ライフサイクルを通してデータを管理する

データのライフサイクルには3つの重要なイベントがあります。 作成、使用、および削除です。 それ以外のデータは保管するだけでリスクがともないます。そこでデータの5S活動、整理整頓が必要となってきます。

そもそも多くの組織は、構造化されたデータおよび紙での記録のみにILMプロセスを適用しています。 構造化されていないファイルサービスは、そのオープンな性質のゆえに、コンテンツのダイナミズムが脅かされています。

非構造化データには、一貫した論理フレームワークが適用できます。 データを作成し、使用しているユーザや組織単位によるプロアクティブなデータ管理が鍵となります。 ファイルの分類や、ファイルの重複削除などの情報ライフサイクル管理プロセスを、ビジネスユーザに適用することにより、組織はILMのプラクティスを非構造化データフットプリントにマッピングできます。

ライフサイクルのどこにデータがあるのかを理解することで、コンプライアンス、保護、価値の実現を改善します。

理解したあとは実践です。よく職場環境などで使われる5S活動を保持しているデータにも考え方を適用してみましょう。不要なデータをそのまま保持していませんか?どんなデータが不要なのかは作成した本人や利用している人しかわかりません。ベストな方法は本人に整理整頓をさせることです。

Useful Resources

ILM

データの内容や目的から遠い別の組織機能によって受身的に管理するのではなく、完全に組織の業務慣行に統合されたワークフローで、関係するステークホルダーが細かいレベルまで効率的にデータを管理できます。

ビジネスユーザ

現在のポジションから異動した同僚または部下は、そのデータのライフサイクルの最後まで対応できません。関連する孤立したデータは、進行中のアクティビティに再組み込みできます。これは、無視されるのではなく、価値が認識されるということです。

IT 管理

組織のデータ通るライフサイクルのステージと、それぞれの段階にある現在のデータの量を明確に理解することで、より効率的なファイルサービスデザインが可能になります。

CDO

データの価値は時間によって変わります。ファイルのライフサイクルのどこにあるのかをより正確に把握することができれば、その価値をよりよく顕すことができます。

データコンプライアンス

ライフサイクルを通じてデータのプロアクティブな管理を促進するための組織文化を適用すると、データのコンプライアンスが向上します。

データガバナンス

データ管理を理解し、効率的に責任を負うことができるユーザは、データの品質も保証できます。

Northern Parklife icon

Let’s take control over your data management

We accelerate the goals of growth stage companies by providing the expertise and experience they need to hit their next stage of growth faster.

Looking to include unstructured data in ILM practices?

Unstructured data, as one of many information repositories within the organization, is traditionally the most difficult to incorporate into ILM (Information Lifecycle Management) strategies.

The principles of ILM call for information to be prioritized based on its value, for important information to be carefully preserved, and for information to be discarded when it is no longer relevant – with compulsory deletion now a legal requirement. The difficulty in applying these principles to unstructured data lies in the granularity of the decisions that need to be made, often requiring each file to be considered individually.

Organizations are looking to ILM as a unified approach to critical data management needs, most prominently data governance, data compliance and data protection. By managing unstructured data through its life-cycle the organization is able to improve data value realization, achieve regulatory compliance, and close data loss vulnerabilities.

Northern’s Solution

Using a combination of programmatic and owner-driven data management, organizations are now able to map their ILM practices into their unstructured data footprints.

Northern’s Data Stewardship Tracking solution area enables the establishment of a system of data responsibility; designating relevant individuals within the organization as Data Stewards. These Data Stewards are given responsibility for the files created within their team, department or project. Through the Distributed Data Management solution area, these individuals are then provided with access to a self-service portal that offers dashboards designed to allow them to fulfill specific ILM tasks.

The benefits

For every organization, unstructured data represents both a source of value and significant risk. By incorporating unstructured data into ILM practices organizations are able to better realize latent value and mitigate hidden compliance or data loss vulnerabilities.
  • Compulsory deletion of data after retention periods have expired is a legal obligation. Incorporating unstructured data into existing ILM practices is a sound approach to ensuring legally compliant data retention practices.
  • By involving users close to the data, those who have the best knowledge of the information type and value, organizations are able to resolve the challenges of needing to make granular decisions when mapping ILM strategies to unstructured data.
  • Unstructured data can be extremely transient with files quickly created, used and then forgotten. File importance can also be extremely long-lasting, as in the case of engineering drawings, contracts or medical records. Proactive management of this data throughout its lifecycle is critical if data footprints are not to become unusable and if legal non-compliance is to be avoided.

Struggling to make the most of the files your team members leave behind?

When a colleague or subordinate leaves your team knowledge about the files they created and used leaves with them. Orphaned files are most often ignored and allowed to accumulate as employees come and go. This strategy leads to cluttering of shared storage, to valuable data being lost and to duplication of effort.

Having users review and organize their files before transitioning out of your team or department ensures that value is protected; that the wider team can easily incorporate work done in future efforts. Additionally, being able to review the files created and used by former colleagues or subordinates, after they depart, can give valuable insight and enable further latent value to be identified.

Northern’s Solution

User off-boarding is an important milestone in the lifecycle of information created by that user. Some files should be deleted, some relocated and ownership should be transferred for files that are to be kept.

Northern’s Distributed Data Management solution area allows both the user themselves, prior to exit, and/or the user’s manager or relevant Data Steward to review and act on the files belonging to the exiting user. Working with summaries and filtered file lists, in a self-service portal, these data management activities are efficiently and accurately carried out.

The benefits

User-generated data represents the intellectual property, strategies, research and ideas that drive the development of the organization. Implementing a workflow that ensures the value of a user’s files is not lost when the user transitions out of a team or department has significant benefits:
  • Remaining group members are not forced to re-create documents, spreadsheets or presentations that are hidden or lost in a cluttered file share or suspended home share.
  • Team agility is improved when important files are correctly located and appropriately named; they can be quickly identified and used in relevant on-going activities.
  • Knowledge of file importance can degrade very quickly after the file owner leaves the group. Working with this data set immediately prior to, or just after, the user transitions out enables granular decisions to made very easily. The longer the task is left, the greater the risk that sensitive and restricted data is allowed to accumulate, unnoticed.
Contact Us