Article Keyword Videos to Watch
Click on the image to start the video.
Images - Links - Articles
Document Management: Policy Issues
Significance of Policies
You may have heard of the word ‘policy’ so often that you might have forgotten what it really signifies. Before we look at document management policy issues, let us first refresh ourselves on the significance of policies.
Policies are guidelines for actions and responses. A policy guideline could help us take actions or decide on our responses in many situations covered by the policy.
Naturally, good policies would require some brain-storming. You have to think about the kind of situations likely to arise. Next you have to consider the implications of different actions and responses under these situations.
You then formulate a policy guideline that is most likely to lead to the outcomes you desire.
It is the thinking though that precedes policy decisions, the careful consideration of likely situations and implications of different responses, which constitute the real significance of policy formulation.
Document Management Policies
In the case of document management, you think through the issues involved and the implications of different courses and come up with policies that promise the most desired outcomes.
Document management policies typically cover:
* Access to Documents: Documents would invariably need to be protected from unauthorized eyes. For example, a soft drink company might not want anybody except a select few to access their product formula. In your business, you decide how sensitive each type of document is and then decide who should be granted access to that kind of document.
* Permissions for Documents: A person might be allowed to access a document, but might not be allowed to change or remove it. Permissions involve Read and Write permissions and only persons concerned with creating and maintaining a document should be given both of these kinds of permissions. Other persons authorized to access it should have only Read permissions. So you must decide which permissions each person accessing the document will be granted. You don’t want the payroll employee giving himself or herself a raise.
* Retention of Documents: A lot of ‘work-in-progress’ documents are created during particular operations. Most of these can be destroyed without any harm to the business. Policies are needed that clearly identify the documents that can be destroyed and the length of period after which destruction is permitted. Keeping unnecessary documents take up space and costs money, both of which could mount to significant quantities in the absence of document retention policies. Document retention policies should also specify how the documents should be destroyed. Just throwing sensitive documents into the waste paper basket is not a recommended course.
Implementing the Document Management Policies
In a non-computerized environment, exercising the above kinds of controls, except perhaps the one on retention and destruction, could be quite difficult. You might have to lock up sensitive documents to prevent unauthorized access, for example.
With the arrival of computers and networks, many of these tasks have become routine. Requiring the user to enter passwords before accessing a document controls access. The documents themselves could be stored in the deep recesses of a network, protected not only by passwords but also by firewalls and antivirus software.
Persons accessing a document could be given different rights with respect to that document. Some might be given only read permission. Others could be given full permissions. It would then be possible to allow controlled access to all who need to work with that document.
One important right is the right to print a document. If anybody could print a document, unauthorized persons could print and take the printed copy out. That could pose a serious danger to the business if sensitive documents reach the hands of, say, your competitors.
In a computerized environment, the original document would still remain where it was and top management might not know about the information leak.
In a network, it is possible to specify that documents could be printed only on secure printers that are accessible only to authorized persons. That way, one important avenue for losing confidential data could be blocked.
Yet another security measure that could be implemented under a computerized environment is to tag what each person does with a document. A history could be maintained to record the viewing and editing done on specific documents.
Document Policies for Confidentiality Requirements
There are legally mandated requirements that make formulation of document management policies (and their proper implementation) extremely important. You could face a huge compensation claim if certain kinds of data leak outside. Examples include health and financial data about your employees or customers.
The law requires you to maintain the confidentiality of any such data that comes to you in the course of business. There are also privacy laws that are becoming increasingly rigorous as the volume of email spam increases.
In the absence of clear document management policies, you would find it almost impossible to comply with the law.
Document Management Need to be Audited
Merely laying down policies and then making some rules would not serve your purpose. You need to ensure that:
* The rules would really implement the policies and
* The rules are being followed in practice
Arranging to generate appropriate performance reports and reviewing them periodically is a key component of the management exercise.
Auditing is also needed to show authorities that requirements mandated by law are indeed being followed and treated with respect.
Auditing could also reveal policy inadequacies and point to areas of weakness. Unless these are identified and highlighted, poor policies could continue in perpetuity.
Label the Documents
Identifying documents through labels is another important task of document management. While labeling needs specific action in a non-computerized office, it is automated to a great degree in a computerized environment.
Even this apparently small task would need clear policies if it is to work effectively.
About the Author: Author About
Dustin Baker of Ademero, Inc. invites you to learn more by visiting his Document Management Software site. Browse the Ademero resource section which includes the largest collection of posts from real users reviewing ALL of the most popular DMS systems available, free and commercial.
Sign up for a live demo of Ademero's Document Management System now!