SlideShare uma empresa Scribd logo
1 de 36
17-Oct-08 © 2008 C3 Associates Inc. What Success Looks Like  The Anatomy of a Successful ECM Program Greg Clark, MBA AIIM Info360 Conference Session A09 April 21, 2010 ©2010 C3 Associates, Inc. - May not be reproduced in whole or part without written permission of C3 Associates, Inc.
Agenda Introduction(5 minutes) The Business Case for Information Management (5 minutes) How ECM is Different (and why that makes it challenging to implement) (10 minutes) What Success Looks Like (15 minutes) Outcomes (5 minutes) Conclusion and Discussion (5 minutes) ©2010 C3 Associates, Inc.
About C3 Associates Vendor independent management consultants based in Calgary, Alberta; focused exclusively on ECM and collaboration solutions in the oil and gas industry 30+ Associates each with a strong background in ECM and information management Greg Clark MBA (Specialization in Knowledge Management) 10+ years experience in ECM AIIM ERM expert blogger – Find me on www.aiimcommunities.org ©2010 C3 Associates, Inc.
Mission: Help organizations maximize investments in Information Management and collaboration technologies through alignment with business objectives ©2010 C3 Associates, Inc.
Why I like my job... ©2010 C3 Associates, Inc.
The Business Case for Enterprise Information Management ©2010 C3 Associates, Inc.
Enterprise Information Structured data Unstructured data 25% 5% Semi-structured data 70% ©2010 C3 Associates, Inc.
Volume & Variety - We’re Drowning In Information ,[object Object]
7.5% of documents are lost forever
10% of Canadian Government’s electronic records are not available
Average cost of recreating just 20mb of data is $64,000
Viking Space probes cost $1billion and now their magnetic tapes are unreadable – NASA tracked down old printouts and retyped everything
Nine of out of 10 organizations will fail in the first year unless they approach information management in a coordinated way (Gartner 2007)STRUCTURED UNSTRUCTURED
Key Drivers for an IM Strategy – Business Drivers 52% of users don’t have  confidence  in their information1 42% of managers use wrong  information at least once a week2 59% of managers miss information they should have used2 Volume  & Variety Information Silos Strategic Assets eDiscovery & Retention Management 1AIIM 2008 Survey 2Accenture 2007 Managers Survey ©2010 C3 Associates, Inc.
Why ECM? Costs of Mismanaged Information One division of a large oil and gas company ©2010 C3 Associates, Inc.
How is ECM Different? Why does it Often Fail to Meet Expectations? ©2010 C3 Associates, Inc.
Understanding the reasons for failed projects requires an understanding of how ECM is different from other IT systems ©2010 C3 Associates, Inc.
How is ECM Different? ECM is about managing information, not just storing it ECM is not just another technology implementation Users must understand not only how but why – change management and training are critical Requires different rules which may be used for all content or only certain content – governance is critical Requires an understanding of information lifecycle and context in which it will be used ©2010 C3 Associates, Inc.
How is ECM Different? ECM is (perceived to be) optional Users have a choice ECM is not the same as an accounting system Done well, ECM can provide a significant competitive advantage ECM is everywhere Shared drives Email Formal ECM systems (75% use more than one1) Records management (physical and electronic) 1 2009 AIIM State of the Industry Survey ©2010 C3 Associates, Inc.
How is ECM Different? ECM changes ingrained work habits File / Save As… Initially, can have a negative impact on productivity Can lead to pushback from end users and, through their bosses, to senior management Organizational benefits may be clear, but end user community may not see WIIFM (What’s In It For Me?) Impacts many business processes: Correspondence, AP/AR, Budgeting, Contracts, Maintenance, Marketing, Projects, etc. ©2010 C3 Associates, Inc.
Common Challenges Underestimated the impact on business processes and organizational structures (esp. senior level sponsorship) Uneven usage due to poor procedures (inadequate governance) Did not train users appropriately (poor change management) Project derailed by internal politics Poor design or clumsy rollout Scope creep Underestimated effort to migrate content Poorly defined business case Taxonomy concerns (identified as #1 risk pre-implementation) Narrow focus Source: 2009 AIIM State of the Industry Survey ©2010 C3 Associates, Inc.
