Top 5 Compliance Tips

Download PDF

Practical Steps to Reduce Information Management Risk and Improve Compliance

Interested to learn how to strengthen your compliance standing? Contact Iron Mountain today and we'll work with you to put the insights and best practices we've learned from helping over 140,000 companies reduce risk and improve litigation readiness to use in your business.

To help your company lower its risk profile and boost audit and litigation readiness, we've developed a list of the top five things you can do today to make your information management practices a key contributor to ongoing compliance.

1. Retain, Secure, Dispose

Knowing what to keep — for how long — and how to store it are challenges for many companies. And when it comes to compliance, a single misstep can have significant and costly consequences. But the fact remains that with all of the information you create and distribute each day, you must recognize what's critical and what's just "in the way."

The best way to do this is to engage your company's legal counsel to develop a formal, defensible retention schedule that accounts for information in paper and digital formats. This policy must clearly outline what should be kept and for how long — and be enforceable across the business. Putting in the hard work today will pay off in the long run by mitigating the financial and reputation risk associated with issues such as failed audits or inadvertent disclosures of sensitive information.

2. Don't Forget About Destruction

Having a policy in place to securely destroy records after their useful lives is an important part of records and information management (RIM) compliance. But what if a record marked for destruction is suddenly needed for discovery? If you can't put a quick stop to this process, you may find yourself subject to fines and other penalties related to the inadequate preservation of records.

Given the ramifications of failing to produce the appropriate records during litigation, it's important that your RIM practice includes a formal destruction hold policy. And be sure to develop procedures — and leverage supporting technologies — that allow you to enforce the policy across the business. With this in place you'll be able to suspend the disposal of any paper or electronic record that is relevant to a pending investigation or audit.

Today's regulatory landscape is evolving at an astonishing rate. So whether you're challenged to conform to state and federal regulations, or keep pace with industry mandates, the act of achieving — and maintaining — records and information (RIM) compliance has become quite complicated.

3. Hold Electronic Records to a Higher Standard

Because paper has been the norm for so long, it's likely that your retention and discovery processes are in place for these records. But what about electronic information? As more and more business is conducted electronically, your policies must also account for information in this format.

Be sure that all electronic information, regardless of where it lives — PCs, servers, backup tapes, mobile devices, flash drives and more — is included in your retention schedule. Clearly define what information is considered a record and develop policies and procedures to consistently and securely manage litigation holds and destruction when this information reaches the end of its retention period.

4. Provide Start-to-Finish Security

Protecting information at all times is a key to avoiding risk. But when you aren't sure when a record changes custodians, is put in a box or moved to tape media, keeping it secure for the long term can be quite the challenge.

To solve this puzzle, make sure your workflows include an auditable chain-of-custody that documents every move a particular record makes. This way you'll always know where a record is at any given point in time. Documenting chain-of-custody in this way will help you ensure the ongoing safety of your most critical records and avoid the potential of an inadvertent breach in information security — and the resulting fines and penalties.

5. Take a Programmatic Approach

While it's great to have a comprehensive set of RIM policies, these are only as strong as the people charged with enforcing, updating and communicating them across your company. And without the right amount of accountability, there may be critical lapses in your day-to-day activities that lead to the unauthorized disclosure or destruction of sensitive information.

To minimize the chances that this occurs, think about information management as a comprehensive program defined by policies and procedures managed by a specific individual — as well as a steering committee that can apply and enforce responsibilities across the business. Putting the right people and processes in place to audit the program will help you determine if it remains aligned with all pertinent regulations. Building accountability into your information management processes in this way will go a long way towards strengthening your company's compliance posture.