Five Data Governance Matters To Address In 2013


It is 2013, and time for a bit of tough love. Here are five data governance matters that need your attention as soon as possible.

1. Enough of the Unencrypted USB Keys. December 2012 ended with Human Resources and Skills Development Canada reporting that a USB key containing personal information of Canadians had gone missing. Just months before, Elections Ontario apparently lost USB keys containing unencrypted personal information of Ontarians. The use of unencrypted USB keys to store or transfer personal information or any confidential corporate information is the number one practice that organizations should address in 2013. The solution is not overly complex. Just stop it already! And, also make sure that subcontractors don’t use unencrypted USB devices when handling your data.

2. BYOD is Here to Stay; Stop Pretending Otherwise. Employees are coming to work with their own smart phones, laptops, tablets, and other devices. There is no point pretending that employees don’t have proprietary rights and privacy rights in these devices with heavy-handed and unworkable policies on their use. But turning a blind eye to the fact these devices may introduce security risks and can be used as unencrypted USB keys is also not an option. It is time to develop a workable policy. Be clear with employees regarding appropriate use. Audit compliance. If your organization is of sufficient size, it may be a wise investment to employ a “show me – don’t just tell me” policy. Invest in a video showing proper use of these devices and, perhaps more importantly, the cost and consequences of improper use. If it is a condition of BYOD that the organization be able to wipe the whole device remotely, consider illustrating what that is going to mean so that employees understand that they may lose data that they consider to be theirs and that is not backed-up.

3. End the Denial About Your Website Data Collection. You know that part of the website privacy policy that says the organization doesn’t share personal information with third parties? Or, the bit about how the organization only uses information for the purposes described in the privacy policy? Saying it doesn’t make it so. Chances are that even in an organization with very good privacy practices this statement is not 100% accurate, particularly if the organization is engaged in on-line advertising, uses third-party website analytics services, or has third-party content on its site. These activities may involve the transmission of personal information about the user without the knowledge and consent of the individual. If staff in the marketing and technology departments say there is no personal information being shared, ask whether any non-personal data is being shared. Ask what that that non-personal information is. There is a decent chance that some of the data being shared is data that a Canadian Privacy Commissioner would consider to be personal information.

4. Stop Ignoring Unstructured Data; It Might Be Your Achilles’ Heel. Data privacy policy? Check. Records retention policy? Check. Litigation hold procedure? Check. Wait, what’s that? Your organization is using social media. Employees are storing documents in electronic and physical files that are not saved in a centralized repository with pre-defined fields or labels. All of this unstructured data is probably falling outside of the organization’s procedures and policies for dealing with the collection, use, retention and destruction of information. Unstructured data doesn’t need to be the weak link, provided that it is not ignored. It is time to start tackling why employees are using unstructured files and responding with solutions that can address the usefulness of the unstructured data while managing its risks.

5. Really, Why is “That” Confidential? Yes, yes, everything about the organization’s business is confidential. Except that half of it is on the corporate website or in public filings and everyone in the organization with a user ID has access to the other half of it. Okay, I’m being deliberately provocative. However, this one also falls in the category of “saying it doesn’t make it so”. If information is confidential, then there should be many contextual clues so that employees are re-sensitized to the need to protect the information. Limiting access, requiring higher levels of clearance and training, using watermarks to establish the custodian of the information, having properly labelled and locked shredding containers, all contribute to better information security practices by providing employees with contextual reminders of the importance of information security and confidentiality.

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Dentons | Attorney Advertising

Written by:


Dentons on:

Readers' Choice 2017
Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.