Application Decommissioning in Digital Transformation
|
|
- Erin Silvia Bradley
- 5 years ago
- Views:
Transcription
1 Application Decommissioning in Digital Transformation Produced by In cooperation with MARCH 2018
2 CONTENTS Role of Application Decommissioning in Digital Transformation 3 What is application decommissioning?... 4 Benefits... 4 Legacy data a significant challenge... 4 Archiving reduces costs... 5 Delete, Archive, Migrate Getting to Grips with Legacy Data.. 6 Choice of archive platform affects cost and flexibility... 6 Choosing a data archiving partner... 7 Sector experience is important... 7 A good partner can support the client beyond migration THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION
3 ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION Public sector organisations all recognise the need to embrace and deliver digital transformation. The combination of acute pressures on resources and the growing expectations of citizens creates an unavoidable mandate for the modernisation and improvement of the services provided by the public sector. While the first generation of digital transformation projects in the public sector tended to focus on the user interface, it is now clear that simply focusing on the web experience is not enough. In order to deliver effective and sustainable digital transformation, the processes and systems at the core of service delivery must be modernised. Genuinely sustainable transformation can only be delivered by considering the processes that support service delivery from end-to-end. Many of the core services provided by public sector agencies are built on systems and platforms that were implemented many years, even decades ago. While it is often possible to update an existing application to make it more flexible and fit for digital, there will be many cases where an ageing application cannot be effectively adapted to support new business processes. In these situations, the legacy application will need to be replaced with a newer solution. However, for reasons ranging from regulatory compliance through to long-term civic obligations, data in old applications will often need to remain accessible for many years. In these cases, IT departments must decide how to make that legacy data available. Often this reflects a choice between: Running a legacy application in read-only maintenance-mode for the sole purpose of retaining data Using suitable data archiving and retrieval technology Undertaking to migrate data directly out of the legacy application into its replacement. This paper describes the different approaches that organisations can take to application decommissioning, and looks specifically at data archiving as an option that is often overlooked. THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION 3
4 What is application decommissioning? Application decommissioning is a strategic approach to systematically retiring applications either because they are no longer cost-effective to maintain, or because they cannot be effectively adapted to support new processes. In most cases, this must be achieved at the same time as providing access to application data and content to support the organisation s business processes while also ensuring that compliance requirements continue to be met. Benefits The decommissioning of legacy applications and the effective archival of their data and content can bring benefits in a number of domains: Supporting transformation by making it easier to implement new services that continue to depend on the legacy data. Reducing operational costs by eliminating costly servers, licensing fees, data centre costs and administration overheads. Risk reduction by removing fragile and unsupported environments, securing data and content in an accessible repository, and managing against compliance regulations including retention policies. Legacy data a significant challenge Application decommissioning can enable an organisation to break away from the limitations imposed by out-of-date or legacy applications. However, many organisations will be obliged to retain the data held in the legacy applications in order to comply with regulatory requirements. In some cases, data may only have to be retained for a short period of time, but in others there may be a legal obligation to retain the data for many years. For example, while minor transactions relating to the issue of parking permits may only need to be retained for 7 years, medical records may need to be retained for several decades. In cases like the Essex Fire and Rescue Service, the data in the legacy application had to be transferred to the new solution because it was effectively live data. But In 2016, the Essex Fire and Rescue Service developed a new asset management solution to replace an aging platform that had become costly to maintain and very difficult to adapt. The new solution provides a host of new features, most notably around the ability to access and update data from mobile devices. A key requirement of the new platform was that the existing data held by the older application had to be transferred to the new one. When implementing the new solution, the data migration proved to be the biggest challenge: not only did the data have to be extracted from an older storage format, but a great deal of effort was also required to reformat and cleanse the data as part of the migration process. One of the key lessons learned in this transformation project was that it is vital not to underestimate the challenge of data migration. It is important to invest time and effort up front to model the data, evaluate its quality, understand how it is to be used and develop an appropriate migration plan. the challenge of migrating data from an old application into a new production environment can be significant. Wherever possible, the goal should be to either purge or archive data before embarking on the time and cost of migrating it from one environment to another. 4 THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION
