Document 11144711

advertisement
Digital Continuity:
An introduction
Digital continuity…
The ability to use your information in
the way you need for as long as
you need
Information is usable if you can…
• Find it when you need it
• Open it as you need it
• Work with it in the way that you need to
• Understand what it is and what it’s about
• Trust that it is what it says it is
It does make the headlines…
NatWest's IT meltdown
“NatWest owner, Royal Bank of Scotland,
has 40 years' experience running these
systems and banks as a rule don't drop the
ball like this”
The Guardian 25 June 2012
This happens in UK government too....
“The transition to the new system has,
however brought to light discrepancies
in our existing records and this is
resulting in a number of incorrect
notices being issued.”
“The only evidence beyond surmise
that Dept X rely upon to support their
assertion that the document is not
held, is their failure to locate it.”
“Transfer of records from Dept Y to
Depts Z and A has resulted in two
scenarios that have effectively
rendered metadata captured in the
EDRMS as lost.”
“Any electronic data degrades over
time. Some of this information is more
than 20 years old. I'm not even sure
that the xxx still has the tools needed
to retrieve data from that era. You're
talking about technology that would
qualify as museum pieces now.”
Digital information is vulnerable…
• Risks are inherent in
change
o Organisational change
o Technology change
o Process and policy
change in how
information is managed
The impact of change…
o information ownership becomes
unclear - risks are missed or
unmanaged
o information is not disposed of
appropriately
o information is not migrated to new
technologies effectively
o information is trapped in legacy IT
systems – or locked in a format that
can’t be opened or used
o information is no longer understood by
the organisation – or cannot be trusted
Why it matters…
o Efficiency and
effectiveness
o Transparency and
accountability
o Managing
information risk
Managing digital continuity…
Plan
for
action
Define
what you
need
10
Assess
and
manage
risks
Maintain
digital
continuity
The Digital Continuity Service…
• Guidance
• Risk Assessment Self-Assessment Tool
• Procurement Framework
• DROID
• Training
11
Stage 1: Planning
Managing digital continuity…
Plan
for
action
Define
what you
need
13
Assess
and
manage
risks
Maintain
digital
continuity
Plan for Action…
• Key roles understand risk and
responsibilities
• SRO for digital continuity
• Multi-disciplinary team
• Embed approach in business
as usual
Role of the SRO…
• Champion digital continuity
• Lead action to manage risk and embed
• Co-ordinate across disciplines
• Prioritise resources
• Escalate issues
Workshop 1: roles and responsibilities
Think about your own organisations:
• Who do you need to be involved in
managing digital continuity?
• What are their drivers for taking action
(what is in it for them)?
Roles and responsibilities…
• SIRO and information risk management
• IAOs
• Information assurance
• Information management
• Information technology
• Change and project management
Stage 2:
Define Requirements
Managing digital continuity…
Plan
for
action
Define
what you
need
19
Assess
and
manage
risks
Maintain
digital
continuity
Technical
Environment
Information
Assets
Digital
Continuity
Business Needs
21
Understand what information you
have and how it’s managed…
• What information do you have?
• Where is it?
• How is it organised and managed?
• Have you defined all your
information assets?
Understand what information you
have and how it’s managed…
• An information asset is a body of
information defined and managed as
a single unit so that it can be
understood, shared, protected and
exploited effectively
Understand how you need to use
your information…
• Who needs to be able to find it?
• What do they need to be able to open it?
• How do they need to work with it?
• Can they understand what it is and what it
is about?
• Can they trust that it is what they think it is?
Understand your technical
environment…
• What IT systems do you have?
• What is their lifecycle?
• What hardware are they reliant on?
• What is their lifecycle?
• What file formats is your information in?
• What storage media are you using?
Define what you need for digital
continuity…
Usable
=
complete
+
available
Documenting what you know…
• Information Asset Register
• Configuration Management Database
• Maintenance as important as capture
Workshop 2: defining what you need
Imagine you are doing a survey of your information
and the technology that supports it:
• What information do you need to capture?
• How can you maintain the relationships between
the information assets and technology?
Possible headings
• Name and description
• Lifecycle
• Owners and users
• Support and
• Retention period
• Usability requirements
• Technology
dependencies
warranties
• Dependencies and
relationships
• Owners and users
• Information assets
Stage 3:
Risks and Impacts
Managing digital continuity…
Plan
for
action
Define
what you
need
31
Assess
and
manage
risks
Maintain
digital
continuity
Risk to digital continuity is…
Anything that might stop you being able to…
• find
• open
• work with
• understand
• trust
… your digital information in the way that you
need for as long as you need.
Does the organisation understand how the technical
environment supports its information usability requirements?
Does the organisation rely upon legacy technology to deliver
information usability requirements?
Does the organisation rely upon bespoke technology to
deliver information usability requirements?
Does the organisation understand the value of its
information, both the financial and value to business?
Does the organisation already have digital information that is
over 5, 10 or 20 years old?
How long does the organisation need to keep its information
for?
Does the organisation manage the interdependencies of the
various elements within its technical environment?
Has the organisation assessed continuity risks to individual
information assets?
Is the organisation regularly testing for continuity of its
information assets?
Identify your risks (and
opportunities)…
• Do you know what information you have, where it
is, what it’s for?
• Does the way you manage your information and
IT environment keep your information usable as
you need?
• Are there opportunities to get rid of information
and technology you don’t need?
Risk assessment…
• You can assess your whole organisation
• You can assess risks to particular assets –
perhaps at point of change
• Regularly review and update risk
assessments
Workshop 3: risk assessing
DoRA…
• What is putting DoRA’s digital continuity at
risk?
