutions to promote pro productivity policies logic and lessons_Gary Bank...
Institutions to promote pro productivity policies logic and lessons_Gary Bank...Institutions to promote pro productivity policies logic and lessons_Gary Bank...
Institutions to promote pro productivity policies logic and lessons_Gary Bank...
 
Kantara Workshop at CIS
Kantara Workshop at CISKantara Workshop at CIS
Kantara Workshop at CIS
 
Quality Associates - NIH Presentation
Quality Associates - NIH PresentationQuality Associates - NIH Presentation
Quality Associates - NIH Presentation
 
Chief I P Counsel Exchange Agenda 2015
Chief I P  Counsel Exchange Agenda 2015Chief I P  Counsel Exchange Agenda 2015
Chief I P Counsel Exchange Agenda 2015
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
Delivering mobile analytics
Delivering mobile analyticsDelivering mobile analytics
Delivering mobile analytics
 
283L15_INH
283L15_INH283L15_INH
283L15_INH
 
Lecture 4 intellectual capital
Lecture 4 intellectual capitalLecture 4 intellectual capital
Lecture 4 intellectual capital
 
ACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRMACEDS Dallas - Back to School Lessons on the EDRM
ACEDS Dallas - Back to School Lessons on the EDRM
 
TA Compliance Guide 101: Getting to Know NICSA's Essential Reference Guide
TA Compliance Guide 101: Getting to Know NICSA's Essential Reference GuideTA Compliance Guide 101: Getting to Know NICSA's Essential Reference Guide
TA Compliance Guide 101: Getting to Know NICSA's Essential Reference Guide
 

Mais de Anastasia Govan Kuusk

Applying IIOT to improve asset management in process - Yong The and Dr Anasta...
Applying IIOT to improve asset management in process - Yong The and Dr Anasta...Applying IIOT to improve asset management in process - Yong The and Dr Anasta...
Applying IIOT to improve asset management in process - Yong The and Dr Anasta...Anastasia Govan Kuusk
 
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORKAUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORKAnastasia Govan Kuusk
 
Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...Anastasia Govan Kuusk
 
Where is your key business information?
Where is your key business information?Where is your key business information?
Where is your key business information?Anastasia Govan Kuusk
 
Information Governance Framework for Engineering Asset Management Organisations
Information Governance Framework for Engineering Asset Management OrganisationsInformation Governance Framework for Engineering Asset Management Organisations
Information Governance Framework for Engineering Asset Management OrganisationsAnastasia Govan Kuusk
 
Records management essentials workshop overview bus case - final
Records management essentials workshop overview   bus case - finalRecords management essentials workshop overview   bus case - final
Records management essentials workshop overview bus case - finalAnastasia Govan Kuusk
 
2011 inforum records management essentials security workshop agenda
2011 inforum records management essentials   security workshop agenda2011 inforum records management essentials   security workshop agenda
2011 inforum records management essentials security workshop agendaAnastasia Govan Kuusk
 
Why you need to manage your records flyer
Why you need to manage your records flyerWhy you need to manage your records flyer
Why you need to manage your records flyerAnastasia Govan Kuusk
 
Whsg ala sept 2009 proj mgt methodology
Whsg ala sept 2009 proj mgt methodologyWhsg ala sept 2009 proj mgt methodology
Whsg ala sept 2009 proj mgt methodologyAnastasia Govan Kuusk
 
Draft inforum 2011_paper_submission_-__ana_govan_notes from m hoy
Draft inforum 2011_paper_submission_-__ana_govan_notes from m hoyDraft inforum 2011_paper_submission_-__ana_govan_notes from m hoy
Draft inforum 2011_paper_submission_-__ana_govan_notes from m hoyAnastasia Govan Kuusk
 
Contract management for information industry managers
Contract management for information industry managersContract management for information industry managers
Contract management for information industry managersAnastasia Govan Kuusk
 

Mais de Anastasia Govan Kuusk (20)

Applying IIOT to improve asset management in process - Yong The and Dr Anasta...
Applying IIOT to improve asset management in process - Yong The and Dr Anasta...Applying IIOT to improve asset management in process - Yong The and Dr Anasta...
Applying IIOT to improve asset management in process - Yong The and Dr Anasta...
 
