Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

'G TH E W /ÙUtUy A-

In c o n g r e s s . J

a îttm o t5 ^ ccfarctftott oftft iSaittn nwtie^ Si


'------- ® fc.,
, Xkfyéÿi**^ /i> U f4 * ^ / 4 f ^ Mm.4 ^ é * t é ^ ^4»*>
j4hm i i n A r r . À ^ é / M é
f,-4 /. .^yyX, • ^ ^ ■ fj^ riV rf______

EN CYCLO PED IA
OF ARCHIVAL
SC IEN C E

EDITED BY
Luctana Duranti
AND
Patricia C. Franks
218 Functional Analysis

(Foscarini 2012). Sociology, social-psychology, International Council of Archives (ICA). Interna­


theory of administration, management science, and tional Standard fo r Describing Functions (ISDF).
organizational theory (with particular regard to 2007. www.ica.org/10208/standards/isdf-intema-
organizational culture) are among the disciplinary tional-standard-for-describing-functions.html (ac­
approaches that may help archivists and records cessed July 2014).
managers get a better understanding of function. Jenkinson, H. A Manual o f Archive Administration,
2nd edition. London: Percy Lund, Humphries &
Conclusion Co., 1965 [1937].
New South Wales (NSW) State Records Authority.
Because records are the product of functions and “Keyword AAA.” n.d. www.records.nsw.gov.
contribute to the accomplishment o f functions, the au/recordkeeping/resources/keyword-products/
concept of function is used as a pillar of archival keyword-aaa (accessed July 2014).
methodology throughout a record’s lifecycle. Nev­ Sabourin, P. “Constructing a Function-Based Clas­
ertheless, due to the ambiguous nature and complex sification System: Business Activity Structure
relationship of function with the other components Classification System.” Archivaria 51 (2001):
o f a record’s context (e.g., structure, human agents), 137-54. http://joumals.sfu.ca/archivar/index.php/
defining what function is and how it relates to any archivaria/articIe/view/12797/13999.
kinds of subfunctions and to the structural features Samuels, H. W., ed. Varsity Letters. Documenting
of organizations is arduous and requires further re­ Modern Colleges and Universities. Metuchen, NJ,
search. —Fiore lia Foscarini and London: Society of American Archivists and
Scarecrow Press, 1992.
Keywords: function, activity, transaction Schellenberg, T. R. Modern Archives: Principles
Related Entries: Access/Accessibility; Appraisal; and Techniques. Chicago: University o f Chicago
Archival Arrangement; Archival Description; Press, 1956.
Functional Analysis; Formal Analysis; Records Thornton W. M., ed. Norton on Archives. The Writ­
Classification ings o f Margaret Cross Norton on Archival and
Records Management. Carbondale and Edwards-
ville: Southern Illinois University Press, 1975.
Bibliography
Bearman, D., and R. H. Lytle. “The Power of the FU N C T IO N A L AN A LYSIS
Principle of Provenance.” Archivaria 21 (1985-
1986): 14-27. http://journals.sfu.ca/archivar/in- Functional analysis, used as a phrase, has never
dex.php/archivaria/article/view/11231/12170. been treated in the records literature as a stand­
Cook, T. “Mind over Matter: Towards a New The­ alone topic, that is, as the title of a dedicated article
ory of Archival Appraisal.” In B. L. Craig, ed.. or standard. Instead, it is associated predominantly
The Archival Imagination: Essays in Honour o f with the writings on archival appraisal. Less in the
Hugh A. Taylor. Ottawa: Association of Canadian form of the exact expression and more in its varia­
Archivists, 1992, 38-70. tions, such as “functional approach” or “function-
Foscarini, F. “Understanding Functions: An Or­ based approach,” the topic is also associated with
ganizational Culture Perspective. Records the management of current records, that is, with
Management Journal 22 (1) (2012): 20-36. the control of the creation, capture, classification,
DOLlO.l 108/09565691211222072. and disposition of records. Although the generally
Hurley, C. “Ambient Functions: Abandoned Chil­ promoted notion of understanding or studying the
dren to Zoos.” Archivaria 40 (1995): 21-39. functions of records-creating organizations for other
http://journals.sfu.ca/archivar/index.php/archi- records purposes such as arrangement, description,
varia/article/download/12095/13080. and access is also discernible in the literature, this
------- . “What, If Anything, Is a Function?” Ar­ type of discussion lacks a noticeable degree of cohe­
chives and Manuscripts 21 (2) (1993): 208-18. siveness and synthesis in presenting function-related
Functional Analysis 219

