Don’t be a Big Data ostrich
About 10 years ago, I was working with two military sister organizations on some Knowledge Management projects. Both of these organizations had the same basic problem: unknown content everywhere, an enterprise content management system with unfindable content, and no ability to discover content to be routed to the content system. It wasn’t until we dug into the content that we uncovered a much BIGGER issue: unsecured personally identifiable information (PII). Each organization handled the outcome very differently and to this day it baffles me.
During the ingestion of the documents from the file systems, we put into place a data interrogation step. During this step, the documents would automatically be scanned for social security numbers, credit card numbers and contract numbers. If any of these items were found, they were tagged and then ingested into the Big Data engine.
While we were ingesting the data, we were also working with the commanders on marketing the system, setting expectations, planning end user training and answering questions. The most asked question was “you aren’t going to be ingesting my hard drive, are you?” We assured the employees that we were not indexing their local hard drives and only the public file systems. This eased their mind as they knew everyone had access to the public folders.
Read the entire article here, Don’t be a Big Data ostrich
via the fine folks at HP Enterprise.