Verified Document

Operations And IT Management Case Study

Operations and IT Management This study will examine several works in writing and from these sources state how information lifecycle management will affect coordination and conflicts between operations managers and information technology managers.

Information Life Cycle Management

Information life cycle management is the range of procedures and strategies to manage data and information flows from creation and storage through to elimination." (Lifecycle Management, 2007) Information life cycle management is reported as being considered "a more complex subset of data life cycle management." (Lifecycle Management, 2007) Information Lifecycle Management Process Model defines the actions that are possible to take on information at a given time and the options that are available while taking those specific actions as well as paths that should be followed to make sure that the information retains its integrity or in other words "remains secure through its lifetime from creation to deletion." (Jericho Forum, 2011)

II. The Information Lifecycle Management Process Model

Information is first created as a part of the everyday business process and considerations include the information's content and access control of the content. If there is a need for control of the access to the content being created the "information classification, impact sensitivity categorization and access control policy definition stages of the information lifecycle process must be undertaken. Storage of the information must be chose to appropriately "reflect the information protection requirements defined by the ICC and ISC stages and if the information is of...

(Jericho Forum, 2011)
Information sharing takes place in environments that are both "collaborative and de-perimeterized" meaning that the ICC and ISC as well as Access Control Policy Definition stages of the process are required before the information is shared in addition to this process taking place during information creation. (Jericho Forum, 2011, paraphrased)

During data transfer the protocol used to transfer the information has to account for the information protection, which was defined during the stages of information classification and impact categorization phases. Finally, during updating of the information the ICS and ISC processes are utilized in adding information, updating information and in deciding if the changes make a requirement that the information be protected. (Jericho Forum, 2011, paraphrased)

Lastly, the information when deleted is required to be reflective of the information's classification and impact sensitivity labels and information that requires secure deletion cannot be simply relegated to the trash. In addition to all of these requirements that information that is characterized by being shared information in de-perimeterized environments has to be labeled with accurate information protection requirements based on the content's sensitivity requiring that the business threat of the information if accessed or should it be modified. In addition, required considerations are those concerning "legality…

Sources used in this document:
Bibliography

IBM. Information Lifecycle Governance. Retrieved Nov 8, 2010, from http://www.informationmanagementrequest.com/campaigns/compliance_warehouse/site/cim.html?sor=red

IBM. Information Lifecycle Governance. Retrieved Nov 8, 2010, from http://www.informationmanagementrequest.com/campaigns/compliance_warehouse/site/cim.html?sor=red

Jericho Forum (2009) COA Paper: Information Lifecycle Management. OpenGroup.org. Retrieved December 4, 2011, from http://www.opengroup.org/jericho/COA_Information_Lifecycle_Management_v1.0.pdf

Jericho Forum (2009) COA Paper: Information Lifecycle Management. OpenGroup.org. Retrieved December 4, 2011, from http://www.opengroup.org/jericho/COA_Information_Lifecycle_Management_v1.0.pdf
Life Cycle Management (N.D.) Information Life Cycle Management. Retrieved December 4, 2011, from http://www.life-cyclemanagement.com/information-life-cycle-management.php
Life Cycle Management (N.D.) Information Life Cycle Management. Retrieved December 4, 2011, from http://www.life-cyclemanagement.com/information-life-cycle-management.php
McNamara, C (n.d.) Operations Management, Retrieved September 9, 2007, from http://www.managementhelp.org/ops_mgnt/ops_mgnt.htm
Overall quality: Your paper is well written and the references, where needed, are properly cited and listed (refer to the TUI guidelines (http://www.tuiu.edu/guidelines/Well-Written-Paper.pdf) if you are uncertain about formats or other issues.
Robbins S. (2006) Understand What Motivates Your Boss, Harvard Business School Working Knowledge. Retrieved September 9, 2007, from http://hbswk.hbs.edu/archive/5252.html
Treasury Board of Canada (1997). An Enhanced Framework for the Management of Information Technology Projects. Retrieved September 9, 2007, from http://www.tbs-sct.gc.ca/pubs_pol/ciopubs/tb_it/efm1_e.asp
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now