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORKAUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
AUTOMATING DATA FOR IIOT ASSET MANAGEMENT & CONTROL - A HOW TO FRAMEWORK
 
Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...
 
Where is your key business information?
Where is your key business information?Where is your key business information?
Where is your key business information?
 
Sharepoint & TRIM integration
Sharepoint & TRIM integrationSharepoint & TRIM integration
Sharepoint & TRIM integration
 
Information Governance Framework for Engineering Asset Management Organisations
Information Governance Framework for Engineering Asset Management OrganisationsInformation Governance Framework for Engineering Asset Management Organisations
Information Governance Framework for Engineering Asset Management Organisations
 
Records management essentials workshop overview bus case - final
Records management essentials workshop overview   bus case - finalRecords management essentials workshop overview   bus case - final
Records management essentials workshop overview bus case - final
 
Project management file structures
Project management file structuresProject management file structures
Project management file structures
 
2011 inforum records management essentials security workshop agenda
2011 inforum records management essentials   security workshop agenda2011 inforum records management essentials   security workshop agenda
2011 inforum records management essentials security workshop agenda
 
Why you need to manage your records flyer
Why you need to manage your records flyerWhy you need to manage your records flyer
Why you need to manage your records flyer
 
Edrms 0 go v1 course material
Edrms 0 go v1 course materialEdrms 0 go v1 course material
Edrms 0 go v1 course material
 
Wcc2010 yit
Wcc2010 yitWcc2010 yit
Wcc2010 yit
 
Skills rimpa 2011
Skills rimpa 2011Skills rimpa 2011
Skills rimpa 2011
 
Whsg ala sept 2009 proj mgt methodology
Whsg ala sept 2009 proj mgt methodologyWhsg ala sept 2009 proj mgt methodology
Whsg ala sept 2009 proj mgt methodology
 
Draft inforum 2011_paper_submission_-__ana_govan_notes from m hoy
Draft inforum 2011_paper_submission_-__ana_govan_notes from m hoyDraft inforum 2011_paper_submission_-__ana_govan_notes from m hoy
Draft inforum 2011_paper_submission_-__ana_govan_notes from m hoy
 
Contract management for information industry managers
Contract management for information industry managersContract management for information industry managers
Contract management for information industry managers
 
Edrms ark april 2007
Edrms ark april 2007Edrms ark april 2007
Edrms ark april 2007
 
Govan irma paper 2008 (2) ed
Govan irma paper 2008 (2) edGovan irma paper 2008 (2) ed
Govan irma paper 2008 (2) ed
 
Lms comparisons apla 2010
Lms comparisons apla 2010Lms comparisons apla 2010
Lms comparisons apla 2010
 
3 mt cdu 2011 a govan
3 mt cdu 2011 a govan3 mt cdu 2011 a govan
3 mt cdu 2011 a govan
 

Último

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Último (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Whsg rmaa industry showcase oct 2008 compliance