What Success Looks Like  and some ideas on how to get there ©2010 C3 Associates, Inc.
Successful ECM has… A clearly articulated vision A statement of what is the ECM implementation trying to achieve that is aligned to the strategic objectives of your organization Our ECM Program supports increased sales by ensuring our information is accurate, timely and relevant for our customers and staff. The ECM Office provides strategy, processes and techniques to support information access, sharing, and security to put the right information in the hands of the right people at the right time. ©2010 C3 Associates, Inc.
Successful ECM has… Clear ownership: Top-down and bottom-up support Ownership should be high enough up in the organization to ensure ECM gains traction Owner should be in the business, not IT Consider moving ECM group directly into the business rather than embedding in IT If no one steps up to own ECM stop until someone does Users demand ECM, support the implementation and associated process changes ©2010 C3 Associates, Inc.
©2010 C3 Associates, Inc.
Successful ECM has… A high level of understanding of the toolset and related processes End users understand how, when and why to use the tool Excellent initial and ongoing training ECM onboarding process embedded in new hire orientation supported by an expert user community Well understood processes for new deployments No excuses for not using the tool ©2010 C3 Associates, Inc.
Successful ECM has… An information architecture that supports the business Content is easy to find, easy to store Just enough metadata to easily find content but not so much that users won’t add it to documents 2-5 values is ideal, if more needed capture via inheritance or application integration Iterates and changes as the business evolves Single sourcing, little or no duplication of information ©2010 C3 Associates, Inc.
Successful ECM has… A flexible and comprehensive governance model Usage policies and procedures are clear and well understood Information is as secure as it needs to be but not more secure than it should be Metrics are defined, captured and acted upon; expected benefits are understood and realized ©2010 C3 Associates, Inc.
Governance in Action Use “guidelines” or “principles” rather than a heavy-handed approach Users appreciate options, more likely to use the system if they feel in control Still need some policies Taxonomy model (folder hierarchy) Drives metadata inheritance, retention and security Navigation is secondary Metadata model Easily adaptable and regularly updated ©2010 C3 Associates, Inc.
Successful ECM has… A plan for Social Computing ECM platform is the backbone of your social computing effort (or is at least integrated with your chosen platform) Records retention is embedded in social computing strategy Governance group understands and supports collaboration objectives Collaboration team understands and supports governance obligations ©2010 C3 Associates, Inc.
Successful ECM has… Transparent application integration Content-enabled vertical applications are seamlessly integrated with your ECM system Users are often interacting with your ECM system without even knowing it ©2010 C3 Associates, Inc.
Successful ECM has… A bulletproof technical environment Very little if any downtime Fast response Redundant systems for critical content Intuitive user interface Responsive user support and development group ©2010 C3 Associates, Inc.
Outcomes What you should expect from a successful ECM implementation ©2010 C3 Associates, Inc.
Outcomes Significant reduction in volume of shared drive content Most or all shared drives should be set to read only or decommissioned entirely Email volume reduced significantly Users collaborate in ECM system, send links to content rather than attachments ©2010 C3 Associates, Inc.
Outcomes Productivity goes up, compliance goes up Measurable increase in business performance Measurable decrease in adverse regulatory outcomes Measurable improvement in speed and comprehensiveness of responses to regulatory requests A lot less paper Critical files scanned, fewer physical files created ©2010 C3 Associates, Inc.
Outcomes Information and records are retained for as long as needed but not longer Measurable decrease in time to complete disposition process Measurable reduction in cost of litigation / cost of eDiscovery Easy to place legal hold Discovery process streamlined ©2010 C3 Associates, Inc.