5 Simple guidelines are: 1. Delete what you can The storage and management of legacy data incurs a cost whatever mechanism you choose to store it, so only retain the data you need to. 2. Migrate what you must A proportion of the data contained within a legacy system will be live, because it is required to support current business processes, and is likely to be accessed and updated. This data will need to be transferred to a replacement system. 3. Archive the rest Any data that cannot be purged, but is not needed to support current business processes should be archived. It is worth noting that the process of purging and archiving should continue after the new application has been deployed. Archived data should be purged according to pre-defined retention policies, and data should be archived from production applications as soon as it is appropriate to do so. Deleting data that is no longer required will reduce migration and operational costs By purging data that is no longer required, projects can reduce the costs and risks associated with the transition from the legacy application to its replacement. The cost of data migration can be significant given the data cleansing and transformation that is often necessary, and once it has been migrated there will be ongoing costs associated with storage and management. Keeping data beyond the required retention period can also expose the organisation to liability under data protection legislation that covers the right to be forgotten, and the citizen s right to ask the organisation to provide copies of any information it holds on them. By identifying the data that can be purged early on in the transformation process, projects can avoid the constraints and risks associated with its retention and migration. Archiving reduces costs Many production systems host a significant amount of data that is no longer required, except in occasional circumstances or in order to comply with data retention requirements set by regulation. In some instances, this data can amount to the lion s share of the data maintained by an application; in effect, organisations are paying software and licensing fees to maintain data that they no longer need on a day-to-day basis and perhaps may never need to access again. In a Health setting the presence of patient data in a variety of legacy systems makes it difficult to give clinicians a complete view of the patient s overall health. For example one large Health organisation were moving to a new Patient Record Solution but maintaining legacy systems presented them with clinical and IT challenges. We had a significant amount of unstructured legacy data that could not be practically converted to our new Epic EHR system, says Lore Chapman, Vice President and Chief Enterprise Architect for Lahey Health. We needed this data somewhere it would be accessible to our clinicians in an efficient manner, taking advantage of user and patient context. With the help of OpenText Documentum, we ve made patient information that wasn t migrated into Epic available inside of Epic Hyperspace with one click. Our clinical providers are thrilled with the seamless access to patient data, which they have as a result of Clinical Archiving, a unique approach to this challenge which many organizations in the industry face. David Reis, Ph.d., CIO, Lahey Health. THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION 5
6 DELETE, ARCHIVE, MIGRATE GETTING TO GRIPS WITH LEGACY DATA LEGACY DATA Once the decision is made to replace a legacy application, the project should audit the data that is held by the application that is due to be retired. The goal should be to aggressively purge any information that is no longer required, identify information that can be archived, and then to develop a plan for the migration of data that needs to be transferred to the new system. DELETE IDENTIFY AND DELETE ELIGIBLE DATA DEFINE POLICIES THAT WILL BE APPLIED TO THE DELETION OF ARCHIVED DATA ARCHIVE IMPLEMENT POLICIES FOR THE PERIODIC PURGING OF ARCHIVED DATA MIGRATE DEFINE POLICIES THAT GOVERN WHAT DATA SHOULD BE ARCHIVED IMPLEMENT POLICIES FOR THE REGULAR ARCHIVING OF ELIGIBLE DATA Choice of archive platform affects cost and flexibility Having identified the data that can be archived, the next step is to decide how it should be stored in order to provide the greatest flexibility on one hand, while costing as little as possible on the other. One approach that some projects have taken is to continue to run the legacy application in read-only mode, but with a smaller number of users, or on the basis of a specially negotiated licence fee. This has the superficial benefit of being minimally disruptive, while providing a way to access the legacy data when necessary. In practice, however, it can be an expensive option that means that the organisation is still tied to the application they wanted to replace, even to the extent that the retired application must be upgraded in order to remain in support. Instead of retaining the legacy application, organisations can implement a dedicated archive platform which will enable them to completely retire the legacy application while also providing a way to manage the archival and purging of data on an ongoing basis. There are a number of factors that organisations should consider when looking at archive solutions. These are considered in the chart on the following page. 6 THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION
