PREVENTING THE NEXT GLOBAL PRIVACY BREACH: BEST PRACTICES FOR DATA DISCOVERY White Paper Flashcards
Enterprises have significant concerns about storing business data outside the walls of their enterprises, due to a number of reasons
Perceived risk that data is more vulnerable, increasing risk of inappropriate access
Non-employee IT administrators possessing a high level of access and control over information
Technology choices and complexity associated with authentication and authorization
Regulations around data sovereignty
Best practices when using file analysis solutions-STEP 1: CLASSIFY YOUR DATA
An example of a common data classification schema is data must be classified as public, internal, sensitive, or restricted. The classification of the data dictates its disposal method. This does not have to be completed as an all-or-nothing effort, but rather can be done through a phased approach and as part of an initial “discovery” project across a limited scope of data to help build the business rules that can then be disseminated across the organization’s data repositories.
Best practices when using file analysis solutions-STEP 2: DETERMINE RETENTION SCHEDULE
Region and government-specific laws and regulations, requirements of accrediting and other external agencies, and prudent management practices govern the retention and disposal of organizational records
Best practices when using file analysis solutions-STEP 3: ASSIGN HISTORICAL VALUE
In some instances data ready to be disposed may contain information with enduring legal, fiscal, research, or historical value, and should be retained and preserved indefinitely.
Best practices when using file analysis solutions-STEP 4: DISCARD FILES
Hardest Step to follow through on, but once started it becomes easier to let go digital content no longer used by the organization