from Tom's IT Pro
via CERTIVIEW
On January 27, 2014, when the United States Congress adopted S. Res. 337, a nonbinding resolution expressing support for the designation of a “National Data Privacy Day” to be observed on January 28, there wasn’t a lot of time to get the word out, even though the event had been around awhile.
But that’s the date on which I first became aware of Data Privacy Day, and in the years since the bill’s passage, I’ve been a champion of personal data privacy as well as data privacy at work.
The choice of January 28 was no fluke. On that date in 1981, the Council of Europe held the Convention for the Protection of Individuals with Regard to Automatic Processing of Personal Data. Luckily, they shortened the name a bit for the event and signed Convention 108, the first legally binding international treaty dealing with privacy and data protection.
Data Privacy Day began in the U.S. and Canada on January 2008 as an extension of the Data Protection Day celebration in Europe. The international event promotes awareness of privacy and data protection best practices. Recognized in the U.S., Canada and 27 European countries, Data Privacy Day’s educational initiative is to focus on raising awareness among users and businesses of the importance of protecting the privacy of their data online. This has become even more important as social networking has increased in popularity over the years as have security breaches.
Data Privacy Day’s goal is to educate and empower businesses, consumers and families with the knowledge and best practices to better protect themselves from hackers, viruses and malware that can put their information as risk. Data Privacy Day brings together not only technology folks but also government officials, educators, those involved with nonprofits and leaders across industry sectors.
So what can you do about data privacy? If the security of your data and privacy matters to you, Data Privacy Day is a great time to start actively protecting your info. Target, Sony and Yahoo all learned the hard way. It’s in the best interest of every business to practice good data stewardship or they’ll be the next lead story on CNN or the next big headline in The New York Times. Whether it’s your bank, doctor, pharmacy or even workplace, encourage them to protect your data sufficiently. Don’t ever assume your data is protected. Be your own data privacy advocate.
The National Cyber Security Alliance coordinates the promotion of Data Privacy Day activities. Here are some of the things they encourage us to do to promote Data Privacy Day:
Related Courses
Cybersecurity Foundations
Legal Issues in Information Security
Certified Information Privacy Professional US Private-Sector (CIPP/US) Prep Course
Business transformation is driving a change in the relationship between IT and the business. Internal and external forces are requiring organizations to be more responsive to customer needs and achieve operational and technological efficiencies. IT professionals traditionally only had to focus on the technology architecture. Now, the overall enterprise architecture must be considered in order to eliminate barriers between technology capabilities and business strategy.
The Open Group’s Architecture Framework, TOGAF, is a globally recognized standard for developing enterprise architecture. The comprehensive framework includes techniques and a set of supporting tools to provide organizations with the capability to ensure all architectural components are aligned to the strategic direction of the business.
The TOGAF framework can best be illustrated by the following five layers, as defined by The Open Group:
Traditionally, IT professionals have been focused on just the Technology Architecture layer, as well as specific technologies and technology solutions. Limiting the focus to a single layer is equivalent to working in a silo—making it nearly impossible to achieve a holistic view of the business. Attention needs to be devoted to all layers to ensure proper alignment with business principles, vision, requirements and architecture.
Organizations increasingly require IT professionals to gain a more thorough understanding of the business to ensure that technology solutions adequately support business requirements, vision and strategy. Incorporating TOGAF methods facilitates an understanding of the business and achieves IT results that help drive business value.
For a more detailed look at how organizations can ensure technology is aligned with business strategies, see my white paper, The Power of Linking Business Analysis and TOGAF® to Achieve IT Results.
Related Courses
TOGAF 9.1 Level 1 and 2
Projects are often complex, made up of a large number of moving pieces and bring numerous challenges to those involved. The reality is projects don’t always go the way we want them to. We often find ourselves being asked to do more with less and at a faster pace than we’re comfortable with. On occasion, we are successful in our efforts despite these restrictions.
Many key factors contribute to project success, but three of the fundamentals stand out—stakeholder identification and analysis, effective communication, and identifying project requirements, managing stakeholder expectations and scope of work.
Stakeholders may affect or be affected by the project—through a project decision, activity or outcome—or they may simply perceive themselves to be affected. The impact or perceived impact can be either positive or negative in nature.
Most projects have a large number of stakeholders. Identifying all stakeholders increases the chance of project success. You must secure and document relevant information about their interests, interdependencies, influences, potential involvement, and probable impact on the project definition, execution and final results. After obtaining this information, classify the stakeholders according to their characteristics. This will make it easier to develop a strategy to manage each stakeholder. An increased focus on key relationships is critical to project success.
How do you manage expectations? Through communication. It’s vitally important that there is a well-defined communication plan tailored to fit the project and stakeholders.
One component of critical thinking is to learn by questioning. The Project Management Institute (PMI®) indicates that 90 percent of a project manager’s job is communication, however, it is not limited to just talking. Proper communication involves listening, reading reports, generating reports, filtering information from one group to another, etc. To do this effectively, you need a well-defined communication management plan. The creation of any plan like this can be broken down into six questions that need to be asked continually: Who, What, When, Where, How and Why?
For example:
Before beginning your project, make sure you have clarified all goals, objectives and requirements. Obtaining clarity on what is required and ultimately gaining buy-in from the major stakeholders are crucial. These requirements, along with related goals, objectives and deliverables, become the scope of work that must be completed and will be refined over the life of your project. But if you do not start with a solid understanding of what you’re trying to achieve, you might as well not begin at all.
It will be difficult, if not impossible, to achieve success from a stakeholders’ point of view if there is a lack of clarity concerning their project perception and expectations. This is why stakeholders must be identified and their expectations analyzed as early in the project lifecycle as possible.
Keeping the three key steps—identification and analysis of project stakeholders, the creation and use of an effective communication plan, and proper identification of project requirements, stakeholder expectations and accurate decomposition of the scope of work—at the forefront during project planning and execution greatly enhances the ability to achieve success.
For a deeper dive into how to guarantee project achievement, view my white paper, Three Steps to Ensure the Success of Your IT Projects.
Related Courses
IT Project Management
Project Management Fundamentals
Project Management, Leadership, and Communication
Requirements Development, Documentation and Management
Many ITIL® training alums may wonder, “Now that I’ve learned these best practices, how do I actually implement them in my workplace?”
An effective ITIL strategy is the product of a concerted focus on people, process and technology, as well as an ongoing, cost effective and valuable IT service management (ITSM) practice.
While processes and technology play key roles in ITSM, the role of people resources and capabilities cannot be understated. When entering an organization, people start out as a resource (raw material). Training and skills development help your people mature into capable teams that have the ability to carry out your ITIL initiative, execute your processes and deliver value to customers and users. Without an ongoing training program, your ITIL initiative is at risk.
Poorly trained managers and staff:
With a concerted training program and a training plan for each role, your team will become a unified powerhouse that will propel your ITSM initiative to long-term success. Service and process owners will carry out their roles effectively, ensuring that quality robust services are defined while supporting processes guarantee a quality delivery. Practitioners—the individuals and teams carrying out the various steps of your processes—will have the skills and understanding to execute the processes consistently and efficiently, delivering high availability and performance of your services.
Your staff may have completed the first step—ITIL Foundation training—but that only establishes ITIL groundwork. You still need the skilled people capabilities to truly be successful with your ITIL initiative. In order to equip people assets, your staff’s foundational knowledge must be enhanced with ITIL Intermediate training.
For more tips on how to implement ITIL’s best practices into your organization, see the white paper, You’ve Completed ITIL® Foundation: Now How to Implement It.
Related Training
ITIL Foundation
ITIL Intermediate courses