7 Factors organisations should consider when looking at archive solutions Open Archive Formats Flexible storage options Support for the information management lifeycle Support for access control and information governance The archive solution should store archive data in open formats, rather than the proprietary formats used by the legacy applications. This is important as a means of ensuring that archived data will continue to be accessible long after the original application has been retired The ability to store archived data on tiered storage can have a significant impact on running costs. A comprehensive archive platform should take advantage of lower cost storage, including cloud storage, while enabling the access and management of the archived data The archive solution should provide support for the ongoing archival of data from the new application, as well as providing a means of purging data from the archive according to the organisation s retention policies. The effective support for information governance is a fundamental requirement under data protection and privacy legislation. The ability to effectively manage who can access archived data, and what archived data can be accessed is essential when the archive contains personally identifying information. This is particularly acute when that data is of a highly personal nature like medical records, financial transactions, or data relating to children or vulnerable adults. The archive platform should provide for user access control, data masking (which provides for the selective obscuring of sensitive data), and the auditing of data access requests. Choosing a data archiving partner When selecting a data archiving platform, organisations should consider the supplier and their capabilities as well as the technical features of their product. Ideally, organisations should be looking for a partner, rather than simply selecting a technology supplier. Sector experience is important Suppliers that have experience in the same sector as the client will bring a good deal of relevant experience to the project they will understand the specific challenges faced by the client organisation and will be able to bring lessons learned in other engagements to the project. A good partner can support the client beyond migration While much of the effort in product and supplier selection will be focused on ensuring a smooth transition from the legacy environment to the new one, it is important that the project also consider the role of data archiving in the ongoing operation and management of the new platform. A good partner will be able to provide advice and support well beyond migration, enabling the organisation to effectively manage the lifecycle of the information held by the new application. THE ROLE OF APPLICATION DECOMMISSIONING IN DIGITAL TRANSFORMATION 7
8 Produced by In cooperation with 44 (0)
ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER
EMAIL ARCHIVE ESSENTIALS: Key Considerations When Moving to Office 365 DISCUSSION PAPER preface The last few years have seen significant changes in the way organisations conduct business. There has been
More informationARCHIVE ESSENTIALS
EMAIL ARCHIVE ESSENTIALS KEY CONSIDERATIONS WHEN MOVING TO OFFICE 365 DISCUSSION PAPER PREFACE The last few years have seen significant changes in the way that organisations conduct business. There has
More informationIN THE FRAME. Computacenter Public Sector Frameworks FRAMEWORK
IN THE FRAME Computacenter Public Sector Frameworks FRAMEWORK SOLUTION PUBLIC SECTOR FRAMEWORK ACCELERATE TRANSFORMATION Put digitalisation in the fast lane with cost-effective, compliant and centralised
More informationStaffordshire University
Staffordshire University Staffordshire University Cloud Transformation Project Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed
More informationarchiving with Office 365
Email archiving with Office 365 ISO CERTIFIED info@cryoserver.com www.cryoserver.com +44 (0) 800 280 0525 Table of Contents 1.0 Purpose of Document 2 2.0 Email archiving in Office 365 2 2.1 Deleted folder
More informationGDPR compliance. GDPR preparedness with OpenText InfoArchive. White paper
White paper GDPR preparedness with OpenText InfoArchive The new EU privacy law, GDPR, will be in effect in less than a year. OpenText has the solutions to help you prepare and comply to this new law. Contents
More informationSelecting the Right Method
Selecting the Right Method Applying the proper OpenText InfoArchive method to balance project requirements with source application architectures InfoArchive is an application-agnostic solution for information