arguments. For this reason, this entry focuses on individual organizations and types of organizations,
functional analysis in the context of archival ap­ such as scientific institutions and colleges/universi-
praisal and current records management, and in par­ ties. However, no general methods for carrying it
ticular, within the latter, on records classification, out were introduced. Varsity Letters exemplified
as records classification joins together and manifests one procedural step, consisting of deriving catego­
records creation and capture on the one hand, and ries and terms from “a careful examination of the
serves as foundation for disposition on the other. literature on higher education, and particularly the
vocabularies this community uses to describe and
evaluate itself,” and then consider “the categories
Functional Analysis and Archival Appraisal
and concepts familiar to the archivists responsible
The term functional analysis was introduced in for these records” (Samuels, 132).
Helen Samuels’s 1992 article, “Improving Our In contrast, macroappraisal considers “functional
Disposition: Documentation Strategy,” along with analysis” its “theoretical and methodological core.”
the qualifying term institutional. To be accurate, the Without the benefit of a dedicated definition, the
phrase functional analysis appeared earlier in her “theoretical core” likely refers to the assumptions,
1986 article, “Who Controls the Past,” published as reflected by the concept of function, on “what
in The American Archivist, but only once, and as is valuable and what is not, what is worth remem­
a general term. The 1992 article, which is primar­ bering by society and what is not, what should
ily based on the introduction section of her book become archives and what should be destroyed”
Varsity Letter, Documenting Modern Colleges and (Cook 2004, 5-6), and the “methodological core”
Universities, formally presented “institutional func­ refers to “researching, understanding and evaluat­
tional analysis” as “a new tool to supplement archi­ ing the degree of importance of the legislation,
val practice . . . and revamp it.” Archival practice regulations, policies, mandates, purposes, functions,
here was used to include “appraisal,” “selection,” programmes, decision-making processes and delib­
“acquisition,” and “collection analysis” (Samuels, erations, the internal organisation and structures,
128). The term, however, was not accompanied by a organisational culture and communication patterns,
definition, nor were its relationships with those ar­ the liberty and flexibility allowed to public servants
chival practices specifically explained. The discus­ to interpret policy and thus implement it in varying
sion involved general all archival practices, without ways, and, out of all this, the activities and transac­
sufficient differentiation. Moreover, a number of tions of the record creator (the branch, sector or
terms such as functional study, functional approach, programme entity covered by the appraisal project)”
and functional understanding were seemingly used (Cook 2004, 12). Here, functional analysis, in addi­
as synonyms of functional analysis, although the tion to a methodological usage, acquired a theoreti­
synonym-stance was not explicitly stated and none cal underpinning, thus differentiating itself from the
of the terms are defined or elaborated on. In the institutional functional analysis as articulated in the
article the term institution seems to be used to refer documentation strategy, where it is only a “tool”
to two types of institutions: a designated archival or “technique.” Moreover, the analysis component
institution and an organization having an in-house of the macroappraisal functional analysis, as pre­
archival program. According to Samuels, functional scribed by its methodology, is much more intensive
analysis means to understand what institutions do, than that of the institutional functional analysis,
irrespective of organizational structures and the as the former includes many aspects not required
content of records. The analysis of organizational to be examined by the latter, with “internal orga­
structure and records content is considered “tradi­ nization and structures” being the most noticeable
tional” and no longer responsive to archival needs example. Correspondingly, the issue of recurring
arising from contemporary reality. The arguments organizational changes as a supporting argument for
for this assertion are built around two main issues: functional analysis is no longer present, and the jus­
frequently changing structures and unmanageable tification for functional analysis becomes primarily
volume of records. Methodologically, institutional the unmanageable volume of records and the “crisis
functional analysis is stated as applicable to both of preserving electronic records” (Cook 2004, 5)
220 Functional Analysis

There are other discussions of functional analysis to represent the uncovered relationships in a hierar­
in relation to archival appraisal, presenting rather chical fashion. Unlike process and transaction, the
distinct focuses from the aforementioned two. Ger­ term function is not defined, but, as indicated by the
ald Ham explained functional analysis as “an ex­ prescribed basic steps of functional analysis, linked
amination of who created the record and for what to the strategic goals of the organization. Functional
purpose,” and considered it useful for providing analysis distinguishes “operational functions” and
“important clues to the value of a record, especially “administrative functions,” with the former defined
for institutional history,” yet less useful in evaluat­ as those that “meet the unique objectives of the or­
ing “what records tell us about people, places, and ganization” and the latter as those that “support the
phenomena with which the institution dealt with” delivery of the operation functions” (ISO 2008, 8).
(1993, 51-52), hardly resembling any aspect of the The standard recommends conducting functional
functional analysis as advocated in both Samuels’s analysis independently o f organizational structure
documentation strategy and the Canadian macroap­ and rationalizes the recommendation as due to the
praisal. Relying on Mintzberg’s theory on organi­ consideration that “function may be exercised in
zational configuration, Victoria Lemieux proposed more than one location within, or across one or more
to analyze how the structural components of an organizations” (ISO 2008, 6). Structural analysis,
organizational system function rather than what they however, is not ignored but addressed as part of
specifically do (1998, 37-85). Theoretically sub­ “contextual review”—“the foundation for undertak­
scribing to the same assumptions of macroappraisal, ing functional analysis” (ISO 2008, 6). The major
however, the methodological aspect of Lemieux’s outcome of the analysis is a high-level relation­
proposal—^that is, the focus on how—differs signifi­ ship representation model, useful for “determining
cantly from the one developed by Cook. aggregations of records for disposition”—an idea
similar to that claimed by functional analysis for
appraisal and for a “functions-based classification
Functional Analysis and Records Classification
scheme” (ISO 2008, 8).
As a phrase, functional analysis was first used in A function-based classification scheme in the
the Australian national standard AS 5090-2003, context of ISO 15489-2001 refers to a logically
Work Process Analysis fo r Recordkeeping, which established system that identifies and arranges
was subsequently issued in 2008 as an ISO stan­ business activities or records. The analysis of busi­
dard. Functional analysis in this standard conforms ness activity, therefore, becomes synonymous with
theoretically with the requirements of ISO 15489- functional analysis in this sense. For example, the
2001 Information and Documentation—Records Step B in the DIRKS manual is termed “Analysis
Management, that is, operates along the lines of of Business Activity,” producing a hierarchical
the relationship between records and “business representation of functions, activities, and trans­
activity,” with the latter as the sole cause for the actions, which, in turn, serves the need of con­
creation and use of the former. In the standard, structing a function-based records classification
functional analysis constitutes one of the two types (NSW State Records 2007). Another example is the
of analyses that aim at “the creation, capture and methodology developed by Library and Archives
control of records,” which “seeks to group together Canada, called the Business Activity Structure
all the processes undertaken to achieve a specific, Classification System (BASCS), which prescribes
strategic goal of an organization” (ISO 2008, 2). A a classification structure o f function, subfunction,
(work) process in this context means “one or more and activity (Library and Archives Canada 2006).
sequences of transactions required to produce an These developing methodologies maintain the same
outcome that complies with governing rules,” and theoretical stance, by prescribing the adherence to
transaction means “the smallest unit of a work pro­ the operations of an organization embodied in func­
cess consisting of an exchange between two or more tions as the foundation for classifying records—a
participants or systems” (ISO 2008, 2). Functional recommendation made by Schellenberg in his 1956
analysis, therefore, is expected to uncover relation­ book. Modern Archives: Principles and Tech­
ships among functions, processes, and transactions niques, and already proposed by Campbell in 1941.
and, as dictated by its being a top-down approach. They, however, differ in the methodology, most
Functional Analysis 221