• What are the impacts on using the
information?
• What are the impacts on the organisation?
• What can you do to reduce the risk?
• Feedback: one risk and how to mitigate it
Risk mitigation strategies…
• Consider your:
o
governance
o
policies and procedures
o
information and technology
• And test for continuity
Lunch 13:05-13:55
• Questions
• Networking
Stage 4:
Maintaining
Managing digital continuity…
Plan
for
action
Define
what you
need
42
Assess
and
manage
risks
Maintain
digital
continuity
Maintain your digital continuity…
• Plan for change
o Build your digital continuity
and usability requirements
into your plans and
processes
o Manage your IT and
information for future
flexibility and agility
• Manage digital continuity through change
o Change Projects to assess impact on
information
Workshop 4: technology change at
DoRA…
DoRA’s 15 year IT contract is coming to an end which includes
support for their EDRM, BlackHole 2.0
• Three choices of what to do now:
o Continue using BlackHole
o Buy a new service or system
o Allow business areas to investigate their own solution
• Assess the risk to digital continuity of DoRA’s information
from each option
• Identify potential mitigations in each case
Feedback - Decide what option you would choose and why
Assessing the risks…
•
•
•
•
•
•
•
•
•
Unsupported technology
Ageing technology
Interoperability/incompatibility
Migration
Usability
User acceptance
Governance
Customisation
All technology becomes legacy eventually
Workshop 5: digital continuity in
action
There are 8 mini scenarios based around various incidents
within DoRA. Each group will be given two of these to work
through – take 15 minutes for each
• Why did the incident happen?
• What actions (if any) can you take now to rectify the
problem?
• How can you stop this happening again?
Feedback – answers to these questions for one of your
scenarios
A crisis of contact
The Central Pole Vaulting Office needs
the contact details of an old employee to
get some key information on a previous
project to allow them to understand a
database. This kind of issue is being
raised with HR on a regular basis and is
causing problems.
A sticky situation
The Bee-keeping Regulatory department
have just called. They are trying to send
out the yearly ‘Bee-keeping licensing
evasion fines’ but the system is not
showing who has evaded buying a bee-keeping licence.
It looks as though, when the ‘Bee-keeping licence’ and
‘Bee-keeping investigation’ systems were integrated, the
information about who had kept bees this year was not
properly linked to information on who had bought a beekeeping licence. The old systems were deleted after the
integration so they don’t know who kept bees without a
licence last year.
A jarring loss of honey
data
A Public Inquiry into the decline of UK honey
production has given the departments twenty
days to provide information on the
development of the statute that currently governs beekeepers. Nine years ago the information was transferred
between EDRM systems and the user generated
metadata was lost. The staff who understood this
information have now left the department.
The
department cannot understand the information it has and
cannot identify what to send to the inquiry.
A pole vault to nowhere
Staff working on the Pole Vaulting Review
project contact the IT helpdesk looking for
information missing after they saved it in
their My Documents folder rather than in a
corporate, managed information store. My
Documents folders are not backed-up and
the IT helpdesk are unable to recover or
restore the lost information.
An information black hole
DoRA has received an FOI request for
the
Spock
Report
which
was
commissioned in the late 1980s. An initial
exploration of DoRA’s information stores
proved fruitless. DoRA should have
inherited the information when it took on
responsibility for space exploration
around five years ago but there is no
record of what was transferred. The FOI
team suspect that the information is held
somewhere and are not sure how to
proceed.
Look before you leap
Two pole vaulting associations have
been accused by the Pole Vaulting
Standards Authority of foul play and
collusion. They must provide emails
from a specific date for the court case.
They are unable to do so as the files
were corrupted when they were moved
to a new system.
Lost in space
The Office of Outer Space Photography
is continuing to use a digital tape format
which can no longer be produced and
for which manufacturer support has
been withdrawn. They routinely transfer
data from this format onto lower quality
storage. This results in some data
quality loss for the organisation.
No knowledge-transfer
The Minister needs some information
collected in the 1990s as part of the
National Honey Bee Survey. The
information is held on an old, password
protected system. You have just
discovered that the only two people who
held the passwords have died in a bee
related incident and now you cannot get
into the system.
Final Thoughts
What to do now…
1) Find out more about digital continuity
2) Find out more about your
organisation
3) Build bridges and ask questions
4) Manage digital continuity as a key
information risk
5) Advocate and influence upwards
What to take home with you…
1) Ownership is important
2) Cross-disciplinary approach
3) Prevention not restoration
4) Focus on information usability
5) Embed in operational processes
And how we can help…
• Guidance
• Risk Self-Assessment
Tool
• Procurement
Framework
• DROID
• Advice
58
And how we can help…
• Guidance
• Risk Self-Assessment
Tool
• Procurement
Framework
• DROID
• Advice
59
And how we can help…
• Guidance
• Risk Self-Assessment
Tool
• Procurement
Framework
• DROID
• Advice
60
And how we can help…
• Guidance
• Risk Self-Assessment
Tool
• Procurement
Framework
• DROID
• Advice
61
And how we can help…
• Guidance
• Risk Self-Assessment
Tool
• Procurement
Framework
• DROID
• Advice
62
And more training…
14th November
The National Archives, Kew
Digital continuity…
The ability to use your information in
the way you need for as long as
you need
And how we can help…
nationalarchives.gov.uk/digitalcontinuity
Information.management@nationalarchives.
gsi.gov.uk
Download