More informationWhite paper Selecting the right method
White paper Selecting the right method This whitepaper outlines how to apply the proper OpenText InfoArchive method to balance project requirements with source application architectures. Contents The four
More informationNew Zealand Government IBM Infrastructure as a Service
New Zealand Government IBM Infrastructure as a Service A world class agile cloud infrastructure designed to provide quick access to a security-rich, enterprise-class virtual server environment. 2 New Zealand
More informationSwedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation
Think Cloud Compliance Case Study Swedish bank overcomes regulatory hurdles and embraces the cloud to foster innovation Customer details : Collector Bank - Sweden 329 employees www.collector.se/en Banking
More informationAon Service Corporation Law Global Privacy Office. Aon Client Data Privacy Summary
Aon Client Data Privacy Summary Table of Contents Our Commitment to Data Privacy 3 Our Data Privacy Principles 4 Aon Client Data Privacy Summary 2 Our Commitment to Data Privacy Data Privacy Backdrop As
More informationInformation Security Strategy
Security Strategy Document Owner : Chief Officer Version : 1.1 Date : May 2011 We will on request produce this Strategy, or particular parts of it, in other languages and formats, in order that everyone
More informationGDPR: A QUICK OVERVIEW
GDPR: A QUICK OVERVIEW 2018 Get ready now. 29 June 2017 Presenters Charles Barley Director, Risk Advisory Services Charles Barley, Jr. is responsible for the delivery of governance, risk and compliance
More informationLearning Management System - Privacy Policy
We recognize that visitors to our Learning Management System (LMS) may be concerned about what happens to information they provide when they make use of the system. We also recognize that education and
More informationUKEF UK Export Finance. Transformation with the Microsoft Cloud
UKEF UK Export Finance Transformation with the Microsoft Cloud the customer overview Customer UKEF Website www.gov.uk/uk-export-finance Number of employees UKEF s fixed deadline had major financial implications,
More informationFirst Financial Bank. Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations
Customer Profile First Financial Bank Highly available, centralized, tiered storage brings simplicity, reliability, and significant cost advantages to operations A midsize community bank with a service
More informationVersion 1/2018. GDPR Processor Security Controls
Version 1/2018 GDPR Processor Security Controls Guidance Purpose of this document This document describes the information security controls that are in place by an organisation acting as a processor in
More informationIT Governance ISO/IEC 27001:2013 ISMS Implementation. Service description. Protect Comply Thrive
IT Governance ISO/IEC 27001:2013 ISMS Implementation Service description Protect Comply Thrive 100% guaranteed ISO 27001 certification with the global experts With the IT Governance ISO 27001 Implementation
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms )
ROYAL MAIL GROUP ADDRESS MANAGEMENT UNIT PAF DATA END USER TERMS ( End User Terms ) Introduction These End User Terms permit the use of PAF Data in Solutions by End Users. These terms are not applicable
More informationInformation Lifecycle Management for Business Data. An Oracle White Paper September 2005
Information Lifecycle Management for Business Data An Oracle White Paper September 2005 Information Lifecycle Management for Business Data Introduction... 3 Regulatory Requirements... 3 What is ILM?...
More informationSecure Messaging as a Service
Security Infrastructure Management the way we do it Secure Messaging as a Service in collaboration with Insert partner logo Messaging as a Service (MaaS) In today s complex technological society, diversity
More informationPROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS
>> PROTECT YOUR DATA, SAFEGUARD YOUR BUSINESS COMPUTACENTER HELPS ORGANISATIONS INCREASE THE AVAILABILITY AND INTEGRITY OF THEIR INFORMATION ASSETS WITH NEW-GENERATION DATA PROTECTION SOLUTIONS >> PROTECT
More informationPrivacy Statement. Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information
Privacy Statement Introduction Your privacy and trust are important to us and this Privacy Statement ( Statement ) provides important information about how IT Support (UK) Ltd handle personal information.
More informationGDPR Processor Security Controls. GDPR Toolkit Version 1 Datagator Ltd
GDPR Processor Security Controls GDPR Toolkit Version 1 Datagator Ltd Implementation Guidance (The header page and this section must be removed from final version of the document) Purpose of this document
More informationSecurity and Privacy Governance Program Guidelines
Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by
More informationCase Study: myaccount
Case Study: myaccount mygovscot myaccount is the simple and secure sign-in service to access online public services provided by eligible public bodies in Scotland. It is the agreed national approach for
More informationSQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY
SQL Compliance Whitepaper HOW COMPLIANCE IMPACTS BACKUP STRATEGY THE INTERSECTION OF COMPLIANCE AND DIGITAL DATA Organizations of all sizes and shapes must comply with government and industry regulations.