Mais conteúdo relacionado

Mais procurados

Check out aiim training!
Check out aiim training!Check out aiim training!
Check out aiim training!Vander Loto
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesThe Dayhuff Group
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsInfo-Tech Research Group
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksKaseya
 
Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...
Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...
Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...One Two One Advisor Sdn. Bhd. (121advisor)
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFarrokh Poorooshasb
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Katleen Aems
 
Chap11 Developing Business It Strategies[1]
Chap11 Developing Business It Strategies[1]Chap11 Developing Business It Strategies[1]
Chap11 Developing Business It Strategies[1]sihamy
 
Orchestrating Legacy ERP Infotech 2006
Orchestrating Legacy ERP Infotech 2006Orchestrating Legacy ERP Infotech 2006
Orchestrating Legacy ERP Infotech 2006guest5a3863
 
TEI of Microsoft 365 E5
TEI of Microsoft 365 E5TEI of Microsoft 365 E5
TEI of Microsoft 365 E5Daniel Chang
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulationAssignment Studio
 
What the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want oneWhat the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want oneCraig Bickel
 
Records management who is taking responsibility
Records management   who is taking responsibilityRecords management   who is taking responsibility
Records management who is taking responsibilityVander Loto
 

Mais procurados (19)

Sim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access managementSim an innovative business oriented approach for a distributed access management
Sim an innovative business oriented approach for a distributed access management
 
Check out aiim training!
Check out aiim training!Check out aiim training!
Check out aiim training!
 
Benefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human ResourcesBenefits of Enterprise Content Management (ECM) for Human Resources
Benefits of Enterprise Content Management (ECM) for Human Resources
 
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize BenefitsCraft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
Craft an End-to-End Data Center Consolidation Strategy to Maximize Benefits
 
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed NetworksSystems Management 2.0: How to Gain Control of Unruly & Distributed Networks
Systems Management 2.0: How to Gain Control of Unruly & Distributed Networks
 
Enterprise Service Management: the (r)evolution of ITSM
Enterprise Service Management: the (r)evolution of ITSMEnterprise Service Management: the (r)evolution of ITSM
Enterprise Service Management: the (r)evolution of ITSM
 
Dit yvol5iss10
Dit yvol5iss10Dit yvol5iss10
Dit yvol5iss10
 
Data Protection Governance IT
Data Protection Governance ITData Protection Governance IT
Data Protection Governance IT
 
Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...
Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...
Insurance 2.0 : Enabling Multi-Channel Sales & Services - Insurance Applicati...
 
Formal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing CompanyFormal Information Technology in a Small, Growing Company
Formal Information Technology in a Small, Growing Company
 
Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01Aiim ibm advanced casemanagement-2013-01
Aiim ibm advanced casemanagement-2013-01
 
Chap11 Developing Business It Strategies[1]
Chap11 Developing Business It Strategies[1]Chap11 Developing Business It Strategies[1]
Chap11 Developing Business It Strategies[1]
 
Orchestrating Legacy ERP Infotech 2006
Orchestrating Legacy ERP Infotech 2006Orchestrating Legacy ERP Infotech 2006
Orchestrating Legacy ERP Infotech 2006
 
TEI of Microsoft 365 E5
TEI of Microsoft 365 E5TEI of Microsoft 365 E5
TEI of Microsoft 365 E5
 
Information systems strategy formulation
Information systems strategy formulationInformation systems strategy formulation
Information systems strategy formulation
 
What the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want oneWhat the heck is a Fractional CIO and why would I want one
What the heck is a Fractional CIO and why would I want one
 
Records management who is taking responsibility
Records management   who is taking responsibilityRecords management   who is taking responsibility
Records management who is taking responsibility
 
BPM in Healthcare
BPM in HealthcareBPM in Healthcare
BPM in Healthcare
 
IT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and ContainersIT Service Modeling in the Age of Cloud and Containers
IT Service Modeling in the Age of Cloud and Containers
 

Destaque

How to Use and Apply Buyer Personas
How to Use and Apply Buyer Personas How to Use and Apply Buyer Personas
How to Use and Apply Buyer Personas Paul Writer
 
Libguidescommittee
LibguidescommitteeLibguidescommittee
Libguidescommitteeberklibrary
 
Workshop mensgericht organiseren AIF MeursHRM 4 11-2014
Workshop mensgericht organiseren AIF MeursHRM 4 11-2014Workshop mensgericht organiseren AIF MeursHRM 4 11-2014
Workshop mensgericht organiseren AIF MeursHRM 4 11-2014Glenn van der Burg
 
