Information Governance, information privacy issues concerns, and strategies

Scenario:

You have recently been hired as a Chief Information Governance Officer (CIGO) at a large company (You may choose your industry). This is a newly created position and department within the organization that was founded on the need to coordinate all areas of the business and to provide governance of the information. You will need to hire for all positions within your new department.

The company has been in business for more than 50 years and in this time has collected vast amounts of data. Much of this data has been stored in hard copy format in filing cabinets at an offsite location but in recent times, collected business data is in electronic format stored in file shares. Customer data is being stored in a relational database, but the lack of administration has caused data integrity issues such as duplication. There are currently no policies in place to address the handling of data, business or customer. The company also desires to leverage the marketing power of social media, but has no knowledge of the types of policies or legal issues they would need to consider. You will also need to propose relevant metrics that should be collected to ensure that the information governance program is effective.

The CEO and Board of Directors have tasked you to develop a proposal (paper) that will give them the knowledge needed to make informed decisions on an enterprise-wide Information Governance program, addressing (at a minimum) all of these issues, for the company.

Requirements:

The paper should include at a minimum of the following sections:
Title page
Executive Summary (Abstract)
Body
i.Introduction
ii.Literature review
iii.Program and technology recommendations. This will include your comprehensive description of the industry, your annotated bibliography, and the following:
Metrics
Data that matters to the executives in that industry, the roles for those executives, and some methods for getting this data into their hands.
Regulatory, security, and privacy compliance expectations for your company
Email and social media strategy
Cloud Computing strategy
Conclusion
References

Sample Solution

ACED ESSAYS