noticeably on how to break down or formulate a former focusing on developing an adequate un­
function (Xie 2006). The most challenging part for derstanding of the organization and the latter on
users of these methodologies is to determine how synthesizing the lowest level of business actions
specific or at what level the analysis should be. A for the purpose of identifying functions, activities,
(true) function-based, or functional, classification or processes (Xie 2013). Therefore, the decision
system cannot stop at high-level analyses (that is, of conducting bottom-up analysis should not be
what constitutes function, subfunction, activity, left to individual organizations to make—as the
or process, depending on the methodology being functional classification methods typically recom­
applied), but needs to go further down to the level mend, but instead, should be strongly advocated if
of transactions—that is, it needs to conduct, for ex­ not prescribed as a precondition for good records
ample, the other type of analysis described in ISO management. The concept of functional analysis,
26122-2008 as sequential analysis. It is at the level therefore, requires a further development that takes
of transaction that records creation takes place, and, into consideration these factors.—Sherry Xie
in order to classify records functionally, in par­
ticular digital records, classification is to be done Keywords: function-based approach, functional
when and where records are created. In this sense, classification, top-down approach, bottom-up
transactional analysis is at the heart of functional analysis, transactional analysis
analysis for records classification, and this contrasts Related Entries: Appraisal; Formal Analysis; Func­
sharply with the top-down approach o f functional tion; Records Classification
analysis for archival appraisal.
Bibliography
Conclusion Campbell, E. G. “Functional Classification of Ar­
Functional analysis in its current state appears to chival Material.” The Library Quarterly: Informa­
be an underdeveloped concept, in both its theoreti­ tion, Community, Policy 11 (4) (1941): 431-41.
cal underpinnings and its methodological implica­ www.jstor.org/stable/4302884.
tions. This is due to its inherent link to the concept Cook, Terry. “Macro-Appraisal and Functional
of function, which is abstract and difficult to be Analysis: Documenting Governance Rather Than
defined in a way that allows direct application. Government.” Journal o f the Society o f Archivists
The common guidance that functions are derivable 25 (1)(2004): 5-18.
from legal and regulatory documentations perti­ Ham, Gerald. Selecting and Appraising Archives
nent to the records-creating organization is simply and Manuscripts. Chicago: Society of American
inadequate for explaining the nature of functions Archivists, 1993. Available online at http://babel.
and ineffective in indicating the complexity of the hathitrust.org/cgi/pt?id=mdp.39015024110697;vi
analysis required to reach the pursued goal. Also, ew=lup;seq=21.
there is a lack of recognition by the archival lit­ International Standards Organization. ISO/TR
erature on functional analysis of the indispensable 26122:2008: Information and D ocumentation-
role of records management in supporting and, in Work Process Analysis fo r Records. Paris, France:
some cases, allowing to conduct archival work. As International Standards Organization, 2008.
discussed earlier, all of the functional analyses pro­ Lemieux, Victoria. “Applying Mintzberg’s Theories
posed by archivists focus exclusively on guiding on Organizational Configuration to Archival Ap­
archivists to tackle “messy” records in organiza­ praisal.” Archivaria 1 (46) (1998): 32-85. http://
tions. Messy records are only the symptom of poor journals.sfu.ca/archivar/index.php/archivaria/ar-
records management. In other words, the archival ticle/view/12675/13842.
discourse on functional analysis misses the cause Library and ArchivesofCanada.“BASCS Guidance.”
of the issues that functional analysis is called to re­ www.collectionscanada.gc.ca/007/002/007002-
solve—the lack o f a records management program 2089-e.html#six (accessed December 2013).
in creating organizations. A strong and effective NSW State Records. “DIRKS Manual.” www.
records management program is one that conducts records.nsw.gov.au/recordkeeping/dirks-manual
both top-down and bottom-up analysis, with the (accessed December 2013).
222 Functional Analysis

Samuels, Helen. “Improving Our Disposition: Doc­ maedfoundation.org/pdfs/Sherry_Xie_Study.pdf