Graphic Recording of the launch of Paul Writer by Ashely Vinil
Graphic Recording of the launch of Paul Writer by Ashely VinilGraphic Recording of the launch of Paul Writer by Ashely Vinil
Graphic Recording of the launch of Paul Writer by Ashely VinilPaul Writer
 
The Social Bridge
The Social Bridge The Social Bridge
The Social Bridge Paul Writer
 
Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011
Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011
Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011Personalive srl
 
Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?
Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?
Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?Personalive srl
 
Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?
Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?
Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?Personalive srl
 
Gec 111 OL Baxter WINTER 2015
Gec 111 OL Baxter WINTER 2015Gec 111 OL Baxter WINTER 2015
Gec 111 OL Baxter WINTER 2015berklibrary
 
User committee update
User committee updateUser committee update
User committee updateberklibrary
 
Nationaal Sustainability Congres 2012 - Workshop MVO Nederl
Nationaal Sustainability Congres 2012 - Workshop MVO NederlNationaal Sustainability Congres 2012 - Workshop MVO Nederl
Nationaal Sustainability Congres 2012 - Workshop MVO NederlGlenn van der Burg
 
FAS 321 Spring 2015 Snyder-Gallagher
FAS 321 Spring 2015 Snyder-GallagherFAS 321 Spring 2015 Snyder-Gallagher
FAS 321 Spring 2015 Snyder-Gallagherberklibrary
 
Hnw sabine hess microsoft mvo nederland 2010 11-10
Hnw sabine hess microsoft mvo nederland 2010 11-10Hnw sabine hess microsoft mvo nederland 2010 11-10
Hnw sabine hess microsoft mvo nederland 2010 11-10Glenn van der Burg
 
Luke Pirie Portfolio 2013
Luke Pirie Portfolio 2013Luke Pirie Portfolio 2013
Luke Pirie Portfolio 2013Luke Pirie
 
Yammer Overview
Yammer OverviewYammer Overview
Yammer Overviewmselepec
 
7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...
7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...
7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...Personalive srl
 
Meridan Energy Stage 1 Proposal
Meridan Energy Stage 1 ProposalMeridan Energy Stage 1 Proposal
Meridan Energy Stage 1 ProposalLuke Pirie
 
Njla 2012 conference
Njla 2012 conferenceNjla 2012 conference
Njla 2012 conferenceberklibrary
 

Destaque (20)

How to Use and Apply Buyer Personas
How to Use and Apply Buyer Personas How to Use and Apply Buyer Personas
How to Use and Apply Buyer Personas
 
The Joy of Search
The Joy of SearchThe Joy of Search
The Joy of Search
 
Libguidescommittee
LibguidescommitteeLibguidescommittee
Libguidescommittee
 
20130901 draagvlak toerisme
20130901 draagvlak toerisme20130901 draagvlak toerisme
20130901 draagvlak toerisme
 
Workshop mensgericht organiseren AIF MeursHRM 4 11-2014
Workshop mensgericht organiseren AIF MeursHRM 4 11-2014Workshop mensgericht organiseren AIF MeursHRM 4 11-2014
Workshop mensgericht organiseren AIF MeursHRM 4 11-2014
 
Graphic Recording of the launch of Paul Writer by Ashely Vinil
Graphic Recording of the launch of Paul Writer by Ashely VinilGraphic Recording of the launch of Paul Writer by Ashely Vinil
Graphic Recording of the launch of Paul Writer by Ashely Vinil
 
The Social Bridge
The Social Bridge The Social Bridge
The Social Bridge
 
Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011
Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011
Il contesto cambia molto più di quello che sembra - Mario Abis 28 nov 2011
 
Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?
Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?
Andrea Boaretto - Quale futuro per le PMI e le grandi imprese?
 
Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?
Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?
Giuliano Noci - Brand del lusso e paesi emergenti: attrazione fatale?
 
