Application Decommissioning in Digital Transformation

Size: px
Start display at page:

Download "Application Decommissioning in Digital Transformation"

Transcription

1 Application Decommissioning in Digital Transformation Produced by In cooperation with MARCH 2018

2 CONTENTS Role of Application Decommissioning in Digital Transformation 3 What is application decommissioning?... 4 Benefits... 4 Legacy data a significant challenge... 4 Archiving reduces costs... 5 Delete, Archive, Migrate Getting to Grips with Legacy Data.. 6 Choice of archive platform affects cost and flexibility... 6 Choosing a data archiving partner... 7 Sector experience is important... 7 A good partner can support the client beyond migration THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION

3 ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION Public sector organisations all recognise the need to embrace and deliver digital transformation. The combination of acute pressures on resources and the growing expectations of citizens creates an unavoidable mandate for the modernisation and improvement of the services provided by the public sector. While the first generation of digital transformation projects in the public sector tended to focus on the user interface, it is now clear that simply focusing on the web experience is not enough. In order to deliver effective and sustainable digital transformation, the processes and systems at the core of service delivery must be modernised. Genuinely sustainable transformation can only be delivered by considering the processes that support service delivery from end-to-end. Many of the core services provided by public sector agencies are built on systems and platforms that were implemented many years, even decades ago. While it is often possible to update an existing application to make it more flexible and fit for digital, there will be many cases where an ageing application cannot be effectively adapted to support new business processes. In these situations, the legacy application will need to be replaced with a newer solution. However, for reasons ranging from regulatory compliance through to long-term civic obligations, data in old applications will often need to remain accessible for many years. In these cases, IT departments must decide how to make that legacy data available. Often this reflects a choice between: Running a legacy application in read-only maintenance-mode for the sole purpose of retaining data Using suitable data archiving and retrieval technology Undertaking to migrate data directly out of the legacy application into its replacement. This paper describes the different approaches that organisations can take to application decommissioning, and looks specifically at data archiving as an option that is often overlooked. THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION 3

4 What is application decommissioning? Application decommissioning is a strategic approach to systematically retiring applications either because they are no longer cost-effective to maintain, or because they cannot be effectively adapted to support new processes. In most cases, this must be achieved at the same time as providing access to application data and content to support the organisation s business processes while also ensuring that compliance requirements continue to be met. Benefits The decommissioning of legacy applications and the effective archival of their data and content can bring benefits in a number of domains: Supporting transformation by making it easier to implement new services that continue to depend on the legacy data. Reducing operational costs by eliminating costly servers, licensing fees, data centre costs and administration overheads. Risk reduction by removing fragile and unsupported environments, securing data and content in an accessible repository, and managing against compliance regulations including retention policies. Legacy data a significant challenge Application decommissioning can enable an organisation to break away from the limitations imposed by out-of-date or legacy applications. However, many organisations will be obliged to retain the data held in the legacy applications in order to comply with regulatory requirements. In some cases, data may only have to be retained for a short period of time, but in others there may be a legal obligation to retain the data for many years. For example, while minor transactions relating to the issue of parking permits may only need to be retained for 7 years, medical records may need to be retained for several decades. In cases like the Essex Fire and Rescue Service, the data in the legacy application had to be transferred to the new solution because it was effectively live data. But In 2016, the Essex Fire and Rescue Service developed a new asset management solution to replace an aging platform that had become costly to maintain and very difficult to adapt. The new solution provides a host of new features, most notably around the ability to access and update data from mobile devices. A key requirement of the new platform was that the existing data held by the older application had to be transferred to the new one. When implementing the new solution, the data migration proved to be the biggest challenge: not only did the data have to be extracted from an older storage format, but a great deal of effort was also required to reformat and cleanse the data as part of the migration process. One of the key lessons learned in this transformation project was that it is vital not to underestimate the challenge of data migration. It is important to invest time and effort up front to model the data, evaluate its quality, understand how it is to be used and develop an appropriate migration plan. the challenge of migrating data from an old application into a new production environment can be significant. Wherever possible, the goal should be to either purge or archive data before embarking on the time and cost of migrating it from one environment to another. 4 THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION

5 Simple guidelines are: 1. Delete what you can The storage and management of legacy data incurs a cost whatever mechanism you choose to store it, so only retain the data you need to. 2. Migrate what you must A proportion of the data contained within a legacy system will be live, because it is required to support current business processes, and is likely to be accessed and updated. This data will need to be transferred to a replacement system. 3. Archive the rest Any data that cannot be purged, but is not needed to support current business processes should be archived. It is worth noting that the process of purging and archiving should continue after the new application has been deployed. Archived data should be purged according to pre-defined retention policies, and data should be archived from production applications as soon as it is appropriate to do so. Deleting data that is no longer required will reduce migration and operational costs By purging data that is no longer required, projects can reduce the costs and risks associated with the transition from the legacy application to its replacement. The cost of data migration can be significant given the data cleansing and transformation that is often necessary, and once it has been migrated there will be ongoing costs associated with storage and management. Keeping data beyond the required retention period can also expose the organisation to liability under data protection legislation that covers the right to be forgotten, and the citizen s right to ask the organisation to provide copies of any information it holds on them. By identifying the data that can be purged early on in the transformation process, projects can avoid the constraints and risks associated with its retention and migration. Archiving reduces costs Many production systems host a significant amount of data that is no longer required, except in occasional circumstances or in order to comply with data retention requirements set by regulation. In some instances, this data can amount to the lion s share of the data maintained by an application; in effect, organisations are paying software and licensing fees to maintain data that they no longer need on a day-to-day basis and perhaps may never need to access again. In a Health setting the presence of patient data in a variety of legacy systems makes it difficult to give clinicians a complete view of the patient s overall health. For example one large Health organisation were moving to a new Patient Record Solution but maintaining legacy systems presented them with clinical and IT challenges. We had a significant amount of unstructured legacy data that could not be practically converted to our new Epic EHR system, says Lore Chapman, Vice President and Chief Enterprise Architect for Lahey Health. We needed this data somewhere it would be accessible to our clinicians in an efficient manner, taking advantage of user and patient context. With the help of OpenText Documentum, we ve made patient information that wasn t migrated into Epic available inside of Epic Hyperspace with one click. Our clinical providers are thrilled with the seamless access to patient data, which they have as a result of Clinical Archiving, a unique approach to this challenge which many organizations in the industry face. David Reis, Ph.d., CIO, Lahey Health. THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION 5

6 DELETE, ARCHIVE, MIGRATE GETTING TO GRIPS WITH LEGACY DATA LEGACY DATA Once the decision is made to replace a legacy application, the project should audit the data that is held by the application that is due to be retired. The goal should be to aggressively purge any information that is no longer required, identify information that can be archived, and then to develop a plan for the migration of data that needs to be transferred to the new system. DELETE IDENTIFY AND DELETE ELIGIBLE DATA DEFINE POLICIES THAT WILL BE APPLIED TO THE DELETION OF ARCHIVED DATA ARCHIVE IMPLEMENT POLICIES FOR THE PERIODIC PURGING OF ARCHIVED DATA MIGRATE DEFINE POLICIES THAT GOVERN WHAT DATA SHOULD BE ARCHIVED IMPLEMENT POLICIES FOR THE REGULAR ARCHIVING OF ELIGIBLE DATA Choice of archive platform affects cost and flexibility Having identified the data that can be archived, the next step is to decide how it should be stored in order to provide the greatest flexibility on one hand, while costing as little as possible on the other. One approach that some projects have taken is to continue to run the legacy application in read-only mode, but with a smaller number of users, or on the basis of a specially negotiated licence fee. This has the superficial benefit of being minimally disruptive, while providing a way to access the legacy data when necessary. In practice, however, it can be an expensive option that means that the organisation is still tied to the application they wanted to replace, even to the extent that the retired application must be upgraded in order to remain in support. Instead of retaining the legacy application, organisations can implement a dedicated archive platform which will enable them to completely retire the legacy application while also providing a way to manage the archival and purging of data on an ongoing basis. There are a number of factors that organisations should consider when looking at archive solutions. These are considered in the chart on the following page. 6 THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION

7 Factors organisations should consider when looking at archive solutions Open Archive Formats Flexible storage options Support for the information management lifeycle Support for access control and information governance The archive solution should store archive data in open formats, rather than the proprietary formats used by the legacy applications. This is important as a means of ensuring that archived data will continue to be accessible long after the original application has been retired The ability to store archived data on tiered storage can have a significant impact on running costs. A comprehensive archive platform should take advantage of lower cost storage, including cloud storage, while enabling the access and management of the archived data The archive solution should provide support for the ongoing archival of data from the new application, as well as providing a means of purging data from the archive according to the organisation s retention policies. The effective support for information governance is a fundamental requirement under data protection and privacy legislation. The ability to effectively manage who can access archived data, and what archived data can be accessed is essential when the archive contains personally identifying information. This is particularly acute when that data is of a highly personal nature like medical records, financial transactions, or data relating to children or vulnerable adults. The archive platform should provide for user access control, data masking (which provides for the selective obscuring of sensitive data), and the auditing of data access requests. Choosing a data archiving partner When selecting a data archiving platform, organisations should consider the supplier and their capabilities as well as the technical features of their product. Ideally, organisations should be looking for a partner, rather than simply selecting a technology supplier. Sector experience is important Suppliers that have experience in the same sector as the client will bring a good deal of relevant experience to the project they will understand the specific challenges faced by the client organisation and will be able to bring lessons learned in other engagements to the project. A good partner can support the client beyond migration While much of the effort in product and supplier selection will be focused on ensuring a smooth transition from the legacy environment to the new one, it is important that the project also consider the role of data archiving in the ongoing operation and management of the new platform. A good partner will be able to provide advice and support well beyond migration, enabling the organisation to effectively manage the lifecycle of the information held by the new application. THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION 7

8 Produced by In cooperation with 44 (0)

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER

ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been

More information

ARCHIVE ESSENTIALS

ARCHIVE ESSENTIALS EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has

More information

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK

IN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK IN THE FRAME Computacenter Public Sector Frameworks FRAMEWORK SOLUTION PUBLIC SECTOR FRAMEWORK ACCELERATE TRANSFORMATION Put digitalisation in the fast lane with cost-effective, compliant and centralised

More information

Staffordshire University

Staffordshire University Staffordshire University Staffordshire University Cloud Transformation Project Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed

More information

archiving with Office 365

archiving with Office 365 Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder

More information

GDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper

GDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper White paper GDPR preparedness with OpenText InfoArchive The new EU privacy law, GDPR, will be in effect in less than a year. OpenText has the solutions to help you prepare and comply to this new law. Contents

More information

Selecting the Right Method

Selecting the Right Method Selecting the Right Method Applying the proper OpenText InfoArchive method to balance project requirements with source application architectures InfoArchive is an application-agnostic solution for information

More information

White paper Selecting the right method

White paper Selecting the right method White paper Selecting the right method This whitepaper outlines how to apply the proper OpenText InfoArchive method to balance project requirements with source application architectures. Contents The four

More information

New Zealand Government IBM Infrastructure as a Service

New Zealand Government IBM Infrastructure as a Service New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand

More information

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation

Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking

More information

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary

Aon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As

More information

Information Security Strategy

Information Security Strategy Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone

More information

GDPR: A QUICK OVERVIEW

GDPR: A QUICK OVERVIEW GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance

More information

Learning Management System - Privacy Policy

Learning Management System - Privacy Policy We recognize that visitors to our Learning Management System (LMS) may be concerned about what happens to information they provide when they make use of the system. We also recognize that education and

More information

UKEF UK Export Finance. Transformation with the Microsoft Cloud

UKEF UK Export Finance. Transformation with the Microsoft Cloud UKEF UK Export Finance Transformation with the Microsoft Cloud the customer overview Customer UKEF Website www.gov.uk/uk-export-finance Number of employees UKEF s fixed deadline had major financial implications,

More information

First Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations

First Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations Customer Profile First Financial Bank Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations A midsize community bank with a service

More information

Version 1/2018. GDPR Processor Security Controls

Version 1/2018. GDPR Processor Security Controls Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in

More information

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive

IT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )

ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) Introduction These End User Terms permit the use of PAF Data in Solutions by End Users. These terms are not applicable

More information

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005

Information Lifecycle Management for Business Data. An Oracle White Paper September 2005 Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...

More information

Secure Messaging as a Service

Secure Messaging as a Service Security Infrastructure Management the way we do it Secure Messaging as a Service in collaboration with Insert partner logo Messaging as a Service (MaaS) In today s complex technological society, diversity

More information

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS

PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS >> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT

More information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information

Privacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.