umentation Strategies.” /Irc/ï/vana 1 (33) (1992): (accessed December 2013).
125^0. http://joumals.sfu.ca/archivar/index.php/ ------. “The Nature of Records and the Informa­
archivaria/article/view/11804/12755. tion Management Crisis in the Government of
Xie, Sherry. “Function-Based Records Classifica­ Canada.” https://circle.ubc.ca/handle/2429/44450
tion System: A Comparative Study.” www.ar- (accessed December 2013).
I
IM PARTIALITY (RECO RD) are “free from the suspicion of prejudice in regard to
the interests in which we now use them .. . because
In 1922, Hilary Jenkinson, in his seminal book A they were not written in the interest or for the infor­
Manual o f Archives Administration, identified as mation of Posterity” (1937, 11-12).
the first characteristic of archives their impartiality. This characteristic of impartiality makes archives
In doing so, he was not referring to the relation­ inherently truthful and the most reliable source for
ship between the authors o f the records constitut­ both law and history, whose purposes are to rule and
ing the archives (or archival fonds) and the acts or explain the conduct of society by establishing the
facts the records put into being, participated to, or truth (Duranti 1994, 334). In common law, evidence
talked about. Rather, he referred to the relationship acts consider records to be an exception to the hear­
between the records and the use to which those say rule, and to be admissible as evidence precisely
records are put after they are no longer current and because of the trustworthiness that derives to them
active in the activity generating them. Impartial­ from their creation in the usual and ordinary course
ity is therefore not an attribute of persons (be they of business, for the purposes of the business, by a
authors, writers, or creators), but a characteristic of person responsible for doing so, at the time or close
records that are part of an archives; it expresses the to the time of the fact or act they refer to (Duranti
ability of their form, content, relationships with the and Rogers 2012, 528).
other records in the same archives (i.e., the archival
bond) to reveal facts, acts, and the circumstances of
Conclusion
their occurrence. Impartiality is also an attribute of
the archivist only in the sense that archivists should Records and archives are impartial and the most
not be partial to any type of use or user, however, reliable source of information because they are not
the term is not presented here in relation to the ar­ the purpose of the activity from which they result,
chivist, but in relation to the nature of archives and but their by-products. To protect the impartiality
records. of archives and records as well as their evidentiary
nature is to protect their capacity to reveal the biases
and idiosyncrasies of their creators or authors. The
The Concept
activities supporting this duty of protection, in par­
All archives, and the records constituting them, are ticular archival arrangement and description, came
impartial with respect to the purposes for which they to be known as the “moral defence of archives”
will be used in the future because such purposes and are seen as central to the professional ethics of
cannot be predicted by the persons creating them or archivists (Jenkinson 1937, 66).—Luciana Duranti
authoring their content. Records are created in the
course of activity as a means for carrying it out and Keywords: archives, record, archival document,
its by-product. Therefore—Jenkinson writes—they evidence, reliability

223
224 Information Assurance

Related Entries: Authenticity; Interrelatedness (Re­ A key element of RM has always been its abil­
cord); Naturalness (Record); Reliability; Unique­ ity to provide evidence of an activity. Historically,
ness if evidence could be provided of an event, it was
deemed to have happened that way. Records, then,
are powerful tools in the hands of those who seek
Bibliography
recognition of positions of authority and verifica­
Duranti, Luciana. “The Concept of Appraisal in tion of the status quo, for example. Recent archival
Archival Science.” The American Archivist 57 articles on ethies and the use of records in countries
(2) (Spring 1994): 328-44. http://archivists.meta- where power structures are shaping and reshaping
press.com/content/pu548273j5j 1p8 16/fulltext. highlight the danger of misuse. Control of records
pdf. and therefore evidence enables the construction of
Duranti, Luciana, and Corrine Rogers. “Trust in external image, affecting standing within the inter­
Digital Records: An Increasingly Cloudy Le­ national community and ultimately global power
gal Area.” Computer Law & Security Review structures. At an organizational level, control of re­
28 (5) (October 2012): 522-31. http://dx.doi. cords requires the implementation of RM processes
org/10.1016/j .clsr.2012.07.009. to ensure that records can be provided as evidence.
Eastwood, Terence M. “What Is Archival Theory Records are defined in ISO 15489 (the interna­
and Why Is It Important?” Archivaria 1 (37) tional standard for RM) as “information created, re­
(1994): 122-30. http://joumals.sfu.ca/archivar/in- ceived and maintained as evidence and information
dex.php/archivaria/article/view/11991/12954. by an organization or person, in pursuance of legal
Jenkinson, Hilary. A Manual o f Archives Adminis­ obligations or in the transaction of business” (In­
tration. London: Percy Lund, Humphries & Co., ternational Standards Organization 2001). It further
1937. identifies the RM role as ensuring that records will
be accepted as evidence in a court of law, should this
be required.
IN FO RM A TIO N ASSU RAN CE “The principles of good practice in recordkeeping
are of value, even if the need to produce electronic
The goal of information assurance (lA) is to en­ records in court never arises. The effort and re­
sure that “the information flows within a company sources required to comply quickly bring business
are confidential; their integrity is safeguarded and benefits, whether the original is in court or not”
available” (U.S. Federal Government Committee; (International Standards Organization 2001).
McCumber 1992; Maconachy, Schou, Ragsdale, Frank Upward, creator of the Record Continuum
and Welch 2001). The integrity of the system’s Model, highlights “evidentiality” as one of the four
architecture and the authenticity of its contents are axes of recordkeeping (RK) and asks how the use
now regarded as of equal importance as the security of the term evidence in RK relates to legal evidence
of its data. Verifying the identity of the creators of (2005).
information, proving that they are who they say they The tools available to the records manager in­
are and that the information in question has not been clude classification schemes to categorize records
altered subsequently, have all proven to be critical in a systematic and consistent way, appraisal to
success factors in recent court cases. The field of determine which records are deemed to have value,
records management (RM) has been addressing the retention to determine how long they should be kept,
issue of what constitutes critical information for an and disposition to ensure these decisions are imple­
organization for some time. RM is one of disciplines mented. The authors believe that some of the tried
within the broader context of communities with a and tested methods honed to international standards
fundamental stake in lA. Both RM and lA seek to ad­ in the records management arena can shed light on
dress issues relating to the integrity, authenticity, and the management of digital forensics data embedded
security of the content of systems that directly impact in systems in order to ensure the preservation of reli­
our private, organizational, and societal personas. able digital evidence for current and future access.
Information Assurance 225

Table 1.1. Underlying principles of IA vs. RM (Boucher and Endicott-Popovsky, 2008).*


Inform ation A ssu ra n ce P rinciples R ecords M anagem ent P rinciples

C o n fid e n t ia lity In tegrity


In tegrity U s a b ilit y
A v a ila b ilit y A u th e n tic ity
A u th e n tica tio n R e lia b ility
N o n -re p u d ia tio n

