Top 5 Compliance Tips
To help your company lower its risk profile and boost audit and litigation readiness, we’ve developed a list of the top five things you can do today to make your information management practices a key contributor to ongoing compliance.
1. Retain, secure, dispose
Knowing what to keep — for how long — and how to store it are challenges for many companies. And when it comes to compliance, a single misstep can have significant and costly consequences. But the fact remains that with all of the information you create and distribute each day, you must recognise what’s critical and what’s just “in the way.” The best way to do this is to engage your company’s legal counsel to develop a formal, defensible retention schedule that accounts for information in paper and digital formats. This policy must clearly outline what should be kept and for how long — and be enforceable across the business. Putting in the hard work today will pay off in the long run by mitigating the financial and reputation risk associated with issues such as failed audits or inadvertent disclosures of sensitive information.
2. Don’t forget about destruction
Having a policy in place to securely destroy records after their useful lives is an important part of Records and Information Management (RIM) compliance. But what if a record marked for destruction is suddenly needed for discovery? If you can’t put a quick stop to this process, you may find yourself subject to fines and other penalties related to the inadequate preservation of records. Given the ramifications of failing to produce the appropriate records during litigation, it’s important that your RIM practice includes a formal destruction hold policy. And be sure to develop procedures — and leverage supporting technologies — that allow you to enforce the policy across the business. With this in place you’ll be able to suspend the disposal of any paper or electronic record that is relevant to a pending investigation or audit.
3. Hold electronic records to a higher standard
Because paper has been the norm for so long, it’s likely that your retention and discovery processes are in place for these records. But what about electronic information? As more and more business is conducted electronically, your policies must also account for information in this format. Be sure that all electronic information, regardless of where it lives — PCs, servers, backup tapes, mobile devices, USB’s and more — is included in your retention schedule. Clearly define what information is considered a record and develop policies and procedures to consistently and securely manage litigation holds and destruction when this information reaches the end of its retention period. In addition, ensure you have a clear process when it comes to eDiscovery and that you have a provider that can manage your data restoration requirements on these devices in a timely manner.
4. Provide start-to-finish security
Protecting information at all times is a key to avoiding risk. But when you aren’t sure when a record changes custodians, is put in a box or moved to tape media, keeping it secure for the long term can be quite the challenge. To solve this puzzle, make sure your workflows include an auditable chain-of-custody that documents every move a particular record makes. This way you’ll always know where a record is at any given point in time. Documenting chain-of-custody in this way will help you ensure the ongoing safety of your most critical records and avoid the potential of an inadvertent breach in information security — and the resulting fines and penalties.
5. Take a programmatic approach
While it’s great to have a comprehensive set of RIM policies, these are only as strong as the people charged with enforcing, updating and communicating them across your company. And without the right amount of accountability, there may be critical lapses in your day-to-day activities that lead to the unauthorised disclosure or destruction of sensitive information.
To minimise the chances that this occurs, think about information management as a comprehensive program defined by policies and procedures managed by a specific individual — as well as a steering committee that can apply and enforce responsibilities across the business. Putting the right people and processes in place to audit the program will help you determine if it remains aligned with all pertinent regulations. Building accountability into your information management processes in this way will go a long way towards strengthening your company’s compliance posture.
Featured services & solutions
Asset Lifecycle Management (ALM)
ALM helps protect not only your data and the environment, but also your bottom line
Iron Mountain Clean Start
Optimise space, reduce risk, and enhance sustainability
Document scanning and digital storage
Transform your business and centralize your information with digital scanning and storage