Gec 111 OL Baxter WINTER 2015
Gec 111 OL Baxter WINTER 2015Gec 111 OL Baxter WINTER 2015
Gec 111 OL Baxter WINTER 2015
 
User committee update
User committee updateUser committee update
User committee update
 
Nationaal Sustainability Congres 2012 - Workshop MVO Nederl
Nationaal Sustainability Congres 2012 - Workshop MVO NederlNationaal Sustainability Congres 2012 - Workshop MVO Nederl
Nationaal Sustainability Congres 2012 - Workshop MVO Nederl
 
FAS 321 Spring 2015 Snyder-Gallagher
FAS 321 Spring 2015 Snyder-GallagherFAS 321 Spring 2015 Snyder-Gallagher
FAS 321 Spring 2015 Snyder-Gallagher
 
Hnw sabine hess microsoft mvo nederland 2010 11-10
Hnw sabine hess microsoft mvo nederland 2010 11-10Hnw sabine hess microsoft mvo nederland 2010 11-10
Hnw sabine hess microsoft mvo nederland 2010 11-10
 
Luke Pirie Portfolio 2013
Luke Pirie Portfolio 2013Luke Pirie Portfolio 2013
Luke Pirie Portfolio 2013
 
Yammer Overview
Yammer OverviewYammer Overview
Yammer Overview
 
7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...
7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...
7.4.14 laboratorio ConMe - Società e consumi: nuove opportunità per le impres...
 
Meridan Energy Stage 1 Proposal
Meridan Energy Stage 1 ProposalMeridan Energy Stage 1 Proposal
Meridan Energy Stage 1 Proposal
 
Njla 2012 conference
Njla 2012 conferenceNjla 2012 conference
Njla 2012 conference
 

Semelhante a AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21

ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMChristopher Wynder
 
Real World Examples of Succesful Enterprise Content Management Strategies
Real World Examples of Succesful Enterprise Content Management StrategiesReal World Examples of Succesful Enterprise Content Management Strategies
Real World Examples of Succesful Enterprise Content Management StrategiesBrian Huff
 
AIIM and ECM 0707
AIIM and ECM 0707AIIM and ECM 0707
AIIM and ECM 0707tmresek
 
CTO-On-Demand v2
CTO-On-Demand v2CTO-On-Demand v2
CTO-On-Demand v2Subash BGK
 
AIIM and Vamosa - Practical Cosniderations when Implementing ECM
AIIM and Vamosa - Practical Cosniderations when Implementing ECMAIIM and Vamosa - Practical Cosniderations when Implementing ECM
AIIM and Vamosa - Practical Cosniderations when Implementing ECMnicarcher
 
Executive Overview on EDM Strategy
Executive Overview on EDM StrategyExecutive Overview on EDM Strategy
Executive Overview on EDM Strategyssuserf8f9b2
 
CEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architectureCEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architectureCorporater
 
Information resources, mis, csvtu
Information resources, mis, csvtuInformation resources, mis, csvtu
Information resources, mis, csvtuNarender Chintada
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business caseRaquel Miranda
 
EDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdf
EDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdfEDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdf
EDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdfAbhinav195887
 
Information systems strategy management: positioning
Information systems strategy management: positioningInformation systems strategy management: positioning
Information systems strategy management: positioningDaniel Piret
 
Program Lifecycle Management - The New PLM
Program Lifecycle Management - The New PLMProgram Lifecycle Management - The New PLM
Program Lifecycle Management - The New PLMStephen Lahanas
 
How Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdfHow Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdfSufalam Technologies
 
Cs633-1 Enterprise Architecture Foundation
Cs633-1 Enterprise Architecture FoundationCs633-1 Enterprise Architecture Foundation
Cs633-1 Enterprise Architecture FoundationCasey Hudson
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User ComputingDATAVERSITY
 
Ecm Concept
Ecm ConceptEcm Concept
Ecm ConceptDJDhiren
 
Deployment roadmap
Deployment roadmapDeployment roadmap
Deployment roadmapsujite2e
 
Crafting Your Accounting Innovation Strategy
Crafting Your Accounting Innovation StrategyCrafting Your Accounting Innovation Strategy
Crafting Your Accounting Innovation StrategyAggregage
 

Semelhante a AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21 (20)

ThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECMThinkDox implementation whitepaper for ECM
ThinkDox implementation whitepaper for ECM
 