Discussion of the Principles of Each pean Commission. In some respects, ISO 15489
itself was devised in order to deal with the issues of
The authors make the case that the goals of both are
nonrepudiation. By following the principles and rec­
similar. ISO 15489 states that records must possess
ommendations enshrined in the standard, it would
content, context, and structure. Content reflects the
prove more difficult to repudiate records provided
facts about the activity: they should be accurate and
as evidence of activities.
complete. Context, that is, the circumstances of cre­
In RM, the level of accountability and the op­
ation and use, include the a c t i v i t y , a n d ad­
erational requirements of the organization and their
ministrative context of the record. Structure reflects
perception of legal risk, compliance, and business
the relationships within the record and external to it
decision making will define which transactions
and organizes the content in such a way as to denote
require full evidential protection. These are organi­
context (Shepard and Yeo 2003, 156).
zational decisions that the RM team will implement.
RM has always been about the context in which
ISO 15489 catalogues an eight-stage procedure
records are created—that is, if this is not known, the
for RM programs, the first five of which relate to
“record” ceases to be relevant and evidential. ISO
establishing the current position and identifying
15489 further isolates four qualities that records
the requirements for records, before designing a
should possess: authenticity, reliability, integrity,
strategy to satisfy these requirements. This common
and usability. Authenticity is linked to the accuracy
objective of defining what records/information/data
of the records; reliability pertains to the records be­
are required for evidential and legal purposes is an
ing a full and accurate representation of the activity/
area that we believe brings the two disciplines closer
transaction. Integrity relates to the fact that records
together. By pre-identifying certain categories of
are complete and unaltered. Finally, usability re­
evidence, it would be possible to provide special
fers to records being retrievable, presentable, and
treatment for those requiring full digital forensics
interpretable. Although the language relates to the
(DF) protection.
“record,” increasingly it is accepted that in order
Sremack refers to the need for research into “us­
to maintain the above characteristics in records, it
ing case specific knowledge of a system to deter­
is the systems and the information architecture that
mine what information is critical, thereby minimiz­
must be proven to meet these requirements.
ing the amount of extraneous information that is
RM does not explicitly refer to nonrepudiation
collected and analyzed and guarantee that no criti­
and confidentiality. It does, however, constantly
cal data is missed” (2008, 6). Sommer (2005, 34)
work within the confines of legislation, particularly
calls for “improvements in overall system specific
freedom of information and data-protection laws.
and management process to capture more potential
These form a natural tension between what society
worthwhile evidence.”
considers appropriate in terms of accountability
Records managers have to analyze the processes
of organizations and confidentiality demanded by
in an organization before they can identify the
citizens and customers. Access rights and data secu­
record-creating processes. Only then are they able to
rity are key elements in the management of digital
identify those that require “special treatment” (i.e.,
records, as is evidenced by their prominence in the
vital records in current business terms). From a DF
recently released MOREQ 2 specification (February
point of view, knowing where (i.e., what processes)
2008) issued for comment on behalf of the Euro­
to apply the techniques more rigorously would be
226 Information Assurance

a benefit. From an RM perspective, the ability to information-security model must be based on en­
prove that techniques have been employed to as­ vironmental, organizational, system, and informa­
sist in verifying that a system and, therefore, the tion aspects that remain relatively constant over
records it creates possess integrity and authenticity extended periods of time. The last two decades of
is a benefit. tumultuous change and growth in the information­
The aim of RM is to ensure that the relationships processing and -management area has shown that
between the essential business entities are apparent the Comprehensive Model of Information Systems
and maintained for current and future usage. If RM Security (CMISS) presented in 1991 by McCumber
offers tools that narrow down the number of “infor­ has the basic model components and characteristics
mation objects” that should be considered “critical,” that allow this model to remain useful over this ex­
that is, those more likely to be called on in court and tended period of time (McCumber 1992; see figure
therefore have a requirement to be “trustworthy,” I.l). The key aspects of the CMISS that provide the
DF processes could be applied to a more limited set foundation of this continual period of application
of processes, and NFR may be more achievable. and usefulness are its focus on information along
We can’t know how which single documentIdaXst with a model structure that allows human beings the
set/record will be challenged in the future but we ability to organize and reason about information at
can seek to manage those most likely to be required. the proper level of abstraction.
RM procedures are set up to determine which of With a focus on characteristics of information that
these are most likely to be and to capture them into are independent of implementation technology and
RK systems. Making early decisions regarding risk organizational structure, the CMISS distills the es­
to the organization and to wider society of keeping sence of information-security practices in a manner
or not keeping records and utilizing RM and DF that is usable by security planners and managers.
practices and procedures to ensure their reliability By arranging primary concepts in groups of three
and accessibility may reduce discovery and spolia­ and constraining model relationship views to nine
tion costs. It may also reduce digital preservation or fewer items, the CMISS also addresses critical
costs. cognitive complexity issues associated with the ap­
plication of these types of models. The stable form
A Comprehensive Model of Information presented by the CMISS is of great benefit to sea­
Assurance soned information-assurance professionals that have
an extensive background and expert understanding
Hardware, software, protocols, and operational tech­ of the information-assurance domain.
niques associated with the process of managing Walking through the model, security must be
information change at a very high rate. Any stable considered for each information state through which

