Assessing Your Data Maps in a Newly Distributed World

By Jennifer Bantelman

Data Mapping for the New Normal

Understanding all of the systems being used across your company has been a growing challenge for many years, with many companies just starting to get a handle managing a data map of all the applications that are in use.

Now, in light of the “new normal” of distributed teams, it’s time to reassess. Did you have to add virtual access systems for sensitive on premises data? What collaboration and conferencing tools have had to be added?

In July’s PREX Summit Series webcast on Assessing Your Data Maps in a Newly Distributed World, our expert panel set out to answer these questions and more.

This session’s panelists were Deanna Blomquist, Sr Manager or IT-eDiscovery at Dish Network; Charisse Fletcher, Assistant VP, Discovery Operations at JPMorgan Chase; and Ryan Zilm, Director of Information Lifecycle Mgmt at USAA. The session was moderated by Dan Nichols, Partner at Redgrave LLP.

What is a Data Map?

There are several components of a good data map. Some of the key components to include are:

  • Data Sources: What systems are in use? What metadata do they include?
  • Location/s of Information: Is the system cloud based or on premises? Who has access?
  • Categories of Information: What is the risk profile of this data? What is the business criticality? Is this regulated data? Are there any additional security concerns?
  • Retention Policies: What, if any, retention schedule is in place for this data? Can it be disabled or does a hold require collection to preserve?
  • Business and Technical Owners: Who understands the business use of the system? Who administers it from a user perspective? A technical perspective? Whose budget does it come from?
  • Format and Export Format: Determine if the data is structured or unstructured. Is it searchable? Do you have a way to get data out of the system? What format will it be in, and is it readable?

When considering locations of information and the risk profile, it is important to consider that when moving from on premises systems to systems that are managed by 3rd parties, cloud based systems often mean that, while you will have less maintenance burden, you probably won’t have a lot of control over export formats. Understand what the system does by default, and what can be configured.

With COVID-19 moving many businesses into semi-permanent working from home arrangements, there has been a significant increase in Zoom, Google, Teams, and other online real-time video, collaboration and live chat sessions.

As part of your data mapping, it is critical to consider what systems have been rolled out recently due to this additional usage. Make sure these are reflected in your data map, and that you understand the functionality, especially around recordings of video, audio, and screen sharing, locations of the data, and any retention schedules.

Remember that not all data is equal. Consider including an information risk matrix to identify the most critical systems, and start with those to drive risks down. Technology can assist with this; systems can go out and ping information and bring it back so that you understand the data that you are capturing.

It is also important to consider the types of data, as well as any limitations. Yes, most of your data may be ESI, but don’t forget about legacy systems and any special considerations. This may include physical documents, and bear in mind that you may also have documents or systems that degrade over time.

Why Create a Data Map?

Obviously, there are a lot of considerations in putting together your data map, and keeping it updated is a constant challenge. In order to do it in a way that is going to make sense for your organization, consider the reason or how you might leverage your data map

  • Litigation Readiness and Discovery
    The primary use for your data map may likely be litigation. You need to be able to respond in a timely manner in a way that is defensible. This will be much easier to do if you start out already understanding what and where data typically lives.
  • Retention Schedules
    A data map generally includes the retention schedule for each data source. Leverage this map so that you don’t have to manage retention schedules somewhere else. Be collaborative and make the data map as useful as possible cross-functionally, and that will make it that much easier to keep up to date.
  • Privacy and Compliance
    If your business has systems that contain PII, you should have flags on this data so you understand which regulations are applicable to various acts and regulations.
  • Regulatory Response
    Know what data sources typically need to be produced for regulatory bodies, and what formats and timelines will be required. Know that a regulatory data map will likely need more complexity than one for litigation readiness only.

Final Tips for Creating and Maintaining a Data Map

Map the who: consider not just who the data map might be for but also who owns the system from a business and technical perspective. This should be a cross-functional effort and will need periodic reassessment. Often people change more frequently than the systems with which they work.

Consider surveying system owners and potential system owners to get a better overview of your data, and learn about new systems that might not be enterprise wide. Challenge the information you get back, because filling out these surveys as a data steward probably isn’t their day jobs, so ask probing questions to validate the responses you get back. Leverage your stakeholders, and don’t forget to support them as well.

Map the what: structured data and unstructured data may be managed and accessed very differently, as can Cloud and On Premises systems. When you understand the “what” this will guide your reassessment schedule to make sure the data map stays fresh. Consider as well what protections you may have in contracts with third parties who host your data.

Overall, it’s important to begin with the purpose in mind, so that your data map is built for the need at hand, and you avoid both over-engineering and missing critical components. Start with the systems that have the highest risk or regulatory burdens on them, and remember to reassess on an ongoing basis.

 

Author

  • Jennifer Courchaine

    Jennifer (Bantleman) Courchaine is a technologist focused on strategy, customer experience, workflow, and process improvement in legal tech. She has worked in software and technology for over 15 years, is a Certified e-Discovery Specialist, and holds an M.A. in Strategic Communication. She is currently the Vice President for Customer Success & Global Support for Exterro, where she ensures customers receive world class support and services, and that product feature functionality and technical capabilities are designed and implemented in ways that solve real world problems. Jennifer is a speaker and content contributor on a variety of technology, data preservation and ediscovery issues, and is the Chair of the XChange Global Conference.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.