More information

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd

GDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

Case Study: myaccount

Case Study: myaccount Case Study: myaccount mygovscot myaccount is the simple and secure sign-in service to access online public services provided by eligible public bodies in Scotland. It is the agreed national approach for

More information

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY

SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.

More information

Checklist: Credit Union Information Security and Privacy Policies

Checklist: Credit Union Information Security and Privacy Policies Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC

More information

Test Data Management for Security and Compliance

Test Data Management for Security and Compliance White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential

More information

Managing Records in Electronic Formats. An Introduction

Managing Records in Electronic Formats. An Introduction Managing Records in Electronic Formats An Introduction Jefferson County Public Schools Archives and Records Center November 2012 Managing Records in Electronic Format As we create and use more and more

More information

CASE STUDY CHIEF INFORMATION OFFICER GROUP

CASE STUDY CHIEF INFORMATION OFFICER GROUP CASE STUDY Project description The Chief Information Officer Group is responsible for ensuring that Defence has a dependable, secure and integrated ICT environment that supports Defence business and military

More information

Subject: Kier Group plc Data Protection Policy

Subject: Kier Group plc Data Protection Policy Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July

Privacy Notice. Lonsdale & Marsh Privacy Notice Version July Privacy Notice Lonsdale & Marsh understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our clients and will

More information

EXECUTIVE SUMMARY JUNE 2016 Multifamily and Cybersecurity: The Threat Landscape and Best Practices

EXECUTIVE SUMMARY JUNE 2016 Multifamily and Cybersecurity: The Threat Landscape and Best Practices Multifamily and Cybersecurity: The Threat Landscape and Best Practices By CHRISTOPHER G. CWALINA, ESQ., KAYLEE A. COX, ESQ. and THOMAS H. BENTZ, JR., ESQ. HOLLAND & KNIGHT Overview Cyber policy is critical

More information

Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007

Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007 Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007 Balancing business & security Security & privacy not all technology Placement of privacy & security - Organizational oversight Importance

More information

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018

World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy

More information

RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES

RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES ISSUED DECEMBER 2018 Table Of Contents 1. Model A sub-branches... 2 2. Model B sub-branches... 6 1 SUB-BRANCH STANDARD OPERATING PROCEDURES (SOPs) These

More information

Keeping the lid on storage

Keeping the lid on storage Keeping the lid on storage Drive significant cost savings through innovation and efficiency Publication date: December 2011 Optimising storage performance & costs through innovation As the compute power

More information

Balancing energy and environmental demands

Balancing energy and environmental demands Balancing energy and environmental demands Solutions that optimise the safety and performance of conventional power plants and power station systems. TÜV SÜD South Asia Meet global energy demands As demand

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

Architecture and Standards Development Lifecycle

Architecture and Standards Development Lifecycle Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page

More information

Emerging Technologies The risks they pose to your organisations

Emerging Technologies The risks they pose to your organisations Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things

More information

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...

More information

The GDPR data just got personal

The GDPR data just got personal GDPR QUICK REFERENCE GUIDE The GDPR data just got personal What it is, what it means and how it affects you The GDPR is a gamechanger for organizations holding, and protecting, personal, identifiable data

More information

The case for cloud-based data backup

The case for cloud-based data backup IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods

More information

Update Windows. Upgrade the organisation. Reshaping ICT, Reshaping Business FUJITSU LIMITED. uk.fujitsu.com

Update Windows. Upgrade the organisation. Reshaping ICT, Reshaping Business FUJITSU LIMITED. uk.fujitsu.com Update Windows Upgrade the organisation FUJITSU LIMITED 2 Baker Street London W1U 3BW Copyright: 2013 Fujitsu Contact: fujitsu.com/uk/contact All rights reserved, including rights created by patent grant

More information

INFORMATION TECHNOLOGY ONE-YEAR PLAN

INFORMATION TECHNOLOGY ONE-YEAR PLAN INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by

More information

Managing Exchange Migration with Enterprise Vault

Managing Exchange Migration with Enterprise Vault WHITE PAPER Managing Exchange Migration with Enterprise Abstract: Many organizations today are considering either replacing their legacy mail system, for example GroupWise or ccmail, with Microsoft Exchange

More information

A revolutionary visual security and analytics solution

A revolutionary visual security and analytics solution A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing

More information

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development

Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Introduction This note sets out a business model for a Global Platform