More informationChecklist: Credit Union Information Security and Privacy Policies
Checklist: Credit Union Information Security and Privacy Policies Acceptable Use Access Control and Password Management Background Check Backup and Recovery Bank Secrecy Act/Anti-Money Laundering/OFAC
More informationTest Data Management for Security and Compliance
White Paper Test Data Management for Security and Compliance Reducing Risk in the Era of Big Data WHITE PAPER This document contains Confidential, Proprietary and Trade Secret Information ( Confidential
More informationManaging Records in Electronic Formats. An Introduction
Managing Records in Electronic Formats An Introduction Jefferson County Public Schools Archives and Records Center November 2012 Managing Records in Electronic Format As we create and use more and more
More informationCASE STUDY CHIEF INFORMATION OFFICER GROUP
CASE STUDY Project description The Chief Information Officer Group is responsible for ensuring that Defence has a dependable, secure and integrated ICT environment that supports Defence business and military
More informationSubject: Kier Group plc Data Protection Policy
Kier Group plc Data Protection Policy Subject: Kier Group plc Data Protection Policy Author: Compliance Document type: Policy Authorised by: Kier General Counsel & Company Secretary Version 3 Effective
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationPrivacy Notice. Lonsdale & Marsh Privacy Notice Version July
Privacy Notice Lonsdale & Marsh understands that your privacy is important to you and that you care about how your personal data is used. We respect and value the privacy of all of our clients and will
More informationEXECUTIVE SUMMARY JUNE 2016 Multifamily and Cybersecurity: The Threat Landscape and Best Practices
Multifamily and Cybersecurity: The Threat Landscape and Best Practices By CHRISTOPHER G. CWALINA, ESQ., KAYLEE A. COX, ESQ. and THOMAS H. BENTZ, JR., ESQ. HOLLAND & KNIGHT Overview Cyber policy is critical
More informationChris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007
Chris Apgar, CISSP President, Apgar & Associates, LLC December 12, 2007 Balancing business & security Security & privacy not all technology Placement of privacy & security - Organizational oversight Importance
More informationWorld Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018
World Wide Jobs Ltd t/a Findmyexpert.com Privacy Policy 12 th April 2018 We understand that you are aware of and care about your own personal privacy interests and we take that seriously. This Privacy
More informationRSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES
RSL NSW SUB-BRANCH STANDARD OPERATING PROCEDURES ISSUED DECEMBER 2018 Table Of Contents 1. Model A sub-branches... 2 2. Model B sub-branches... 6 1 SUB-BRANCH STANDARD OPERATING PROCEDURES (SOPs) These
More informationKeeping the lid on storage
Keeping the lid on storage Drive significant cost savings through innovation and efficiency Publication date: December 2011 Optimising storage performance & costs through innovation As the compute power
More informationBalancing energy and environmental demands
Balancing energy and environmental demands Solutions that optimise the safety and performance of conventional power plants and power station systems. TÜV SÜD South Asia Meet global energy demands As demand
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationEmerging Technologies The risks they pose to your organisations
Emerging Technologies The risks they pose to your organisations 10 June 2016 Digital trends are fundamentally changing the way that customers behave and companies operate Mobile Connecting people and things
More informationGeneral Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant
General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...