Figure 1.1. The McCumber Cube. McCumber


1992
Information Governance 227

information passes in a system: transmission, stor­ Maconachy, W., C. D. Schou, Maconachy, Daniel
age, and processing. In each information state, the Ragsdale, and Don Welch. “A Model for Infor­
required security services of confidentiality, integ­ mation Assurance: An Integrated Approach.”
rity, availability—^the so-called CIA of security—are Paper presented at the Proceedings of the 2001
described. Finally countermeasures—human factors, IEEE Workshop on Information Assurance and
policies and practices, and technologies—are identi­ Security, U.S. Military Academy, West Point,
fied and prescribed. Further, changes brought about NY, 2001.
by networking systems have generated a modified McCumber, John. “Information Systems Security:
model that incorporates the security services of au­ A Comprehensive Model.” In Proceedings o f the
thentication and nonrepudiation into the base CMISS 14th National Computer Security Conference,
(Maconachy, Schou, Ragsdale, and Welch 2001). Washington, DC, October 1991. Reprinted in Pro­
ceedings o f the Fourth Annual Canadian Com­
puter Security Conference, Ottawa, Ontario, May
Conclusion
1992. Reprinted in DataPro Reports on Informa­
The field of information assurance is in a formative tion Security. Delran, NJ: McGraw-Hill, 1992.
stage that is proceeding with a high rate of change at Shepherd, Elizabeth, and Geoffrey Yeo. Managing
organizational and technical levels. A fundamental Records: A Handbook o f Principles and Practice.
security model that is independent of technology London: Facet, 2003.
and organizational changes is helpful in thinking Sommer, Peter. “Directors and Corporate Advisors’
through information-security requirements of sys­ Guide to Digital Investigations and Evidence.”
tems. Using the McCumber Cube, the complete Information Assurance Advisory Council, 2005.
security context for any given situation can be ef­ Sremack, Joseph. “Formalizing of Analysis: A
fectively addressed.—Barbara Endicott-Popovsky Proof-Based Methodology.” Master’s thesis.
North Carolina State University, Raleigh, NC,
Keywords: information assurance (lA), records 2004.
management, McCumber Cube Upward, Frank. “The Records Continuum.” In Sue
Related Entries: Archival Standards; Authenticity; McKemmish, Michael Pigot, Barbara Reed, and
Records Continuum; Reliability (records) Frank Upward, eds.. Archives: Recordkeeping in
*Acknowledgment: The comparison of lA and RM Society. New South Wales: Charles Stuart Univer­
is courtesy of a collaboration between the Uni­ sity, Centre for Information Studies, 2005, 207.
versity of Washington Center for Information As­ U.S. Federal Government Committee on National
surance and Cybersecurity and Aberyswyth Uni­ Security Systems Instruction No. 4009. National
versity, Wales, Adran Astudiaethau Gwybodaeth/ Information Assurance Glossary.
Department of Information Studies (Boucher and
Endicott-Popovsky 2008). (See Table I.l.)
IN FO RM A TIO N G O V ER N A N C E
Bibliography
Information is a vital organizational asset, and in­
Boucher, K., and B. Endicott-Popovsky. “Digital formation governance (IG) is an integrated, strate­
Forensics and Records Management: What We gic approach to managing, processing, controlling,
Can Learn from the Discipline o f Archiving.” maintaining, and retrieving information as evidence
Paper presented at Information Systems Compli­ of all transactions of the organization. Informa­
ance and Risk Management Institute, University tion governance is defined as “the specification of
of Washington, September 2008. decision rights and an accountability framework
International Standards Organization. ISO 15489- to ensure appropriate behavior in the valuation,
1:2001: Information and Documentation—Re­ creation, storage, use, archiving and deletion of
cords Management—Part 1: General. Geneva, information. It includes the processes, roles and
Switzerland: International Standards Organiza­ policies, standards and metrics that ensure the effec­
tion, 2001, 5.Iff. tive and efficient use of information in enabling an
228 Information Governance

organization to achieve its goals” (Gartner n.d.). IG This model presents an image of the cross­
is a high-level, strategic function that involves stake­ functional groups of key IG stakeholders; not all
holders from across the organization, each with their organizations will have the same mix of stakehold­
own expertise and responsibilities (Franks 2013, ers. Notice the relationship between the value of
321). A renewed interest in records and informa­ the information assets that were created and used
tion management has resulted in a call by many to and the duty the organization has to hold, discover,
use fundamental records management principles as retain, maintain, store, secure, and dispose of those
the foundation for sound IG. Records management assets. Cooperation between all stakeholders is nec­
is just one component of IG, but the processes used essary to develop policies and processes to achieve
to manage records can be leveraged to manage all effective IG.
information (Franks 2013, 29).

Information Governance Framework


Rationale for Information Governance
Effective IG helps businesses operate more effi­
The realization that an IG strategy is necessary is ciently and mitigate risk. Writing in the eDiscovery
often the result of the dramatic changes that have Journal blog, Barry Murphy explained that IG
taken place due to the growing amount of data and provides a framework for the “conservative side of
unstructured electronic records; an increased em­ information management” (2010).
phasis on e-discovery and compliance; and the lack Every organization must consider its legal and
of sufficient controls over all electronically stored regulatory environment along with its tolerance for
information (ESI). risk when determining its governance framework.
An IG program enables an organization to man­ Questions to be asked include these:
age information securely and effectively; reduce the
volume of information retained while meeting its • What records and information are needed to
regulatory, legal, and business obligations; and de­ support business processes?
velop an awareness of both the location and nature • What steps must be taken to be in compliance
(sensitive, proprietary, private) of its information with governing laws and regulations?
assets. Specific benefits of IG are reduced risk; im­ • What records and information should be de­
proved e-discovery preparedness; increased trans­ stroyed and when?
parency, trust, and therefore enhanced reputation;
and reduced product and information cycle times Records management plays a key role in answer­
due to improved information flows. ing these questions. An IG model can be used to
provide context to discussions o f an integration of
information management, risk management, and
Information Governance Components records management considerations. This frame­
and Reference Model work would address all types of information,
IG is comprised of the following components: whether meeting the requirements for a record or
records lifecycle management, information risk, not.
policy management, information access and se­ There are three basic elements to an IG frame­
curity, information capture and classification, and work: policies, processes, and compliance. The IG
information content governance. framework sets out the way the organization han­
dles information, in particular personal and sensi­
tive data. The framework determines how data is
Information Governance Reference Model
collected, stored, used, and shared. Accountability
Representatives from legal, human resources, in­ measures in the form of audits and metrics moni­
formation technology, and business units must col­ tor the components o f these elements. Records
laborate in developing the IG strategy as illustrated management should be integrated throughout the
in the IG Reference Model (see figure 1.2). process.
Information Governance 229

