You are on page 1of 10

Electronic Commerce (MSL 855)

Group 3
Evolution of Information Governance at Intel
Group 3
Nitesh Maan 2104SMN6597
Ishani Das
Saurabh Sharma

2104SMN6587
2104SMN6610

Outline
1.

Overview

2.Why

Information Governance

3.Protect

Era of Information Governance

4.Protect-to-Enable

Era of Information Governance

Analytics

Value addition quantification

5.Lessons

Learned

Decade-long evolution of information governance at


Intel alongside rapid increases in data volume

Initial approach Restrict access to key info resource

Evolved towards Protect to enable


balance data protection and accessibility
Leverage big data analytics to facilitate decision making and further
innovation

Big Data
Better, Faster, Cheaper storage
Hype surrounding data-analytics
Regulations

Need to protect data against various technical and


organization risks

Need to enable greater use of data as a means of generating


value

Policies and structures to lock down access to


ensure critical data such as microprocessor
designs, financial data isnt compromised
Sarbanex-Oxley (2002); SQL Slammer (2003)
Risks to be addressed:
e-discovery: search and recover key info in response
to court order
Business Continuity: recover business critical
operations with minimal disruption
Compliance: data protection, control, access std.
Intellectual Property (IP): cyber-attacks, theft

Drawbacks:
Excessive, expensive, risk inducing and
detrimental to Intels long-term innovation efforts
Expensive: Over-protectionist policies led to policies
mandating data retention on most expensive storage
devices for extended duration. Data management
costs grew with data volume growth
Risk inducing: Employees devised policy work
arounds that were within letter but not the spirit of
the policies leading to increased risks
Detrimental to innovation: Analytics required data
access outside of functional areas but wasnt
permitted

Intended to generate business value through


greater use of IT resources and data but
within defined, quantifiable, tolerable risk
limits

Why Protect-to-Enable?
Emergence of BYOD and data analytics
Information governance success evaluated in terms
of innovation boost and reduced time to market
Cost Savings educating employees and use of
charge back model

Analytics Facilitation
Information governance perspective shifted from
who owns data to who can best use data and
achievement of organization value in new ways

Value Measurement
Operational Level decline in data loss and
security related incidents that put data at risk
Strategic Level ability to respond to market
change; design and deliver new products in
shorter time frame. Example, analytics lead to
25% time reduction in chip design validation
thereby allowing faster product launches

1.

2.

3.

4.
5.

Eliminate practices that over-govern


information
Educate users about data-related risk and
cost
Collaborate with the business to design
information governance
Allow exceptions to global policies to meet
local needs
Help users put a financial value on data

Thank you!

You might also like