More informationThe GDPR data just got personal
GDPR QUICK REFERENCE GUIDE The GDPR data just got personal What it is, what it means and how it affects you The GDPR is a gamechanger for organizations holding, and protecting, personal, identifiable data
More informationThe case for cloud-based data backup
IBM Global Technology Services IBM SmartCloud IBM Managed Backupi The case for cloud-based data backup IBM SmartCloud Managed Backup offers significant improvement over traditional data backup methods
More informationUpdate Windows. Upgrade the organisation. Reshaping ICT, Reshaping Business FUJITSU LIMITED. uk.fujitsu.com
Update Windows Upgrade the organisation FUJITSU LIMITED 2 Baker Street London W1U 3BW Copyright: 2013 Fujitsu Contact: fujitsu.com/uk/contact All rights reserved, including rights created by patent grant
More informationINFORMATION TECHNOLOGY ONE-YEAR PLAN
INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by
More informationManaging Exchange Migration with Enterprise Vault
WHITE PAPER Managing Exchange Migration with Enterprise Abstract: Many organizations today are considering either replacing their legacy mail system, for example GroupWise or ccmail, with Microsoft Exchange
More informationA revolutionary visual security and analytics solution
A revolutionary visual security and analytics solution Vodafone Digital Buildings vodafone.com/iot/security The future is exciting. Ready? It s time to take visual surveillance to the next level Increasing
More informationBusiness Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development
Business Model for Global Platform for Big Data for Official Statistics in support of the 2030 Agenda for Sustainable Development Introduction This note sets out a business model for a Global Platform
More informationTotal Cost of Ownership: Benefits of the OpenText Cloud
Total Cost of Ownership: Benefits of the OpenText Cloud OpenText Managed Services in the Cloud delivers on the promise of a digital-first world for businesses of all sizes. This paper examines how organizations
More informationCertification for Meaningful Use Experiences and Observations from the Field June 2011
Certification for Meaningful Use Experiences and Observations from the Field June 2011 Principles for Certification to Support Meaningful Use Certification should promote EHR adoption by giving providers
More informationWhat you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered
What you need to know about cloud backup: your guide to cost, security, and flexibility. 8 common questions answered Over the last decade, cloud backup, recovery and restore (BURR) options have emerged
More informationInformation Security Data Classification Procedure
Information Security Data Classification Procedure A. Procedure 1. Audience 1.1 All University staff, vendors, students, volunteers, and members of advisory and governing bodies, in all campuses and locations
More informationSlashing Downtime from 24 Hours to 24 Minutes:
Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information
More informationCommon approaches to management. Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C.
Common approaches to email management Presented at the annual conference of the Archives Association of British Columbia, Victoria, B.C. Agenda 1 2 Introduction and Objectives Terms and Definitions 3 Typical
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationOffice 365: Fact Sheet
Office 365: Fact Sheet Microsoft Office 365 from 3C Technology Ltd brings together cloud versions of our most trusted communication and collaboration products with the latest version of our desktop suite.
More informationThe isalon GDPR Guide Helping you understand and prepare for the legislation
The isalon GDPR Guide Helping you understand and prepare for the legislation 01522 887200 isalonsoftware.co.uk Read our guide today to help you plan for the new legislation.. The General Data Protection
More informationCASE STUDY. Building the foundations to enable change
CASE STUDY Building the foundations to enable change ORGANISATION: The BMJ, formerly known as The British Medical Journal, is one of the world s oldest general medical journals, with a history that goes
More informationModernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure
Modernizing Healthcare IT for the Data-driven Cognitive Era Storage and Software-Defined Infrastructure An IDC InfoBrief, Sponsored by IBM April 2018 Executive Summary Today s healthcare organizations
More informationStrategic Choices for 5-digit Dialing at Harborview
Strategic Choices for 5-digit Dialing at Harborview Capital Improvement Council February 27, 2006 D. Scott Mah Assistant Vice President, C&C Service Delivery & Support Computing & Communications Current
More informationBalancing energy and environmental demands
Balancing energy and environmental demands Solutions that optimise the safety and performance of conventional power plants and power station systems. TÜV SÜD South Asia Meet global energy demands As demand
More informationMoving to S/4HANA: 3 Tips for Managing Data to Ensure a Faster and Easier Transition
Moving to S/4HANA: 3 Tips for Managing Data to Ensure a Faster and Easier Transition Dolphin Best Practices White Paper Version: 1.0 Copyright 2018 Dolphin Enterprise Solutions Corporation (dba Dolphin)
More informationPrivacy Policy on the Responsibilities of Third Party Service Providers
Privacy Policy on the Responsibilities of Third Party Service Providers Privacy Office Document ID: 2489 Version: 3.2 Owner: Chief Privacy Officer Sensitivity Level: Low Copyright Notice Copyright 2016,
More informationGetting ready for GDPR. Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions
Getting ready for GDPR Philipp Hobler EMEA Field CTO Global Technology Office Dell EMC Data Protection Solutions GDPR Background Single EU-wide Regulation Harmonizes Global User Data Protection across
More informationBT CNSP - new solutions for health and social care
BT CNSP - new solutions for health and social care The Health and Social Care Network (HSCN) will provide a reliable and efficient way for health and social care organisations to access and exchange information.