Real World Examples of Succesful Enterprise Content Management Strategies
Real World Examples of Succesful Enterprise Content Management StrategiesReal World Examples of Succesful Enterprise Content Management Strategies
Real World Examples of Succesful Enterprise Content Management Strategies
 
Nainesh crm
Nainesh crmNainesh crm
Nainesh crm
 
AIIM and ECM 0707
AIIM and ECM 0707AIIM and ECM 0707
AIIM and ECM 0707
 
CTO-On-Demand v2
CTO-On-Demand v2CTO-On-Demand v2
CTO-On-Demand v2
 
Crm notes 21.12.2011
Crm notes 21.12.2011Crm notes 21.12.2011
Crm notes 21.12.2011
 
AIIM and Vamosa - Practical Cosniderations when Implementing ECM
AIIM and Vamosa - Practical Cosniderations when Implementing ECMAIIM and Vamosa - Practical Cosniderations when Implementing ECM
AIIM and Vamosa - Practical Cosniderations when Implementing ECM
 
Executive Overview on EDM Strategy
Executive Overview on EDM StrategyExecutive Overview on EDM Strategy
Executive Overview on EDM Strategy
 
CEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architectureCEO / CXO Architecture | The missing piece in your IT architecture
CEO / CXO Architecture | The missing piece in your IT architecture
 
Information resources, mis, csvtu
Information resources, mis, csvtuInformation resources, mis, csvtu
Information resources, mis, csvtu
 
Chapter 2 analyzing the business case
Chapter 2 analyzing the business caseChapter 2 analyzing the business case
Chapter 2 analyzing the business case
 
EDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdf
EDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdfEDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdf
EDMC_DCAM_-_WORKING_DRAFT_VERSION_0.7.pdf
 
Information systems strategy management: positioning
Information systems strategy management: positioningInformation systems strategy management: positioning
Information systems strategy management: positioning
 
Program Lifecycle Management - The New PLM
Program Lifecycle Management - The New PLMProgram Lifecycle Management - The New PLM
Program Lifecycle Management - The New PLM
 
How Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdfHow Enterprise Application Integration is Driving Growth.pdf
How Enterprise Application Integration is Driving Growth.pdf
 
Cs633-1 Enterprise Architecture Foundation
Cs633-1 Enterprise Architecture FoundationCs633-1 Enterprise Architecture Foundation
Cs633-1 Enterprise Architecture Foundation
 
Data Governance for End-User Computing
Data Governance for  End-User ComputingData Governance for  End-User Computing
Data Governance for End-User Computing
 
Ecm Concept
Ecm ConceptEcm Concept
Ecm Concept
 
Deployment roadmap
Deployment roadmapDeployment roadmap
Deployment roadmap
 
Crafting Your Accounting Innovation Strategy
Crafting Your Accounting Innovation StrategyCrafting Your Accounting Innovation Strategy
Crafting Your Accounting Innovation Strategy
 