More information

Total Cost of Ownership: Benefits of the OpenText Cloud

Total Cost of Ownership: Benefits of the OpenText Cloud Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations

More information

Certification for Meaningful Use Experiences and Observations from the Field June 2011

Certification for Meaningful Use Experiences and Observations from the Field June 2011 Certification for Meaningful Use Experiences and Observations from the Field June 2011 Principles for Certification to Support Meaningful Use Certification should promote EHR adoption by giving providers

More information

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered

What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged

More information

Information Security Data Classification Procedure

Information Security Data Classification Procedure Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations

More information

Slashing Downtime from 24 Hours to 24 Minutes:

Slashing Downtime from 24 Hours to 24 Minutes: Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information

More information

Common approaches to management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C.

Common approaches to  management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Common approaches to email management Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Agenda 1 2 Introduction and Objectives Terms and Definitions 3 Typical

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Office 365: Fact Sheet

Office 365: Fact Sheet Office 365: Fact Sheet Microsoft Office 365 from 3C Technology Ltd brings together cloud versions of our most trusted communication and collaboration products with the latest version of our desktop suite.

More information

The isalon GDPR Guide Helping you understand and prepare for the legislation

The isalon GDPR Guide Helping you understand and prepare for the legislation The isalon GDPR Guide Helping you understand and prepare for the legislation 01522 887200 isalonsoftware.co.uk Read our guide today to help you plan for the new legislation.. The General Data Protection

More information

CASE STUDY. Building the foundations to enable change

CASE STUDY. Building the foundations to enable change CASE STUDY Building the foundations to enable change ORGANISATION: The BMJ, formerly known as The British Medical Journal, is one of the world s oldest general medical journals, with a history that goes

More information

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure

Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations

More information

Strategic Choices for 5-digit Dialing at Harborview

Strategic Choices for 5-digit Dialing at Harborview Strategic Choices for 5-digit Dialing at Harborview Capital Improvement Council February 27, 2006 D. Scott Mah Assistant Vice President, C&C Service Delivery & Support Computing & Communications Current

More information

Balancing energy and environmental demands

Balancing energy and environmental demands Balancing energy and environmental demands Solutions that optimise the safety and performance of conventional power plants and power station systems. TÜV SÜD South Asia Meet global energy demands As demand

More information

Moving to S/4HANA: 3 Tips for Managing Data to Ensure a Faster and Easier Transition

Moving to S/4HANA: 3 Tips for Managing Data to Ensure a Faster and Easier Transition Moving to S/4HANA: 3 Tips for Managing Data to Ensure a Faster and Easier Transition Dolphin Best Practices White Paper Version: 1.0 Copyright 2018 Dolphin Enterprise Solutions Corporation (dba Dolphin)

More information

Privacy Policy on the Responsibilities of Third Party Service Providers

Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,

More information

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions

Getting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across

More information

BT CNSP - new solutions for health and social care

BT CNSP - new solutions for health and social care BT CNSP - new solutions for health and social care The Health and Social Care Network (HSCN) will provide a reliable and efficient way for health and social care organisations to access and exchange information.

More information

Shaping the Cloud for the Healthcare Industry

Shaping the Cloud for the Healthcare Industry Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as

More information

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial

Ofqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial Ofqual Ofqual Supporting a Cloud-First Programme Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed in this document, including

More information

how to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical.

how to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical. Contents Introduction... 2 Purpose of this paper... 2 Critical Infrastructure Security and Resilience... 3 The National Security Environment... 5 A Proactive and Collaborative Approach... 7 Critical Infrastructure

More information

DESIGNING AN ACTIVE ARCHIVE

DESIGNING AN ACTIVE ARCHIVE DESIGNING AN ACTIVE ARCHIVE Guidelines and Considerations for Archive Success Author: Marketing Version: 1.3 Date: 3 July, 2013 Status: Released Distribution: General Distribution www.qstar.com Copyright

More information

NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS

NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS Where are unified critical communications heading? What is the place of radio in a unified communication environment? What solutions

More information

Before Searching for Solutions It s All About the Data

Before Searching for Solutions It s All About the Data Before Searching for Solutions It s All About the Data Stephen Watts - Federal Strategist for Information Governance Does your garage look like this? 2 The Real Problem With Data Growth TIME $ PROBLEMS