More informationShaping the Cloud for the Healthcare Industry
Shaping the Cloud for the Healthcare Industry Louis Caschera Chief Information Officer CareTech Solutions www.caretech.com > 877.700.8324 Information technology (IT) is used by healthcare providers as
More informationOfqual. Ofqual Supporting a Cloud-First Programme. Client Testimonial
Ofqual Ofqual Supporting a Cloud-First Programme Client Testimonial 2017 CoreAzure Limited. All rights reserved. This document is provided "as-is". Information and views expressed in this document, including
More informationhow to manage risks in those rare cases where existing mitigation mechanisms are insufficient or impractical.
Contents Introduction... 2 Purpose of this paper... 2 Critical Infrastructure Security and Resilience... 3 The National Security Environment... 5 A Proactive and Collaborative Approach... 7 Critical Infrastructure
More informationDESIGNING AN ACTIVE ARCHIVE
DESIGNING AN ACTIVE ARCHIVE Guidelines and Considerations for Archive Success Author: Marketing Version: 1.3 Date: 3 July, 2013 Status: Released Distribution: General Distribution www.qstar.com Copyright
More informationNETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS
NETWORK UPGRADE SOLUTIONS YOUR GUIDE TO UNIFIED CRITICAL COMMUNICATIONS Where are unified critical communications heading? What is the place of radio in a unified communication environment? What solutions
More informationBefore Searching for Solutions It s All About the Data
Before Searching for Solutions It s All About the Data Stephen Watts - Federal Strategist for Information Governance Does your garage look like this? 2 The Real Problem With Data Growth TIME $ PROBLEMS
More informationREVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009
APPENDIX 1 REVIEW OF MANAGEMENT AND OVERSIGHT OF THE INTEGRATED BUSINESS MANAGEMENT SYSTEM (IBMS) January 16, 2009 Auditor General s Office Jeffrey Griffiths, C.A., C.F.E. Auditor General City of Toronto
More informationA long and rocky road
A long and rocky road Luxembourg s Government path towards true Web Accessibility Presentation at Funka s Accessibility Days on 10 April 2019 in Stockholm Table of contents 1. Context 2. Short history
More informationGDPR Workflow White Paper
White Paper The European Union is implementing new legislation with the objective of protecting personal data of citizens within the EU and giving them more control over how their data is used. Hefty fines
More informationOracle Buys Automated Applications Controls Leader LogicalApps
Oracle Buys Automated Applications Controls Leader LogicalApps To strengthen Oracle s Governance, Risk and Compliance Suite with Real-time Policy Enforcement October 26, 2007 Disclaimer The following is
More informationBirmingham Community Healthcare NHS Foundation Trust. 2017/17 Data Security and Protection Requirements March 2018
1.0 Executive Summary Birmingham Community Healthcare NHS Foundation Trust 2017/17 Data Security and Protection Requirements March 2018 The Trust has received a request from NHS Improvement (NHSI) to self-assess
More informationAWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE
AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
More informationHow to avoid storms in the cloud. The Australian experience and global trends
How to avoid storms in the cloud The Australian experience and global trends Discussion Topics 1. Understanding Cloud and Benefits 2. KPMG research The Australian Experience and Global Trends 3. Considerations
More informationGreen Governance Growth
G3 Data Centers Green Governance Growth DELIVER MORE WITH LESS The economic downturn changed the dynamics of the business world. It shifted the measure of success, driving companies to rethink how they
More informationSCHOOL SUPPLIERS. What schools should be asking!
SCHOOL SUPPLIERS What schools should be asking! Page:1 School supplier compliance The General Data Protection Regulation (GDPR) comes into force on 25 May 2018 and will be applied into UK law via the updated
More informationDisaster Recovery Is A Business Strategy
Disaster Recovery Is A Business Strategy A White Paper By Table of Contents Preface Disaster Recovery Is a Business Strategy Disaster Recovery Is a Business Strategy... 2 Disaster Recovery: The Facts...
