STOCK TITAN

Your Guide to Defining an Information Governance Policy

Rhea-AI Impact
(Low)
Rhea-AI Sentiment
(Neutral)
Tags
Rhea-AI Summary

Qualcomm emphasizes the importance of an effective Information Governance (IG) policy in today's digital landscape, where organizations face increased risks of cybersecurity threats. Key considerations for establishing a robust IG policy include identifying what needs protection (such as Personally Identifiable Information and Company Confidential Information), determining who can access this data, and specifying how it can be accessed. The right workflow solutions are essential for balancing security with usability, particularly for sensitive documents often contained in Microsoft Office files. Qualcomm offers solutions, including DirectOffice Document Conversion Software, that facilitate secure document handling and viewing without compromising information governance. This approach helps organizations protect sensitive data while maintaining productivity.

Positive
  • Qualcomm's emphasis on IG aligns with increasing digital transformation needs across industries.
  • DirectOffice Document Conversion Software enhances document security while improving user access and productivity.
Negative
  • None.

NORTHAMPTON, MA / ACCESSWIRE / April 26, 2023 / As more industries seek digital transformation - adopting conveniences such as cloud-based connectivity, frictionless operations, and more - their vulnerability to potential threats increases. When it comes to protecting sensitive information, is your company well-equipped to prevent email phishing scams, cybersecurity threats, and other attacks by bad actors?

While sharing and collaborating on information assets is essential to streamline workflow within an organization, it's imperative to ensure that any shared information is only accessible by people who need to see it and that it is managed correctly. An information governance policy assures that not only is your company's most confidential data protected, but also that of every department and individual employee.

What factors must be considered when defining an organization's information governance (IG) policy? There are three main considerations that go into a strong IG policy approach:

1. WHAT needs to be protected?

Information that needs to be protected can be placed in one of two categories:

  • Personally identifiable information (PII)
  • Company confidential information (CCI)

Both sets must be protected, but for different reasons.

PII: It is a company's responsibility to protect the personal data of their employees and customers. There are now laws, such as Europe's General Data Protection Regulations (GDPR) and the California Consumer Protection Act (CCPA) that require such PII protections, safeguarding individual's interests and privacy.

CCI: It is a company's responsibility to protect its own sensitive data. There are myriad reasons that a company's private information stay in-house, the most important being to keep that data away from competitors or those looking to hurt the company. CII protections work to guard company interests.

2. WHO can access the protected data?

Locking away data certainly secures it, but the data serves very little purpose if need-to-know users cannot properly access it. This is where group access lists and Digital Rights Management (DRM) come in handy. Ensuring only true stakeholders have access minimizes the chances that private company information ends up in the wrong hands.

3. HOW can the protected data be accessed?

Policy creators must consider the following questions: Can the users only review the information, or can they also alter the information? Can they download the information locally? Administering user roles can help with this - certain users can read, other users can modify, and so on.

Implementing a sustainable information governance policy

Once an IG policy has been defined, it's up to those implementing it to choose workflow solutions that meet the requirements of the policy. Weighing the usability of these solutions against how closely they adhere to the IG policy can be a bit of a give and take. The more secure a solution is, the more complicated it might be to administer or the more difficult it might be to use productively.

One area where solutions can offer both information security and solution usability is document viewing. Both CCI and PII are often found in Microsoft Office documents. Think about a financial spreadsheet, an applicant resume, and a product design document. These three documents are from three different areas - finance, human resources, and product development - but all contain CCI and/or PII. Selecting solutions that allow for secure storage of these kinds of documents, while limiting the access to these documents only to those who need to see them, certainly supports any well-defined IG policy. And if these solutions also provide a consistent way to view and work within these documents, that's also a usability win.

On the other hand, solutions that store documents, but don't provide a way to view them, not only impact productivity, but may encourage violating the IG policy. For instance, consider a Microsoft Word document containing patent submission information saved securely within a product lifecycle management solution in the cloud. This information is safe - access to the document within the solution is limited. But what happens when someone with access wants to see the information?

They click on the file within the solution and instead of opening a viewer, a copy of the file is downloaded locally to their personal computer so they can open it. If this process is repeated by everyone who needs to access this document, that is a tremendous waste of time. But worse yet, there are now dozens of copies of this document and the information contained therein on different systems. Is the information still secure? What if someone prints the document? Or sends it to personal email or personal cloud storage? Now that there are dozens of digital duplicates, the chances of this information leaking are now a lot higher. This can be avoided with a single solution that not only stores data, but also manages access among users.

Considering solutions that support information governance

The fact is that every day, Microsoft Office files are shared by millions across all vertical industries and markets - and these files frequently contain sensitive data. Setting an IG policy that moves these kinds of documents to limited distribution within workflow tools is a start. But from there, organizations must consider how users are allowed to access the documents to further limit the number of copies of these files. These documents must also be viewable within the solution to prevent users downloading them or attempting to access them by any other means.

Workflow solution providers can feel confident their products meet customer expectations around protecting CCI and PPI by implementing an inline viewer like Qualcomm DirectOffice Document Conversion Software, which ensures that documents are quickly converted and accurately displayed right within the solution.

Check out Qualcomm DirectOffice to see for yourself how it works

Qualcomm, Wednesday, April 26, 2023, Press release picture

View additional multimedia and more ESG storytelling from Qualcomm on 3blmedia.com.

Contact Info:
Spokesperson: Qualcomm
Website: https://www.3blmedia.com/profiles/qualcomm
Email: info@3blmedia.com

SOURCE: Qualcomm



View source version on accesswire.com:
https://www.accesswire.com/751371/Your-Guide-to-Defining-an-Information-Governance-Policy

FAQ

What is Qualcomm's recent press release about?

Qualcomm's press release discusses the importance of establishing a strong Information Governance (IG) policy to protect sensitive data from cybersecurity threats.

What are the key considerations for an Information Governance policy according to Qualcomm?

The key considerations include determining what data needs protection, who can access it, and how it can be accessed.

How does Qualcomm's DirectOffice help with information governance?

Qualcomm's DirectOffice Software supports secure viewing and handling of documents, helping organizations maintain information governance while ensuring productivity.

What types of information does Qualcomm suggest protecting?

Qualcomm suggests protecting Personally Identifiable Information (PII) and Company Confidential Information (CCI) as critical components of an Information Governance policy.

Qualcomm Inc

NASDAQ:QCOM

QCOM Rankings

QCOM Latest News

QCOM Stock Data

177.05B
1.11B
0.1%
80.14%
2.08%
Semiconductors
Radio & Tv Broadcasting & Communications Equipment
Link
United States of America
SAN DIEGO