Ten to start

Departing from the standard format, here are ten information-governance-related items from today’s Wall Street Journal:

  1. Unanswered questions on causes of power surges that melt equipment at new NSA storage facility.  Is hacking taking a new approach? But the point here is that the investigation has been going on for 13 months without definitive results.  What happens when you can’t timely find the information you want? A1 http://on.wsj.com/17kdW88
  2. Airline fails to block 9-year old from boarding flight without a ticket.  How many controls failed?  Why?  Does this presage a new level of checks? Doesn’t sound like a process problem as much as a human failure or breach of process. A3 http://on.wsj.com/GLR9Mp
  3. ACLU fights muzzle on Fast and Furious book by agent. Aren’t there contractual prohibitions on book publications by present and former agents? Weren’t there some for SEALs? As long as the agent just writes from his or her memory, and doesn’t use any government documents, is this using the government’s information inappropriately?  Even if the book merely harms relationships with other agencies.  What if it were one of your employees?  Or is it a First Amendment issue because it’s the government? A6 (I can’t find this in the online version, but here’s another source.  http://abcn.ws/19xtDQ1)
  4. Governmental spying from our neighbors to the North.  Canada was apparently spying on Brazil, too.  Isn’t commercial espionage just something governments do? Round up the usual suspects. A11 http://on.wsj.com/1fXxh9F
  5. Samsung seeks to buy software to compete with other phone and TV suppliers. This is one of the other views of knowledge management, which includes inventorying the knowledge you have (and who has it) as well as the knowledge you need but don’t have (but others might).  And what is knowledge but a subset of information? B1 http://on.wsj.com/1fXxny0
  6. Subpoena to online service for names of people renting rooms in their apartments to out-of-town visitors (and perhaps not paying taxes on the income or otherwise comply with law).  Is this a privacy issue or a compliance with law issue?  Or a new source of revenue? B3 http://on.wsj.com/GFqxwY
  7. “Upgrading Data Safeguards.” B6  Changes in security standards upcoming for Payment Card Industry. Sets a baseline for processes and device security. http://on.wsj.com/15TGF9G
  8. Canada blocks sale of phone company (Allstream) to Egyptian owner for national security reasons. B6 http://on.wsj.com/1a8fggi
  9. What “I” says about you.  D1.  http://on.wsj.com/15YvAPs The content of your speech speaks volumes about you – too much use of “I” can make you less powerful. Not to make a point about narcissists, but to focus some thought on the content of messages and the impact on the listener/reader.
  10. 3 indicted for theft of software code. C3.  Information has value, and an owner, and requirements. http://on.wsj.com/1bFdARS

There were more.


Leave a comment

Filed under Business Case, Content, Controls, Data quality, Definition, Governance, Information, Internal controls, Knowledge Management, Ownership, Privacy, Protect assets, Requirements, Risk, Security, Use, Value

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s