Close this Advertisement
Login | Register

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
spacer
  • Magazine
    • Current Issue
    • Archives
    • Free Subscription
    • Subscription Services
  • Events
    • 1105 Government Information Group Events
    • Federal 100
    • FCW Executive Briefings
    • FOSE
    • GOVSEC
    • Industry Events
  • Blogs
    • Acquisitive Mind
    • Circuit
    • FCW Insider
    • Government 2.0
    • Inside DOD
    • John Klossner
    • The Lectern
    • Management Watch
    • Works in Progress
  • Community Awards
    • 2012 Federal 100
    • 2012 Rising Star
  • Subscribe
    • Magazine
    • Newsletters
    • RSS
  • Webcasts
  • Content Libraries
    • Digital Libraries
    • Whitepaper Library
  • Resource Center
    • New! Special Report: Cloud Services
    • New! Expert Q&A: Cloud Computing
    • Special Report: Converging Communications
    • Special Report: Modernizing the Network
    • Special Report: Cybersecurity
    • Contract Guide: NITAAC
    • Expert Q&A: Big Data
    • Special Report: Client Computing
    • Special Report: Advancing Agency Infrastructure
    • Expert Q&A: Continuous Monitoring
    • Contract Guide: SEWP 2012
    • Special Report: Defense IT
    • Special Report: Cloud Computing
    • 2012 Special Reports
  • About Us

  • Printable Format
  • E-Mail this page
spacer Embed
spacer

COMMENTARY

4 crucial steps to manage data

  • By Jim McGann
  • Jul 06, 2012

Jim McGann is vice president of information discovery at Index Engines, an e-discovery provider based in New Jersey.

Managing data according to ever-changing regulatory and compliance policies is complex. Enormous volumes of sensitive files and e-mail messages are scattered about every organization. That data flows through massive networks and is clustered away in proprietary repositories and archives, which makes access even more of a challenge. As a result, information management strategies are nearly impossible to design and deploy.

Government agencies in particular face information management challenges every day. The related regulations require detailed knowledge, access, reporting, and management of user data and e-mail in order to remain compliant.

Those policies and regulations have motivated government agencies to rethink how they manage user files and e-mail. Agencies need to understand what data exists, develop a plan to manage it, and take action to protect the organization from long-term risk and liability. Here’s how your organization can create a sound and flexible platform that can adapt to new strategies and environments.

1. Find out what you’re dealing with. Knowledge is crucial to creating sound information management and compliance policies and to meeting the demands of initiatives such as cloud on-ramping, intelligent management of big data, deduplication strategies, e-mail categorization, data retention and e-discovery, information governance, and more.

To better support those initiatives, you must know what you have and where it is so you can then take the appropriate action. Data resides on desktops, networks, servers and repositories that are dynamic and constantly changing. That primary data and the legacy data that has been archived on backup tapes created for business continuity are all important sources of content.

Understanding user files and e-mail across the entire network is crucial to developing and applying policies. Without detailed knowledge of the content, creating a sound policy is overwhelming, and executing it is impossible. Understanding and profiling that data will drive efficiency and management of the content.

2. Map it out. Data mapping allows government agencies to determine the locations of sensitive data and develop a sound policy and logical plan of action. A data map can provide information such as the age of the data, when it was last accessed or modified, the owner, the location, an e-mail message’s sender and receiver, and even keywords. A data map will deliver the knowledge required to make “keep or delete” decisions for files and e-mail messages and can help you act on those decisions by defensibly deleting what is no longer required and archiving what must be kept.

  • « previous
  • 1
  • 2
  • next »

Related Articles

  • Defining the role of technology in fighting waste, fraud, abuse09/06/2012
  • Big data: How much is enough?07/17/2012
  • Big data presents unique challenges to agencies06/22/2012
  • Agencies still struggling with electronic records management, NARA report shows05/01/2012
  • Federal 100: Col. John F. Schrader03/28/2012

Share this Page

  • LinkedIn
  • Facebook
  • Twitter
  • Google
  • Slashdot

Reader comments

Add your Comment

Your Name:(optional)
Your Email:(optional)
Your Location:(optional)
Comment:
spacer Please type the letters/numbers you see above