Category Archives: Operations

Moneyball 2

“The Mariners; Big Data Experiment,” The Wall Street Journal, March 27, 2018 A14. Data leads to moving a star player from shortstop to the outfield.

Maybe not a big Information Governance or Compliance piece.  But interesting use of information.

Advertisements

Leave a comment

Filed under Analytics, Collect, Data quality, Information, Management, Operations, Use, Use, Value

Blockchain

What does blockchain have to do with information governance?

It’s early days yet, but think about what happens with information.  It gets created, modified, transferred, stored, used, reused, exchanged, and, hopefully, deleted at the end of its life.  Would it be useful to be able to track who owns the information and where it is at each step of its life?  Is a piece of information that much different than a cargo container being tracked from origin to destination?

Just saying.

“Blockchain Has Power to Transform,” The Wall Street Journal, March 12, 2018 B4.

Leave a comment

Filed under Access, Accuracy, Analytics, Controls, Governance, Information, Interconnections, IT, Operations, Supervision, Technology, Third parties, Use

What do you have and where do you have it?

The title of this post is a common question asked in the Information Governance arena.

“Freight Tracker Adds Funding In Hot Market,” The Wall Street Journal, February 21, 2018 B4.  Expansion at company that tracks where shipments are and when they will arrive.

Clearly, this information on a real-time basis is valuable to shippers and customers.  Is there a difference between the value of the information (where the shipment is) and who owns that information?  Or is it just who can profit from collecting and reporting the information?  Who would have thought an entrepreneur would monetize this, rather than the companies handling the shipments?  Did the shipping companies not realize the value of an asset they had?

Leave a comment

Filed under Access, Data quality, Information, Operations, Use, Value

Reparations

What do you do when your website goes down for two hours, preventing customers from accessing their accounts?

“Fidelity Seeks to Make Amends for Website Glitch,” The Wall Street Journal, December 2, 2017 B11.  Company offers commission waivers and to discuss pricing adjustments.

Does your business continuity plan have a chapter on how to serve your customers?

Leave a comment

Filed under Access, Business Continuity, Duty of Care, Governance, Operations, Oversight

Cybersecurity

Cybersecurity involves protecting the enterprise from internal or external attack and responding after the enterprise has been attacked.  How do you ensure your business continues to operate if its cybersecurity is breached?  It’s not just sending notices to affected customers and paying for credit watches.

“Banks Create Cyber Doomsday System,” The Wall Street Journal, December 4, 2017 B1.  By requiring banks and credit unions to back up their data so that operations can be restored after a breach.  This also protects confidence in the overall banking system.

Do you have a business continuity plan?  Does it address how you will access your critical information so that you can continue to operate?

What’s surprising is that this is newsworthy.

Leave a comment

Filed under Access, Board, Business Case, Business Continuity, Controls, Corporation, Directors, Duty, Duty of Care, Governance, Information, Interconnections, Internal controls, IT, Operations, Oversight, Protect assets, Protect information assets, Security, Value

Rogue employees

What do you do when a rogue employee decides to express his or her politics by messing with your product?  Could that affect your brand?

No, this isn’t about the NFL.

“Twitter Tightens Security,” The Wall Street Journal, November 4, 2017 B3.  Security lapse allows a departing and now former Twitter employee to shut down President Trump’s Twitter feed for eleven minutes.

Cybersecurity focuses not only on external hackers but also internal bad-deed doers.  Sometimes, even well-designed security plans fail.  But those third-party plans are protecting your information in their control.

Do you have special controls for special celebrity cases?  Do you take extra steps for departing employees?

Not sure Twitter is a brand.

1 Comment

Filed under Access, Business Continuity, Controls, Corporation, Duty, Duty of Care, Employees, Governance, Internal controls, IT, Management, Oversight, Protect, Protect assets, Security, Supervision

Kobe (3)

The adventure continues, after Kobe Steel announced earlier this month that workers at several different facilities had fudged paperwork on product quality, dating back to at least 2007.  Apparently, getting that type of paperwork accurate is important.  To someone.

“U.S. Looking Into Kobe Steel Scandal,” The Wall Street Journal, October 18, 2017 B3.  Department of Justice kicks off a request for information after company disclosures about practices in Japan. Affects product sold into manufacturers of train, planes, and cars.

More to follow.  Expect Congress to weigh in shortly.  Again, the problem occurred in more than one facility, over a period of years.  Is that a failure of compliance, or culture, or both?

An example of the intersection of governance, compliance, and information.

Leave a comment

Filed under Accuracy, Compliance, Controls, Corporation, Culture, Data quality, Definition, Duty, Duty of Care, Employees, Governance, Information, Internal controls, Oversight, Reliance, Use, Value