Último

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 

Último (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 

AIIM Info360 Conference - What ECM Success Looks Like - 2010 04 21

  • 1. 17-Oct-08 © 2008 C3 Associates Inc. What Success Looks Like The Anatomy of a Successful ECM Program Greg Clark, MBA AIIM Info360 Conference Session A09 April 21, 2010 ©2010 C3 Associates, Inc. - May not be reproduced in whole or part without written permission of C3 Associates, Inc.
  • 2. Agenda Introduction(5 minutes) The Business Case for Information Management (5 minutes) How ECM is Different (and why that makes it challenging to implement) (10 minutes) What Success Looks Like (15 minutes) Outcomes (5 minutes) Conclusion and Discussion (5 minutes) ©2010 C3 Associates, Inc.
  • 3. About C3 Associates Vendor independent management consultants based in Calgary, Alberta; focused exclusively on ECM and collaboration solutions in the oil and gas industry 30+ Associates each with a strong background in ECM and information management Greg Clark MBA (Specialization in Knowledge Management) 10+ years experience in ECM AIIM ERM expert blogger – Find me on www.aiimcommunities.org ©2010 C3 Associates, Inc.
  • 4. Mission: Help organizations maximize investments in Information Management and collaboration technologies through alignment with business objectives ©2010 C3 Associates, Inc.
  • 5. Why I like my job... ©2010 C3 Associates, Inc.
  • 6. The Business Case for Enterprise Information Management ©2010 C3 Associates, Inc.
  • 7. Enterprise Information Structured data Unstructured data 25% 5% Semi-structured data 70% ©2010 C3 Associates, Inc.
  • 8.
  • 9. 7.5% of documents are lost forever
  • 10. 10% of Canadian Government’s electronic records are not available
  • 11. Average cost of recreating just 20mb of data is $64,000
  • 12. Viking Space probes cost $1billion and now their magnetic tapes are unreadable – NASA tracked down old printouts and retyped everything
  • 13. Nine of out of 10 organizations will fail in the first year unless they approach information management in a coordinated way (Gartner 2007)STRUCTURED UNSTRUCTURED
  • 14. Key Drivers for an IM Strategy – Business Drivers 52% of users don’t have confidence in their information1 42% of managers use wrong information at least once a week2 59% of managers miss information they should have used2 Volume & Variety Information Silos Strategic Assets eDiscovery & Retention Management 1AIIM 2008 Survey 2Accenture 2007 Managers Survey ©2010 C3 Associates, Inc.
  • 15. Why ECM? Costs of Mismanaged Information One division of a large oil and gas company ©2010 C3 Associates, Inc.
  • 16. How is ECM Different? Why does it Often Fail to Meet Expectations? ©2010 C3 Associates, Inc.
  • 17. Understanding the reasons for failed projects requires an understanding of how ECM is different from other IT systems ©2010 C3 Associates, Inc.
  • 18. How is ECM Different? ECM is about managing information, not just storing it ECM is not just another technology implementation Users must understand not only how but why – change management and training are critical Requires different rules which may be used for all content or only certain content – governance is critical Requires an understanding of information lifecycle and context in which it will be used ©2010 C3 Associates, Inc.
  • 19. How is ECM Different? ECM is (perceived to be) optional Users have a choice ECM is not the same as an accounting system Done well, ECM can provide a significant competitive advantage ECM is everywhere Shared drives Email Formal ECM systems (75% use more than one1) Records management (physical and electronic) 1 2009 AIIM State of the Industry Survey ©2010 C3 Associates, Inc.
  • 20. How is ECM Different? ECM changes ingrained work habits File / Save As… Initially, can have a negative impact on productivity Can lead to pushback from end users and, through their bosses, to senior management Organizational benefits may be clear, but end user community may not see WIIFM (What’s In It For Me?) Impacts many business processes: Correspondence, AP/AR, Budgeting, Contracts, Maintenance, Marketing, Projects, etc. ©2010 C3 Associates, Inc.
  • 21. Common Challenges Underestimated the impact on business processes and organizational structures (esp. senior level sponsorship) Uneven usage due to poor procedures (inadequate governance) Did not train users appropriately (poor change management) Project derailed by internal politics Poor design or clumsy rollout Scope creep Underestimated effort to migrate content Poorly defined business case Taxonomy concerns (identified as #1 risk pre-implementation) Narrow focus Source: 2009 AIIM State of the Industry Survey ©2010 C3 Associates, Inc.
  • 22. What Success Looks Like and some ideas on how to get there ©2010 C3 Associates, Inc.
  • 23. Successful ECM has… A clearly articulated vision A statement of what is the ECM implementation trying to achieve that is aligned to the strategic objectives of your organization Our ECM Program supports increased sales by ensuring our information is accurate, timely and relevant for our customers and staff. The ECM Office provides strategy, processes and techniques to support information access, sharing, and security to put the right information in the hands of the right people at the right time. ©2010 C3 Associates, Inc.