  • 1. Adhering to appropriate Information Management governance structures RMAA Industry showcase October 2008
  • 2. Why are governance structures important? • You can add new text slides by clicking on the „new slide‟ icon at top or by clicking Insert then New slide • You can use the multiple slide view at the bottom to copy and paste slides.
  • 4. What am l covering today? “governance is a multi-faceted discipline that not only includes the formulation and implementation of strategy, but the establishment of systems and processes that enable effective risk management as well as legal and regulatory compliance.” ASX Corporate Governance Council (2003) “information governance is emerging as a critical competency” Gartner (2007)
  • 5. The governance framework of Information Management…… “the audit identified that there is an increasing range of legislation, standards, policies and guidance that is issued by a number of Australian Government entities that has recordkeeping implications. The status of this material ranged from mandatory legislative requirements to better practice advice and guidance, the majority of which is issued by Archives. The ANAO found there was differing levels of awareness of this material in the entities audited.” Australian National Audit Office (2006)
  • 6. Information Management standards •ISO 15489 Records management by IT/21 (Standards Australia) •ISO9000 Quality certification compliance •ISO 2788:1986 Guidelines for the establishment and development of monolingual thesauri •ISO TC 46 SC11 Archives/Records Management •ISO/TC171/SC2N450 - ISO/DTR 22957 Document management - Analysis, selection, and implementation of Electronic Document Management Systems (EDMS) •ISO/TC171/SC2N451 - ISO/CD 12029 Electronic imaging – Forms design optimization for electronic image management •W3C Web content accessibility & Mobile Web Best Practices a Candidate Recommendation •AS 5037-2005 Knowledge management •AS17799 s. 9 – Information Technology Code of Practice for Information Security Management - design and use of access controls & digital signatures •AS17799 - section 8.7.4 security risks and guidelines for items to be included in an email management policy •Australian Government Locator Service/Dublin core metadata •Anglo American Cataloguing rules
  • 7. Information Management regulation • Disposal schedules • National Archives Australia (2006). Functional requirements for Electronic Records Management Software • International Model requirements for the management of electronic records (MorEq) • Policy and procedures identified by Archives as delegated by the relevant Act • Designing and Implementing Recordkeeping Systems (DIRKS) • Codes of ethics – NSW Professional Conduct regulation • VERS toolkit • Private sector Privacy Codes • Litigation plan • US Department of Defense (DOD) Directive 5015.2
  • 8. Information Management legislation case law Common law • Evidence Act 2004 (NT) • Commonwealth Evidence Act 1995 • Archives Act 1983 • Legal Deposit • Sarbanes Oxley 2002 • Tax Ruling TR 2004/D23 • Electronic Transactions Act 1999 (Commonwealth) • Corporations Act • Income Tax Assessment Act 1936 • Crimes (Document Destruction) Act 2006 • Information Act • Freedom of Information • Copyright • Privacy Act 1988 (Cth) Case law • Consistency of behaviour – policy and procedures
  • 9. Cost of non compliance – Valuing information models “the wealth of an organisation is based on its accumulation of useful knowledge - its knowledge capital. The value added to an organisation by information, discussed ..... under `information productivity' can be regarded as an annual return on its accumulated knowledge capital.“ Strassman (1996)
  • 10. Information valuation models Focus on human, customer Focus on market and structural capital capitalization, return on assets, and other monetary valuations. •Intangible asset monitor (Sveiby, •Tobin's Q, economic value added 1997); (EVA), Market-to-Book Value, •Balanced scorecard (Kaplan and Intellectual Asset Valuation, Total Norton, 1992; 1996;75 2000); Value Creation, Total Value •Skandia value scheme (Edvinsson •Creation, Knowledge Capital and Malone, 1997). Earnings, citation weighted patents, •IC-Index Model and HVA Model (Roos etc. (see for instance: Stewart (1997); and colleagues 1997) Bontis (2001); Bontis et al. (1999); Lev (1999); Sullivan (2000)) •Technology Broker Model (Brooking (1996, pp. 13-14) •Value Chain Scoreboard Lev (2002) •Net Present Value (NPV)
  • 11. Cost of non compliance • Tax compliance • Knowledge recreated/lost • Damages awarded • Loss of business critical records • Loss of reputation • Fines/e-discovery time • Job loss • Lost productivity
