Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

X Marks the Spot: Lessons Learned From the Data Map Process

By Ganesh Vednere
August 27, 2009

Creating the right data map with the right information takes time, patience, perseverance and pull. A data map that is hastily put together and is missing information will only provide cursory support to counsel, and instead may end up providing fodder to opposing counsel. Some have even said that is better to not have a data map, claim ignorance and hope for leniency than to state that you have a data map and produce an incomplete, half-baked and inadequate one and anger the judge.

Many organizations have hundreds of business applications, systems, utilities, network file shares and collaboration sites (such as SharePoint, Wikis etc.), not to mention the potential goldmine of data stored in backup tapes, archival systems, PST files and offsite storage. Daunting as it may seem, creating a data map is actually twice as difficult as you thought. Really, simply e-mailing a “questionnaire” to the IT or operational folks asking for a list of applications, systems and platforms within the organization may not produce optimal results. Instead, a holistic approach to the creation of the data map must be undertaken.

It's All About the (Map) Coordinates

At its core, a data map is an inventory of the sources of data within an organization, the names and types of applications or platforms that store this data, the processes that manipulate the data, how the data flows within various business processes and how this data is stored, retrieved and accessed.

Start with existing data infrastructure, record and business process inventories. Typically, the IT infrastructure team will have the list(s) of system infrastructures, their locations, business/IT owners and platform names. The records management team will have an inventory of the various types of records generated through the course of business along with the requisite record metadata, such as record description, owner, location, formats and retention period. The operations team will have a list of the various business processes, process descriptions, process inputs and outputs, owners, process dependencies and the applications and systems that are used to execute the process.

Work with HR to obtain organizational charts that show the various hierarchies, roles and responsibilities within the organization. In addition, the information security team can provide a list of security and access groups by the various applications. Obtaining accurate and complete inventories is always a challenge. While it behooves organizations to spend upfront time and resources in ensuring that these lists are as accurate as possible, the data map team must make adequate contingency plans to account for the errors and omissions in the lists provided to them.

Once existing lists and inventories are obtained, the next step is to start mapping the data types to corresponding applications, platforms, owners and business processes. The data map team also needs to conduct walkthrough sessions with the various stakeholders to discuss how the data moves from one application/business process to another. A data map needs to incorporate aspects of all data flows within an organization. There are several ways to perform the mapping ' starting with the infrastructure/application list and then tying it to the business process, records, HR and access controls lists. Alternatively, one can start with the business process list and then map out the corresponding data outputs, records and so on. This is where the bulk of the data map complexity occurs. One option for reducing the complexity of the mapping exercise is to prioritize higher data risk areas within the organization and focus on these first and then complete the other areas.

Are We There Yet?

The following are some key lessons learned from the data map process.

' Deploy the Right Resources. Creating a data map requires a collaborative effort on the part of legal, IT, business, operations and compliance areas. It is not just a one-person show. Legal needs to determine if the end product is good enough for use during litigation; IT needs to provide relevant information about servers, data and metadata; business and operations teams need to provide information on business processes; while the compliance team provides details on what controls have been established on information flows.

Read These Next
Major Differences In UK, U.S. Copyright Laws Image

This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.

The Article 8 Opt In Image

The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.

Strategy vs. Tactics: Two Sides of a Difficult Coin Image

With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.

Legal Possession: What Does It Mean? Image

Possession of real property is a matter of physical fact. Having the right or legal entitlement to possession is not "possession," possession is "the fact of having or holding property in one's power." That power means having physical dominion and control over the property.

The Stranger to the Deed Rule Image

In 1987, a unanimous Court of Appeals reaffirmed the vitality of the "stranger to the deed" rule, which holds that if a grantor executes a deed to a grantee purporting to create an easement in a third party, the easement is invalid. Daniello v. Wagner, decided by the Second Department on November 29th, makes it clear that not all grantors (or their lawyers) have received the Court of Appeals' message, suggesting that the rule needs re-examination.