top of page
  • Writer's pictureCraigRhinehart

4-Step Model for Trusted Content

Updated: Feb 20, 2022

4 Step Model for Trusted Content

Enterprise Content Management (ECM)

Continuing in my recent theme of information governance and trusted information including enterprise content, we know that unstructured information (or enterprise content) is inherently different and requires a slightly different approach within the traditional data/information governance context.

Organizations need to take 4 key steps to include the unstructured side of things:

  1. Identify and designate trusted ECM Repositories of record

  2. Create, control and maintain trusted content

  3. Consume, leverage and exploit trusted information

  4. Govern the information lifecycle including archiving, recording and preserving information and evidence of transactions, processes and events

Why these 4 items? Imagine that you are the General Counsel of a publicly-traded firm who is the defendant in a major lawsuit.

What if …

  1. You can’t find the information you are obligated, under court order, to produce?

  2. You can find the information … and it actually exonerates you … but it can’t be trusted as an accurate representation of the facts (spoliation) and can’t / won’t be admitted as evidence.

How can you prove you behaved in a compliant and/or lawful manner if you can’t use your own information to defend yourself because it isn’t trustworthy?

This is just one example that illustrates the 4 necessary steps to enable ECM to participate in information governance initiatives.  Do you agree with all 4 steps?  Share your comments.


Post: Blog2_Post
bottom of page