The documentation should be readily accessible to the authorized individuals as

The documentation should be readily accessible to the

This preview shows page 9 - 12 out of 17 pages.

The documentation should be readily accessible to the authorized individuals as well as parties
Image of page 9
Information Governance 10 with interest while observing laws as well as regulations. All the maintained records should be adhering to the policies and principles regarding information governance, recording the activities taken during the implementation of the information governance program accurately towards ensuring legibility of the available records. When implementing transparency principle within the organization practices, there should be the definition of all the legitimate users as well as the mechanism of using as well as guiding towards improving compliance to the set policies as well as procedures (Ghiran, Buchmann, & Osman, 2018, p. 285 ) . Principles of integrity This principle is demanding a guarantee of accuracy, authenticity, reliability, as well as timely and complete information regarding every information relating to the IG program that the organization has established. It is the responsibility of the organization to manage as well as classify the information gotten from the external sources. Procedures, as well as policies regarding information governance, helps the company towards complying with the legal requirement in case they are strictly followed. Thus, there should be [roper training for every employee within the company towards ensuring that there is appropriate use if information governance program to meet the objectives as well as goals set within the organization. Practices enhancing the reliability of information within the organization as well as ensuring regular satisfactory audits alongside data reliability are crucial towards maintaining the integrity principle (Speer, 2019, p. 245 ) . Principle of protection Regarding this principle, companies get proper guidance which is preserving the acquired data from corruption, breach as well as the risk of loss. It is aiming at establishing
Image of page 10
Information Governance 11 confidentiality, privacy alongside categorization of data that exists within the company. Thus, every organization should work towards setting as well as utilizing security access controls within the practices of management towards preventing any loss of data or any authorized access. Every organization should be ensuring that there are regular security audits towards revealing vulnerabilities issues or potential threats within the organization systems alongside structure in which information flows as well as assessing if there is proper comp0liance to the policies as well as standards (Ghiran, Buchmann, & Osman, 2018, p. 286 ) . Principle of compliance According to this principle, the framework of information governance should be developed in a way that is conforming to the standards policies as well as relevant laws. For instance, within the healthcare industry, various regulations are available that are helping in maintaining medical records of patents alongside other health data in a secure way with the person authorized to handle the information. There are employees within the organization who have special access to the health data, thus responsible for maintaining the security of such data.
Image of page 11
Image of page 12

You've reached the end of your free preview.

Want to read all 17 pages?

  • Fall '16
  • PROF MIKE

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture