An accessible version of this content is available upon request. Please submit requests to...

78
An accessible version of this content is available upon request. Please submit requests to [email protected]. Information Governance: Securing data to manage risk Pablo Sáez Montequín Enterprise Account Executive [email protected] | @psaez

Transcript of An accessible version of this content is available upon request. Please submit requests to...

Page 1: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

An accessible version of this content is available upon request. Please submit requests to [email protected].

Information Governance: Securing data to manage riskPablo Sáez Montequín

Enterprise Account Executive

[email protected] | @psaez

Page 2: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Agenda

• Why implement Governance• Compliance, Risk, and Privacy• Out of the Box Information

Management• Solutions and Summary

Page 3: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Why Implement Governance

Page 4: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Importance of Information Governance

20%

CIOs

in regulated industries will lose their jobs for failing to implement discipline of information governance

Gartner Research: 2016 Prediction

Page 5: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

How Much Governance is Needed?

Personal/My Sites

Governance

Visi

bilit

y

Project/Team Sites

Community Sites

Portal

Page 6: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Customization Adoption Continuous Improvement

Operations Information Architecture

Information Management

Project Management Leadership

Infrastructure

Typical Policy Categories

Page 7: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Define the Technical

Architecture

Drive Adoption

Establish Business

Requirements Drive Governance and Change

Management

How SharePoint is Deployed

Page 8: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Establish Business

Requirements

Develop a Governance

Plan

Define the Technical

Architecture

Drive Adoption and

Change Management

How SharePoint should be Deployed

Page 9: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

SharePoint is down due to bad

code/cannot upgrade

Users loose faith “I will use dropbox”

We will fix next version migration

Breaking SharePoint Boundaries

Search results are too generic

Pure ChaosNo capacity

planning(read budget!)

Everyone is to blame (SP Admin)

No way to know what to recover

when

Typical Issues with No Governance

Page 10: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Compliance, Risk and Privacy

Page 11: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Compliance Standards for Consideration Accessibility Compliance Section 508 and 508 Refresh Web Content Accessibility Guidelines (WCAG) 1.0 Web Content Accessibility Guidelines (WCAG) 2.0 Canadian Government common Look and Feel

Privacy Compliance Gramm-Leach Bliley Act (GLBA) California SB1386 and AB 1950 European Union Safe Harbor US Section 208 Privacy Act of the USA UK Data Protection Act Health Insurance Portability and Accountability Act (HIPAA) Canadian Personal Information Protection and Electronic Document Act (PIPEDA) European Union Data Protection Directive 1995/46 European Union Privacy and Electronic Communications Directive 2002/58

Others• Records Management

• Sarbanes Oxley (SOX)• Operational Security (OPSEC)• Export Control Requirements (ITAR)• Brand and Site monitoring

• Bad or Broken Links• Metadata Policy• Improper words or phrases• Identity mismanagement• Marketing Standards

• Metadata Policy• Risk Level Tagging• Dublin Core Metadata Initiative • Z39.50 Tagging• Custom Vocabularies• Pointer Records

Page 12: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Information must be accessible and available to the people who should have access to it and protected from the people who should not

Further this information may need to be stored, archived and preserved for some period of time

These laws have common elements

Page 13: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Confidentiality leaks—Compromised privacy

Loss of data integrity

No access to or availability of data

Some specific risks to consider…

Page 14: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

How Much Compliance is Needed?

Personal/My Sites

Visi

bilit

y

Project/Team Sites

Community Sites

Portal

Compliance

Page 15: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Out of the Box Features

Page 16: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Management controls and scopesServi

ce Applica

tion

Configuration and Data

Farm

Web Application Service ApplicationZone

Content DB

Site collection

Top-level site

List/Library

[Folder]

Item / Document

Sub site Sub site

Security Permissions

Features

SSL

SharePoint Service Isolation

Quotas

Security Permissions

Ownership

(Full Control)

Web Application

Blocked File Types

Data Storage

SLAs

Page 17: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Some limitsLimit Max Value Limit Type Notes

Web App 20 per Farm Supported Limit the # web apps; use Host Named SC

Content DB 500 per Farm Supported Perf hit on new SC; CA UI

SC per CDB 10K max2500 non-MySites

Supported Issues with upgrade speed; > #SC -> < SC KB; use Set-SPContentDatabase -WarningSiteCount

SC per Farm 750K Supported

Maximum size of documents pulled down by crawler

64 MB (3 MB for Excel documents)

Boundary

Page 18: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Some new SP2013 features on this topic

Central Hub Export to NTFS Preserve in Place

eDiscovery Identity Content Mgmt S2S authentication Login tokens in DCS Store and App

Catalog

Site Based Retention Cross-site Publishing Site Policies

From 2007 and 2010: Self Service Sites; Content Types; Metadata Publishing; Information Management;

Page 19: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

How we will Proceed with OOTB features

Central Administration - Service Applications (Shared)

Central Administration - Settings

Site Collection Settings

Site Settings

Page 20: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

On-PremiseFarm

SOCIAL INTRANETTEAMS

Site collection

Marketing

Content DB

Site collection

HR

Content DB Content DB

Site collection

Intranet Home

HRMarketingFinance

Don’t panic – plan with end in mind… Example IA

EXTRANET TEAMS*

Content DB

Site collection

Finance

<LOB>APPS

ServiceFarm

PROFILESEARCH BCSMETADATA

Page 21: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Central Administration

Page 22: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Service Applications

Page 23: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Create Term Sets for Policies

Page 24: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Information Management Policy

Page 25: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Manage Information Management Policy

Page 26: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Site Usage Policy

Page 27: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Manage Site Usage

Page 28: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Site Policies – Self Service Site Creation

Page 29: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Allow for Site Classification (retention only!)

Page 30: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

You must tie the MMDS to a CTSH

Page 31: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 32: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Bridging the Gaps

Who is the business owner?

What is the criticality of the site?

Business Approval?

Chargeback or cost model?

Page 33: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Site Collection

Page 34: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Building the Policies

Configure SC Audit Settings

Configure Content Type Policy (IRM)

Configure Site Policy (Closure).

Create Content types, Site Columns.

Page 35: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Configure Audit Settings

Page 36: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Configure Content Types Policy Templates

Page 37: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Labels have been Deprecated in SP2013

Labels are available for use by default!

Page 38: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

On-PremiseFarm

SOCIAL INTRANETTEAMS

Site collection

Marketing

Content DB

Site collection

HR

Content DB Content DB

Site collection

Intranet Home

HRMarketingFinance

Don’t panic – plan with end in mind…

EXTRANET TEAMS*

Content DB

Site collection

Finance

<LOB>APPS

ServiceFarm

PROFILESEARCH BCSMETADATA

Page 39: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Don’t panic – plan with end in mind - (IM)Managed Metadata

Term Set

Content Hub

Site Policies

Content Types

Site Columns

Web Apps

Intranet• HR• Employee Benefits• Performance

Personal• PSaez• CCoba

Page 40: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Create a new Site Collection (template)

Page 41: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Configure Site Policy

Page 42: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 43: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 44: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 45: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 46: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Edit the Content Type Policies

Page 47: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 48: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 49: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 50: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 51: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 52: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 53: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Run the jobs or wait….

Page 54: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 55: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 56: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 57: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Site

Page 58: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 59: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 60: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 61: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 62: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 63: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 64: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Page 65: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Where are the gaps?

Page 66: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Gaps

How/Can you enforce it?

Can users leverage this?

How do you tie this into the SLA?

What about access (permissions)?

Page 67: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Scenario 1: NDA delivered to Client• Attorney:• Member of Legal Group

• Container Security:• Legal Group Only

Client A Site

Client B Site

Client A NDA

Are security permissions enough?

