Backups And Disaster Recovery Are Not The Same Thing

Backups And Disaster Recovery Are Not The Same Thing

Backups And Disaster Recovery Most business owners are aware of the consequences of losing data. Much of the value of a modern business is in its data: customer records, analytics, marketing data, product catalogs, bookkeeping and accounting data, emails and other communication data — the
How to Transform Your Operating Model for the Cloud

How to Transform Your Operating Model for the Cloud

Transform Your Operating Model It can be tough for established organizations to embrace change, so when they start working with cloud-based technology, they're bound to encounter hurdles. While some companies transform themselves, others lag behind. So what gives? In truth, it’s not so much about the

Lawsuits and Legacy

Many people envision technology as purely a forward-looking thing, with new approaches to commerce and communications offering increased levels of security and profitability. Although this is indeed the case, it is also important to keep an eye on the past, in terms of the documents and activities that become part of every company’s legacy. This can become a dangerous and expensive proposition if litigation ever becomes an issue.

When a company faces legal action, either from an individual, or as part of a class action, one of the most expensive and time-consuming activities involves the need to pore over millions of documents, including day-to-day emails and texts, as part of the discovery process. The legal team might not even know what they are looking for specifically, but even the most innocuous late Friday afternoon joke of the day might end up becoming something that sways a judge much further down the road.

legal

Avoidance of costly damages and of litigation in particular is based in a great measure on preparedness – keeping all of one’s records, files and other material in good order, and easily findable. It is one of the key pieces of guidance that legal professionals willingly offer: keep everything in order, above board, and to a minimum.

For CIOs, this means reviewing the ways in which communication happens within a business. Over the past decades, email has grown into a communications lifeblood, and one that seems to be essentially free. But email is not free. Firstly, its lack of context often leads to misunderstandings or the need for repetition. In many cases, an issue or idea can be more effectively dealt with through live conversation, but email appears so much more convenient. It is also an emotional shield. People tend to hide behind emails because it seems easier than actually engaging in a conversation. Thirdly, email is not as free as it seems. The time that employees take to read, reply to and compose emails is often time that could be better applied elsewhere. Its false immediacy makes people feel the need to respond right away, which incorrectly reprioritizes email to the top of the pile. And finally, there is just too much of it. People are cc’d and included in ways they do not need. All of this costs time and therefore costs money.

New Technologies Increasing Productivity

shutterstock_275245592

New technologies are now available that can replace email with far more productive and time-efficient communications and collaborations techniques, allowing companies to redesign their habits with both brevity and priority in mind. Wouldn’t companies want their employees focusing their attention on their most important, profitable tasks?

Similarly, there is a duty of care that workplaces owe to employees and customers with regard to safeguarding data. Breaches and hacks can come from anywhere and start from anywhere, and in many cases their origins are internal, either from innocent mistakes or sabotage. Much of this damage can be prevented by deploying watchdog technology that constantly observes data activity upon a network. But even in cases where an attack or breach has already happened, part of the restoration and damage-containment strategy will depend on a company’s record of how well it proactively looked after the material.

The message that these scenarios brings to CIOs is that a company’s legacy, in terms of stored communications data and network activity, may come back to haunt those who have not taken care to manage and minimize it. As they guide their organizations forward into the new world of IT, they should take stock of the opportunity to both adopt new, better practices for communicating, and simultaneously ensuring that legacy material will withstand scrutiny.

By Steve Prentice

This post is brought to you by The CIO Agenda.

KPMG LLP is a Delaware limited liability partnership and is the U.S. member firm of the KPMG network of independent member firms affiliated with KPMG International Cooperative (“KPMG International”), a Swiss entity. The KPMG name, logo and “cutting through complexity” are registered trademarks or trademarks of KPMG International. The views and opinions expressed herein are those of the authors and do not necessarily represent the views and opinions of KPMG LLP.

(The author of this paper is not a lawyer. This document should not be construed as direct legal advice).

Steve Prentice

Steve Prentice is a project manager, writer, speaker and expert on productivity in the workplace, specifically the juncture where people and technology intersect. He is a senior writer for CloudTweaks.

TOP ARCHIVES

Built to Last: Choosing the Right Infrastructure Partner for Your Game

Built to Last: Choosing the Right Infrastructure Partner for Your Game

Choosing the Right Infrastructure Partner There are millions of gamers around the globe, and according to gaming market research firm ...
How the Cloud Will Transform in the Next Decade

How the Cloud Will Transform in the Next Decade

Transformative Cloud Silicon Valley is easy to stereotype: the gadgets, the startup perks, the culture and mentality. However, the real ...
Why Tomorrow’s Leaders MUST Embrace the Economics of Digital Transformation

Why Tomorrow’s Leaders MUST Embrace the Economics of Digital Transformation

Embrace the Economics of Digital Transformation Why should companies care about Digital Transformation?  Yes, I know it appears as yet another ...
China Ascendant? Maybe, Maybe Not

China Ascendant? Maybe, Maybe Not

China seems to be beating us at leadership in tech in just about every category. In a decade they are ...
Apcela

Industrial IoT will reshape network requirements

Industrial IoT The hype around IoT may have been surpassed this year by breathless coverage of topics such as artificial ...
Data Vulnerability Tools

Data Vulnerability Tools

DATA VULNERABILITY TOOLS BREACH LEVEL INDEX The service provided by The Breach Level Index tracks publicly disclosed data breaches and offers a risk assessment service. Their Risk Calculator enables you to check your risk score and assess breach level severity ...
12 Promising Business Intelligence (BI) Services For Your Company

12 Promising Business Intelligence (BI) Services For Your Company

Business Intelligence Companies and Services Business Intelligence (BI) services have recently seen an explosion of innovation and choices for business owners and entrepreneurs. So many choices, in fact, that many companies aren’t sure which business intelligence company to use. To ...
Load Testing Tools

Load Testing Tools

LOAD TESTING TOOLS SMARTBEAR LoadComplete is software that simulates users and creates realistic load tests. No coding is required. Users can generate traffic via the cloud, virtual machines, and also use on premise computers for load testing. Location-based profiles are ...

Cloud Community Supporters

(ISC)²
AWS
HPE
CA Technologies
Cisco

Cloud community support comes from sponsorship, service opportunities and collaborative network partnership initiatives.