Risk & Compliance Matters

Tame the Data Monster with a Prioritized Threat List

The more things change, the more things stay the same. As compliance matures as an industry, we sometimes forget the foundational best-practices that our programs are built upon. Every last Friday of the month, we revisit some of our most educational posts from the past. We think you’ll find they are just as relevant today.

Originally published October 2017


You’ve just been sued. Your first thought might not be about data, but your second or third one should be.

There were an estimated half-billion internet-connected devices joining global networks last year and today employees are communicating through everything from the corporate email system to Snapchat.

Information is the lifeblood of the modern corporation, but it can also be its Achilles heel. Terabytes of business critical data can turn into potentially incriminating evidence when scattered across thousands of connected devices. This can cripple an organization if it gets dragged into a high-stakes lawsuit or government investigation. That’s why key departments and positions within your organization need to know where critical data is at all times and the specific pathways to retrieve that data on demand. This archival and retrieval process should also be well documented, so that in the unfortunate case when data is missing, you’ll have a defensible argument for why it cannot be produced.   


Read More: When It Comes to Documentation, Smart Companies Behave Like Every Day Is Audit Day


The stakes are higher than ever and the playing field gets bigger each day. There were an estimated half-billion internet-connected devices joining global networks last year and today employees are communicating through everything from the corporate email system to Snapchat. Throw in the explosion of Internet of Things (IoT) devices, each creating its own little evidence trail, and you need a comprehensive data strategy five minutes ago.

Start With a Data Threat List

 

 

First, make the problem manageable. Start by identifying your top three worries. For a manufacturer, this list might include data that could wind up appearing in a product liability lawsuit. For an internet startup, it might concentrate on human resources. Whatever your worries are, rank them in priority based on the potential damage they can do to your organization.

Next, based on your level of concern, start examining where the critical data is generated and stored. What information are you creating, and for what purpose? How about vendors and outside contractors?

In answering each of these questions, keep in mind the elements below:


White Paper: Cyber Security Best Practices - The Ethics and Compliance Effect


Contain the Problem with Your Compliance Ecosystem

If you have a well-designed compliance ecosystem, including a data retention policy that is monitored and enforced and regular reports to the board of directors, you can get a handle on these proliferating threats. And in the U.S., at least, judges and regulators are far more likely to cut you some slack when the almost inevitable mistake occurs and stray information evades the first sweep of the subpoena duces tecum (discovery order, in plain English).

It’s impossible to quarantine every stray bit of data, but you can approach the problem intelligently and with the thoroughness applied to other business issues like physical security. At a recent conference on this topic someone noted: “I don’t know of any company that said ‘Wow I’m glad I kept all that information.’” That’s the attitude you need to have toward corporate data. It’s vital to running your business, but in the wrong hands, it can be the vital tool for a raid on your assets.   

View on Full Site
Disqus Comments

Straight Talk on Navigating "Subregulatory" Guidance

‹ Previous Article

"Necessary Evil" Programs Don’t Result in Ethical Organizations

Next Article ›