\ED GOVERNA/Vç-^

Hold, Retain Store,


Discover Archive Secure

Dispose

.C<
TRANSP^^^'^^

Figure 1.2. The information governance reference model (ICRM ). EDRM (edrm.net)

ARMA's Principles and Information Governance Information Governance, C-Level Management,


and the IG Steering Committee
ARMA’s Generally Accepted Recordkeeping Prin­
ciples can be used to govern both records and “C-level” is an expression describing high-ranking
information. The eight principles are: account­ executive titles in an organization, including chief
ability, transparency, integrity, protection, compli­ information officer, chief knowledge officer, chief
ance, availability, retention, and disposition (ARMA compliance officer, and chief records officer. Some
n.d.). The principles can be assigned to specific IG organizations may use traditional titles, such as
stakeholders to ensure that ownership is clear and, president, vice president, general manager, and di­
in some cases, shared across the organization. For rector. Regardless of the size of the organization or
example, the principles of retention and disposi­ the titles of high-ranking officials, the organization
tion may be “owned” by the records and informa­ would benefit from the formation of an IG steering
tion management program, compliance may be the committee to develop a strategic plan and provide:
responsibility of the legal/risk stakeholders, and
integrity and transparency responsibilities could be • advice on the organization’s information man­
shared by all stakeholders. agement strategy with regard to quality and
230 Information Governance

integrity, safety and security, and appropriate 7. Responsibilities: This section clarifies ind-
access and use of records and information as­ vidual responsibilities, including those fc«" al
sets; and employees.
• assurance in relation to processes for creat­ 8. Conclusion: This section reinforces the in>-
ing, collecting, storing, disseminating, sharing, portance of the IG strategy, policy, and actiar
using, and disposing o f information. (Franks plans to ensure efficient information m a n a ^
2013, 324) ment and risk reduction (Franks 2013, 326).

Each member of the steering committee should


Information Governance Plan
have the responsibility for filling a specific role; for
example, the chief executive officer may be respon­ The IG plan is the first of two required componeiis
sible for information across the organization in his/ of the IG strategy. It should be brief and concbs:
her role as accountability officer, and the senior IT and provide actions to be taken to accomplish goak
security specialist may be assigned responsibility for example, assign IG roles and responsibilities,
for ensuring compliance with information security approve the IG policy and strategy itself; and refer
standards (ISO/lEC 27001-2005). Examples of ad­ to additional existing governing policies such as tb:
ditional roles are IG lead, data protection and free­ e-mail policy and confidentiality policy.
dom of information lead, and records management
lead. Information Governance Strategic Policy
The IG policy is the second required component csf
Information Governance Strategy an IG strategy. The policy provides details that wert
IG strategy documents must include at a minimum not included in the IG plan, including foundations.'
an introduction, a scope statement, and a conclusion. principles, governing legislation, best practices, im­
However, most include the following sections: provement plan and assessment, auditing and moni­
toring criteria, implementation and disseminaticsr
1. Introduction: Asserts the value of information strategy, responsibility for IG document (steering
as a vital asset and establishes IG as the frame­ committee), and any relevant attachments and ap­
work for information management. pendix, such as a list of related policies and proce­
2. Purpose Statement: Provides the context for dures (e.g., mobile-computing policy, social media
the IG plan in relation to other organizational policy, records retention policy).
strategies such as risk management and busi­
ness management. Change Management, Communication,
3. Scope Statement: States the components of the and Training
strategy, such as the IG policy and annual ac­
tion (improvement) plan. Two issues that can have a positive impact on the
4. Goals: Overarching goals of IG, goal of the acceptance of an IG initiative are change manage­
strategic plan, and methods to achieve effec­ ment and training. Change management is a struc­
tive IG are stated in this section. tured approach to transition individuals, teams, and
5. Strategic Objectives: Objectives for a specific organizations from a current state to a desired future
period of time (e.g., three to five years) are state where change can be accepted and embraced.
either included in the goals section or imme­ As with other changes, the best approach to imple­
diately follow it. Objectives include monitor­ ment an IG strategy will depend on the culture of
ing and assessment methods, identification of the organization. Success of a change management
lead position (not person), and target date for effort will depend on the organization’s ability to
completion. establish a clear vision and strategy to stimulate
6. Key Strategic Areas: This section explains the organization-wide buy-in.
role of the IG steering committee and any sub­ These goals, as well as the benefits that will ac­
groups (e.g., project teams). crue to the organization, must be communicated to
Information Governance 231