Page 68: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Scenario 2: Fire Walls in a Bank

• Trust and Investment Banker• Contoso in investment fund• Fund manager divest half of

Contoso stock

• Commercial Loan Officer Approval• Contoso ask for a loan for

machinery• Contoso is denied the loan

SEC now audits to see if insider trading occurs. First auditors checks permissions, find sharedpermissions in the employees personal sites.

Commercial Loan Officer has a personal site where anyone in the bank can access files andThey accidently posted loan worksheets there….. Since these are personal sites thereIs no audit logs

Page 69: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Scenario 3,4,5…

• PII• HIPAA, HiTECH, PHI• FERPA

• Accessibility• ITAR• PCI, SOX….

Page 70: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Summary

Page 71: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Compliance Standards for Consideration Accessibility Compliance Section 508 and 508 Refresh Web Content Accessibility Guidelines (WCAG) 1.0 Web Content Accessibility Guidelines (WCAG) 2.0 Canadian Government common Look and Feel

Privacy Compliance Gramm-Leach Bliley Act (GLBA) California SB1386 and AB 1950 European Union Safe Harbor US Section 208 Privacy Act of the USA UK Data Protection Act Health Insurance Portability and Accountability Act (HIPAA) Canadian Personal Information Protection and Electronic Document Act (PIPEDA) European Union Data Protection Directive 1995/46 European Union Privacy and Electronic Communications Directive 2002/58

Others• Records Management

• Sarbanes Oxley (SOX)• Operational Security (OPSEC)• Export Control Requirements (ITAR)• Brand and Site monitoring

• Bad or Broken Links• Metadata Policy• Improper words or phrases• Identity mismanagement• Marketing Standards

• Metadata Policy• Risk Level Tagging• Dublin Core Metadata Initiative • Z39.50 Tagging• Custom Vocabularies• Pointer Records

Page 72: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

AvePoint Compliance GuardianCompliance Guardian helps organizations: • Address Operational Security (OpSec) and Sensitive

Security Information (SSI) requirements and securely manage highly sensitive data.

• Identify and take action to protect environments from privacy violations.

• Ensure that content complies with requirements for site quality, brand management, and maintains a consistent look and feel across the organization.

• Easily validate IT systems, applications, and content against standards-based and custom organizational policies for accessibility.

File Systems ComplianceSharePoint ComplianceWeb Compliance

Page 73: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Management controls and scopesServi

ce Applica

tion

Configuration and Data

Farm

Web Application Service ApplicationZone

Content DB

Site collection

Top-level site

List/Library

[Folder]

Item / Document

Sub site Sub site

Security Permissions

Features

SSL

SharePoint Service Isolation

Quotas

Security Permissions

Ownership

(Full Control)

Web Application

Blocked File Types

Data Storage

SLAs

Page 74: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

AvePoint Governance AutomationDocAve Governance Automation• Microsoft SharePoint as a service• SharePoint Content Management• SharePoint Permissions Management• SharePoint Provisioning• SharePoint Lifecycle Management

Based on a Service Catalog with Service Descriptions for full lifecycle support and multilevel approvals

The DocAve Difference: Using the entire DocAve 6 platform as a foundation for governance policy enforcement – including modules for migration, data protection, administration, storage optimization, compliance, and reporting

Page 75: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Continuous Improvement Lifecycle

Mixed Junk IN

Filter for CompliancePrioritize for Business Need

Structure for Governance

Organized Gold OUT

Page 76: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Our Strengths: About AvePoint

Technologies

Support CommunityServices

Solutions Partners

Page 77: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Our Resources: Learn More AvePoint

Visit www.AvePoint.com/Resources Customer Success Stories

eTutorial VideosWhite Papers

Page 78: An accessible version of this content is available upon request. Please submit requests to Marketing@AvePoint.com. Information Governance: Securing data.

© 2013 AvePoint, Inc. All rights reserved. No part of this may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written consent of AvePoint, Inc. An accessible version of this content is available upon request. Please submit requests to [email protected].

Our Goal: Your Satisfaction

Contact Sales

DocAve.com

[email protected]

AvePoint.comUS: 1-800-661-6588