More information

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009

REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto

More information

A long and rocky road

A long and rocky road A long and rocky road Luxembourg s Government path towards true Web Accessibility Presentation at Funka s Accessibility Days on 10 April 2019 in Stockholm Table of contents 1. Context 2. Short history

More information

GDPR Workflow White Paper

GDPR Workflow White Paper White Paper The European Union is implementing new legislation with the objective of protecting personal data of citizens within the EU and giving them more control over how their data is used. Hefty fines

More information

Oracle Buys Automated Applications Controls Leader LogicalApps

Oracle Buys Automated Applications Controls Leader LogicalApps Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is

More information

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018

Birmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018 1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess

More information

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

How to avoid storms in the cloud. The Australian experience and global trends

How to avoid storms in the cloud. The Australian experience and global trends How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations

More information

Green Governance Growth

Green Governance Growth G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they

More information

SCHOOL SUPPLIERS. What schools should be asking!

SCHOOL SUPPLIERS. What schools should be asking! SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated

More information

Disaster Recovery Is A Business Strategy

Disaster Recovery Is A Business Strategy Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...

More information

Frequently Asked Questions: TransVault Migrator for Google

Frequently Asked Questions: TransVault Migrator for Google Q1. What is TransVault for Google?... 1 Q2. Why not just import our legacy archive to Google via PST files?... 1 Q3. Can TransVault help manage what we upload into Google?... 2 Q4. Does TransVault support

More information

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant

General Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall

More information

Company presentation Transition and Transformation

Company presentation Transition and Transformation Company presentation Transition and Transformation FORNEBU 7 DECEMBER 2017 CFO HENRIK SCHIBLER EVRY PUBLIC The IBM Partnership offers accelerated transformation of operations, delivering increased flexibility

More information

Guidance for Exchange and Medicaid Information Technology (IT) Systems

Guidance for Exchange and Medicaid Information Technology (IT) Systems Department of Health and Human Services Office of Consumer Information and Insurance Oversight Centers for Medicare & Medicaid Services Guidance for Exchange and Medicaid Information Technology (IT) Systems

More information

Mid-Kent ICT Services Technology Strategy. Author: Tony Bullock Date: September 2013 Version: 019

Mid-Kent ICT Services Technology Strategy. Author: Tony Bullock Date: September 2013 Version: 019 Mid-Kent ICT Services Technology Strategy Author: Tony Bullock Date: September 2013 Version: 019 Contents Background and purpose... 2 Key deliverables... 3 Benefits... 3 Principles... 3 Work anywhere,

More information

Business Architecture in Healthcare

Business Architecture in Healthcare Business Architecture in Healthcare ehealth IS CREATING A PERFECT STORM FOR CHANGING HEALTHCARE DELIVERY Office of the CIO Delivering ehealth Ireland Healthcare is a system of relationships Test Harness

More information

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber

IBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber IBM Compliance Offerings For Verse and S1 Cloud 01 June 2017 Presented by: Chuck Stauber IBM Connections & Verse Email and collaboration platform designed to help you work better Empower people Teams are

More information

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).

It applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your). Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations

More information

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke

Pathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC

More information

ENCRYPTION IN USE FACT AND FICTION. White Paper

ENCRYPTION IN USE FACT AND FICTION. White Paper White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises

More information

HCL GRC IT AUDIT & ASSURANCE SERVICES

HCL GRC IT AUDIT & ASSURANCE SERVICES HCL GRC IT AUDIT & ASSURANCE SERVICES Overview The immense progress made in information and communications technology offers enterprises outstanding benefits. However this also results in making the risk

More information

Frequently Asked Questions Customers

Frequently Asked Questions Customers Important Updates on Maintenance Plans Frequently Asked Questions Customers This document answers frequently asked questions about maintenance plan changes as we move to one business model. Updated: May

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

The New Healthcare Economy is rising up

The New Healthcare Economy is rising up The New Healthcare Economy is rising up February 2017 The ever-rising costs of healthcare are fostering innovative solutions and disruptive business models Cybersecurity concerns come to medical technology

More information

Commissioner Ian Dyson SRO, National Enabling Programmes IMORCC

Commissioner Ian Dyson SRO, National Enabling Programmes IMORCC Commissioner Ian Dyson SRO, National Enabling Programmes IMORCC 24 January 2018 National Enabling Programmes Chiefs Council. January 2018 The Sympathy Card What are the major components that the NEP programme

More information