Il employees. Training can provide an explanation Conclusion


f the IG strategy, expectations for compliance, and
As stated in the introduction, IG is a high-level, stra­
enalties for noncompliance. Training platforms and
tegic function that involves stakeholders from across
enues might include in-person classes; online mod-
the organization, each with their own expertise and
iles; on-demand classes; wikis and blogs; a private
responsibilities (Franks 2013, 321). IG provides an
ocial media site managed by the organization; and
accountability framework comprised of processes,
odcasts, videoconferences, and audio conferences.
roles, standards, and metrics designed to encourage
desirable behavior that enables an organization to
^sessment Tools and Services achieve its goals” (Gartner n.d.).
High-level managers must support the IG strategy
fhe IG steering committee is responsible for mea-
and are ultimately responsible for its success, but the
iuring the level of compliance with the norms estab-
actual planning is best carried out by an IG steering
ished for IG. Industry-related IG tools are available
committee comprised of some senior managers as
ind may be required; for example, the United King­
dom National Health Service (NHS) Department of well as representatives from IT, business units, risk/
Health issues an IG Toolkit for NHS organizations legal, and records management.
to conduct mandated self-assessments (NHS n.d.). Although records management is a subset of IG,
it can provide the foundation for an effective IG
Other assessments can be voluntary and involve
employing an outside organization to conduct an as­ Strategy. Records managers and other information
sessment; for example, EMC Corporation will lead professionals wishing to move into new positions
a structured discussion to assess the current state of made available by the transition from records and
information management to IG can demonstrate
information within an organization using the EMC
their capabilities by earning the designation of
IG Maturity Model Matrix (EMC^ n.d.).
Information Governance Professional.—Patricia
Franks
Professional Certification
IG provides a holistic approach to managing all Keywords: information assurance, information gov­
information within the organization. Recordkeep­ ernance, IG, strategy, information management
ing professionals can expand their background in Related Entries: Information Assurance; Informa­
the area of records and information management by tion Management; Information Policy; Records
earning a new credential—the Information Gover­ Management
nance Professional (IGP) designation—that recog­
nizes the expertise of those who possess the knowl­
Bibliography
edge, skills, and abilities to perform competently as
an IG professional. Recordkeeping professionals, ARMA International. Generally Accepted Record­
including archivists, can prepare for the 140-item keeping Principles. 2014. www.arma.org/r2/gen-
examination administered through ARMA Interna­ erally-accepted-br-recordkeeping-principles (ac­
tional by acquiring additional knowledge and skills cessed July 30, 2014).
in the areas of information assurance, risk manage­ EMC^. EMC Information Governance Maturity
ment, strategic planning, and information technol­ Model Assessment. EMC Corporation, n.d. www.
ogy (including cloud computing). emc.com/collateral/services/consulting/h4905-
However, recordkeeping professionals are not the info-gov-maturity-model-svo.pdf (accessed July
only stakeholders who would benefit from certifica­ 30, 2014).
tion as an Information Governance Professional. Franks, P. C. Records and Information Manage­
Stakeholders from information technology, risk ment. Chicago: ALA-Neal Schuman, 2013, 29,
management, and legal professions can also benefit 321,326.
by demonstrating their competence to become in­ Gartner. “Information Governance.” IT Glossary,
volved in IG initiatives by earning the Information 2013. www.gartner.com/it-glossary/information-
Governance Professional designation. govemance (accessed July 30, 2014).
232 Information Management

Murphy, B. “What Is Information Governance?” In the United States, information science even­
eDiscovery Journal (blog), March 22,2010. http:// tually superseded documentation as the preferred
ediscoveryjoumal.com/2010/03/what-is-informa- term, and the American Documentation Institute,
tion-govemance. founded in 1937, changed its name to the American
National Health Service. Information Governance Society for Information Science in 1968 (Buckland
Toolkit. Department o f Health, England, n.d. 1999), eventually becoming the American Society
www.igt.hscic.gov.uk (accessed July 30, 2014). for Information Science and Technology. It has been
suggested that the terms information management
and information science can be used interchange­
IN FO RM A TIO N M ANAGEM ENT ably, with either being today’s manifestation of
documentation (Buckland 1999).
The nature of information management as a disci­ The second information age occurred in the mid­
pline is subject to debate. Information management twentieth century. The formation of records man­
is a contested concept, with the meaning varying agement as a distinct profession has been linked
according to the occupational group claiming own­ to the need to manage the immense proliferation
ership of it. Its origins can be traced back to the of documents in North America post World War
early twentieth century; reflecting on this historical II (Duranti 1989). Today, in the third information
development provides some insight into the current age, there is a tendency for records managers to
situation. emphasize their role as information managers. For
instance, the Records Management Association of
Australasia has rebranded itself as “Records and
The Concept Information Management Professionals Austral­
The three modem information ages identified by asia.” However, corporate information technology
Ronald Day (2001) provide a useful perspective professionals may also often refer to themselves as
from which to view the development of particular information managers. Librarians also continue to
occupational specialties that arose in order to ad­ refer to themselves as information managers.
dress specific problems encountered in managing The consequence of these multiple claims for ju­
information. The first information age occurred in risdiction over the domain is that the scope and range
the late nineteenth century and resulted in the spe­ of information management can be defined too nar­
cialty of documentation to manage the explosion rowly, or if broadly, the purposes for which different
of documents in the late nineteenth century. From information types need to be managed may not be
about 1920 in Europe the term “documentation” recognized. A major contributing factor to the ambi­
was used as a comprehensive one encompassing guity associated with information management is the
bibliography, records management, and archival absence of a robust and coherent theoretical basis.
work (Buckland 1997). Two leading figures in the The information continuum model that was de­
Institut International de Bibliographie (renamed veloped as a teaching tool by academics at Monash
the International Federation for Documentation in University has the potential to clarify the ambiguity.
1935), Paul Otlet and Frits Donker Duyvis, showed The model is briefly described as part of a suite of
an integrative view of the management of informa­ continua (Upward 2000) and provides a theoretical
tion resources of a variety of types and in a variety framework that unifies approaches to information
of contexts, including the office as well as library management. It is applicable to all information
(Buckland 1998). management specialisms and facilitates more in-
Williams (1998) describes special librarians as the depth analysis of occupational roles. It has been
first documentalists in the United States and quotes applied in various settings, including to assess the
Ethel Johnson in 1915 distinguishing special libraries sustainability of a community information network
from public libraries by emphasizing the key role of (Schauder et al. 2005), to investigate information
information: “The main function of the general library culture (Oliver 2004) and in the development of
is to make books available. The function of the special a university-wide information strategy and digital
library is to make information available” (174). repository (Treloar et al. 2007).

You might also like