  • 12. Case study – Government Owned Corporation NT Power Generation Pty Ltd v Power and Water Authority [2004] "There is no other procedure established under the PAWA Act by which the minister could control the operations of PAWA. As a matter of practice, as the communications between PAWA and the minister demonstrate, the procedure of a minute from the chief executive officer and his response by endorsement on that minute was the normal means by which the minister (where he considered it appropriate) gave directions under s 16 of the PAWA Act. There is no evidence to indicate any other means by which directions under s 16 were given." S. 132 PAWA has not demonstrated error in the reasoning of Finkelstein J. PAWA took this Court to some oral evidence of Mr Gardner in an endeavour to counter Finkelstein J's conclusion that the Minister's desire to have PAWA act as he wished was not always conveyed by direction. That oral evidence was vague, was undermined by other evidence, and, in any event, did not falsify Finkelstein J's conclusion. The PAWA Act does not stipulate that s 16 "directions" are to take any particular form, and the Court was not taken to any other legislation which did. Even if Mr Gardner's evidence establishes that he thought he had received a s 16 direction in August 1998, that does not prove that he did. Everything depends on the terms of the briefing note: no other possible "direction" was relied on. But it is not possible to infer from the briefing note that any direction was given. The acceptance of the recommendation in the briefing note was too vague to amount to a s 16 direction. It did not refer to s 16, yet citation of the source of power could be a crucial matter in the event of later political or forensic controversy about whether any directions had been given or obeyed - for Mr Gardner had a duty to obey them. It did not speak in the language of command or mandate or instruction - it did not direct.
  • 13. Case study – Private Sector – British American Tobacco • McCabe v British American Tobacco Services Limited (BAT) • Review was completed by Professor Peter A Sallmann in May 2004 for the Victorian Attorney-General on Document Destruction and Civil Litigation in Victoria • Resulted in the Document Destruction Act 2006 • Fines of $314,430 for companies and $62,886 or 5 years imprisonment for individuals
  • 14. Case study – Health provider H v Health Service Provider [2007] PrivCmrA 10 • Inappropriate disclosure of information • National Privacy Principles 2 and 4 in Schedule 3 of the Privacy Act 1988 (Cth) breached • Extensive Privacy Commissioner audit of processes and policy • Medical centre offered complainant compensation without admitting liability
  • 15. Case study – Law firm KATRINA NUGENT 9.39am: Yesterday I put my lunch in the fridge on Level 19 which included a packet of ham, some cheese slices and two slices of bread which was going to be for my lunch today. Over night it has gone missing and as I have no spare money to buy another lunch today, I would appreciate being reimbursed for it. MELINDA BIRD 9.55: Katrina, There are items fitting your exact description in the level 20 fridge. Are you sure you didn't place your lunch in the wrong fridge yesterday? KATRINA NUGENT 10.06: Melinda, probably best you don't reply to all next time, would be annoyed to the lawyers. The kitchen was not doing dinner last night, so obviously someone has helped themselves to my lunch. Really sweet of you to investigate for me! MELINDA BIRD 10.14: Katrina, since I used to be a float and am still on the level 19 email list I couldn't help but receive your ridiculous email - lucky me! You use our kitchen all the time for some unknown reason and I saw the items you mentioned in the fridge so naturally thought you may have placed them in the wrong fridge. Thanks I know I'm sweet and I only had your best interests at heart. Now as you would say, "BYE"! KATRINA NUGENT 10.15: I'm not blonde!! !MELINDA BIRD 10.16: Being a brunette doesn't mean you're smart though! KATRINA NUGENT 10.17: I definitely wouldn't trade places with you for "the world"! MELINDA BIRD 10.19: I wouldn't trade places with you for the world... I don't want your figure! KATRINA NUGENT 10.21: Let's not get person (sic) "Miss Can't Keep A Boyfriend". I am in a happy relationship, have a beautiful apartment, brand new car, high pay job...say no more!! MELINDA BIRD 10.23: Oh my God I'm laughing! happy relationship (you have been with so many guys), beautiful apartment (so what), brand new car (me too), high pay job (I earn more)....say plenty more... I have 5 guys at the moment! haha.
  • 16. Achieving, auditing and maintaining compliance - Whitehorse services • Information technology governance • Information technology and telecommunications strategy, planning, and acquisition • Systems Integration and Facilities Management services • Information, records, library, and knowledge management labour hire, archiving, disposal schedules, cataloguing, advise, strategic planning • Risk evaluation and planning • IT outsourcing management • Scanning solutions through our business partner INFORG Information Solutions • Electronic Commerce, including business analysis and process design • HP Tower and Outback Imaging (Ezescan) accredited business partners • Laptop training network and Training facilities in Darwin and Melbourne • Sharepoint & TRIM installations, upgrades, integration, reviews and tailored add ons • Regional telecommunication and other infrastructure planning and implementation • Negotiation and funding access • Federal and State Government liaison • Policy evaluation, advice, business planning • ICT resource and industry research analysis publications • Project management • TRIM/Sharepoint training • Certified staff
  • 17. References http://www.anao.gov.au/uploads/documents/2006- 07_Audit_Report_61.pdf Chua and Van Toorn (2005). Documents, risk and the fate of your organisation:Document management in the age of corporate accountability Priest, M. (2006). Document destruction could be costly. Australian Financial Review, 8/9/2006, p. 58 Moneycontrol.com (2007). Blogging will be the future management tool: Accenture Standards Australia www.austlii.edu.au