More informationFrequently Asked Questions: TransVault Migrator for Google
Q1. What is TransVault for Google?... 1 Q2. Why not just import our legacy archive to Google via PST files?... 1 Q3. Can TransVault help manage what we upload into Google?... 2 Q4. Does TransVault support
More informationGeneral Data Protection Regulation April 3, Sarah Ackerman, Managing Director Ross Patz, Consultant
General Data Protection Regulation April 3, 2018 Sarah Ackerman, Managing Director Ross Patz, Consultant Introductions Sarah Ackerman, CISSP, CISA Managing Director, Cincinnati Responsible for overall
More informationCompany presentation Transition and Transformation
Company presentation Transition and Transformation FORNEBU 7 DECEMBER 2017 CFO HENRIK SCHIBLER EVRY PUBLIC The IBM Partnership offers accelerated transformation of operations, delivering increased flexibility
More informationGuidance for Exchange and Medicaid Information Technology (IT) Systems
Department of Health and Human Services Office of Consumer Information and Insurance Oversight Centers for Medicare & Medicaid Services Guidance for Exchange and Medicaid Information Technology (IT) Systems
More informationMid-Kent ICT Services Technology Strategy. Author: Tony Bullock Date: September 2013 Version: 019
Mid-Kent ICT Services Technology Strategy Author: Tony Bullock Date: September 2013 Version: 019 Contents Background and purpose... 2 Key deliverables... 3 Benefits... 3 Principles... 3 Work anywhere,
More informationBusiness Architecture in Healthcare
Business Architecture in Healthcare ehealth IS CREATING A PERFECT STORM FOR CHANGING HEALTHCARE DELIVERY Office of the CIO Delivering ehealth Ireland Healthcare is a system of relationships Test Harness
More informationIBM Compliance Offerings For Verse and S1 Cloud. 01 June 2017 Presented by: Chuck Stauber
IBM Compliance Offerings For Verse and S1 Cloud 01 June 2017 Presented by: Chuck Stauber IBM Connections & Verse Email and collaboration platform designed to help you work better Empower people Teams are
More informationIt applies to personal information for individuals that are external to us such as donors, clients and suppliers (you, your).
Our Privacy Policy 1 Purpose Mission Australia is required by law to comply with the Privacy Act 1988 (Cth) (the Act), including the Australian Privacy Principles (APPs). We take our privacy obligations
More informationPathways CIC Privacy Policy. Date Issued: May Date to be Reviewed: May Issued by Yvonne Clarke
Prepared by: M Franklin Issued: May 2018 Pathways Community Interest Company Review due: May 2020 Pathways CIC Privacy Policy Version 0.3 Approved by: Yvonne Clarke Approval date: 21.05.2018 Pathways CIC
More informationENCRYPTION IN USE FACT AND FICTION. White Paper
White Paper Table of Contents The Case for Encryption... Encryption in Use Not Some Kind of Magic... Evaluating Encryption in Use Claims... 3 4 4 The Vaultive Approach... 5 2 Risk-conscious enterprises
More informationHCL GRC IT AUDIT & ASSURANCE SERVICES
HCL GRC IT AUDIT & ASSURANCE SERVICES Overview The immense progress made in information and communications technology offers enterprises outstanding benefits. However this also results in making the risk
More informationFrequently Asked Questions Customers
Important Updates on Maintenance Plans Frequently Asked Questions Customers This document answers frequently asked questions about maintenance plan changes as we move to one business model. Updated: May
More informationGDPR Update and ENISA guidelines
GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure
More informationThe New Healthcare Economy is rising up
The New Healthcare Economy is rising up February 2017 The ever-rising costs of healthcare are fostering innovative solutions and disruptive business models Cybersecurity concerns come to medical technology
More informationCommissioner Ian Dyson SRO, National Enabling Programmes IMORCC
Commissioner Ian Dyson SRO, National Enabling Programmes IMORCC 24 January 2018 National Enabling Programmes Chiefs Council. January 2018 The Sympathy Card What are the major components that the NEP programme
More information