  • 24. Successful ECM has… Clear ownership: Top-down and bottom-up support Ownership should be high enough up in the organization to ensure ECM gains traction Owner should be in the business, not IT Consider moving ECM group directly into the business rather than embedding in IT If no one steps up to own ECM stop until someone does Users demand ECM, support the implementation and associated process changes ©2010 C3 Associates, Inc.
  • 26. Successful ECM has… A high level of understanding of the toolset and related processes End users understand how, when and why to use the tool Excellent initial and ongoing training ECM onboarding process embedded in new hire orientation supported by an expert user community Well understood processes for new deployments No excuses for not using the tool ©2010 C3 Associates, Inc.
  • 27. Successful ECM has… An information architecture that supports the business Content is easy to find, easy to store Just enough metadata to easily find content but not so much that users won’t add it to documents 2-5 values is ideal, if more needed capture via inheritance or application integration Iterates and changes as the business evolves Single sourcing, little or no duplication of information ©2010 C3 Associates, Inc.
  • 28. Successful ECM has… A flexible and comprehensive governance model Usage policies and procedures are clear and well understood Information is as secure as it needs to be but not more secure than it should be Metrics are defined, captured and acted upon; expected benefits are understood and realized ©2010 C3 Associates, Inc.
  • 29. Governance in Action Use “guidelines” or “principles” rather than a heavy-handed approach Users appreciate options, more likely to use the system if they feel in control Still need some policies Taxonomy model (folder hierarchy) Drives metadata inheritance, retention and security Navigation is secondary Metadata model Easily adaptable and regularly updated ©2010 C3 Associates, Inc.
  • 30. Successful ECM has… A plan for Social Computing ECM platform is the backbone of your social computing effort (or is at least integrated with your chosen platform) Records retention is embedded in social computing strategy Governance group understands and supports collaboration objectives Collaboration team understands and supports governance obligations ©2010 C3 Associates, Inc.
  • 31. Successful ECM has… Transparent application integration Content-enabled vertical applications are seamlessly integrated with your ECM system Users are often interacting with your ECM system without even knowing it ©2010 C3 Associates, Inc.
  • 32. Successful ECM has… A bulletproof technical environment Very little if any downtime Fast response Redundant systems for critical content Intuitive user interface Responsive user support and development group ©2010 C3 Associates, Inc.
  • 33. Outcomes What you should expect from a successful ECM implementation ©2010 C3 Associates, Inc.
  • 34. Outcomes Significant reduction in volume of shared drive content Most or all shared drives should be set to read only or decommissioned entirely Email volume reduced significantly Users collaborate in ECM system, send links to content rather than attachments ©2010 C3 Associates, Inc.
  • 35. Outcomes Productivity goes up, compliance goes up Measurable increase in business performance Measurable decrease in adverse regulatory outcomes Measurable improvement in speed and comprehensiveness of responses to regulatory requests A lot less paper Critical files scanned, fewer physical files created ©2010 C3 Associates, Inc.
  • 36. Outcomes Information and records are retained for as long as needed but not longer Measurable decrease in time to complete disposition process Measurable reduction in cost of litigation / cost of eDiscovery Easy to place legal hold Discovery process streamlined ©2010 C3 Associates, Inc.
  • 37. Outcomes Measurable increase in knowledge sharing and collaboration Cross-functional groups are working closely together Risk reduced, efficiency increased, knowledge retention increased, business performance increased ECM practice continually improving Metrics identified, captured and acted upon ©2010 C3 Associates, Inc.
  • 38. Answer the following questions to assess the health of your ECM program. If you answer No to any of the following questions your ECM program is likely not meeting your stated goals. ©2010 C3 Associates, Inc.
  • 39.
  • 44. Bridget Saunders©2010 C3 Associates, Inc.
  • 45. Resources AIIM ERM Community http://www.aiimcommunities.com Information Zen http://www.informationzen.org 2009 AIIM State of the Industry Report http://www.aiim.org/Research/State-of-ECM-Enterprise-Content-Management-2009.aspx AIIM ECM Checklist http://www.aiim.org/ProductCatalog/Product.aspx?id=2094 C3 Associates ECM Blog http://www.c3associates.com/blog ©2010 C3 Associates, Inc.
  • 46. Thank You! Greg Clark greg.clark@c3associates.com B 403 775 4651 x100 C 403 863 5998 Web: www.c3associates.com Twitter: www.twitter.com/GregClarkC3 ©2010 C3 Associates, Inc.

Notas do Editor

  1. Ask who was here last time.