Chapter 37

Information Management

Abstract

This chapter lists the most important topics of an information management plan covering the objectives of the plan, documents, authority, security, information distribution and acknowledgement, disaster recovery, configuration control, distribution schedule, risks, standards, reports and legal requirements.

Keywords

Disaster recovery; Distribution schedule; Information management; Information management plan; Security
Information, together with communication, is the very lifeblood of project management. From the very beginning of a project, information is required to enable someone to prepare a cost and time estimate, and it is the accuracy and ease of acquisition of this information that determines the quality of the estimate.
The success of a project depends greatly on the smooth and timely acquisition, preparation, exchange, dissemination, storage and retrieval of information, and to enable all these functions to be carried out efficiently, an information system enshrined in an information policy plan is an essential ingredient of the project management plan.
As with many procedures, a policy document issued by management is the starting point of an information system. If issued at a corporate level, such an information policy document ensures not only that certain defined procedures are followed for a particular project, but that every project carried out by the organization follows the same procedures and uses the same systems.
The following list indicates the most important topics to be set out in an information policy plan:
1. Objectives and purpose for having an information management plan
2. Types of documents to be covered by the plan
3. Authority for producing certain documents
4. Methods of distribution of information
5. Methods for storing information and virus protection
6. Methods for retrieving information and acquisition/modification permits
7. Methods for acknowledging receipt of information
8. Security arrangements for information, especially classified documents
9. Disaster recovery systems
10. Configuration control for different types of information
11. Distribution schedule for different documents
12. Standards to be followed
13. Legal requirements regarding time period for information retention
14. Foreseeable risks associated with information
This information management plan sets out the basic principles, but the actual details of some of the topics must then be tailored to a particular project. For example, the document distribution schedule, which sets out which document is produced by whom and who receives it, must clearly be project-specific. Similarly, the method of distribution depends on the availability of an IT system compatible with the types of information to be disseminated and the types and styles of documents produced.

Objectives and Purpose

The purpose of explaining the objectives of the policy document is to convince the readers that it is not bureaucratic red tape, but an essential aid to a smooth-running project. There is no doubt that there are numerous projects being run that do not have such a document, but in these cases the procedures are either part of another document or are well known and understood by all parties due to company custom and practice.

Types of Documents

The types of documents covered include correspondence with clients and suppliers, specifications, data sheets, drawings, technical and financial reports, minutes of meetings, records of telephone conversations and other selected data. All these data will be subject to configuration management to ensure correct distribution and storage.

Authority

Certain types of documents can only be issued by specified personnel. This covers mainly financial and commercial documents such as purchase orders, invoices and cheques.

Distribution of Information

Distribution of information can be done electronically or by hard copy. While in most cases, the sender has the option of which one to use, certain documents may only be sent by a specified method. For example, in some organizations legal documents may be e-mailed or faxed but must also be followed up with hard copies by mail. Generally nowadays, most data are available electronically and can be accessed by selected stakeholders using appropriate access codes or passwords.

Storing Information and Virus Protection

Most data can be stored electronically either by the sender or the receiver, but where special measures have to be taken, suitable instructions must be given. Data must be protected against viruses and hackers, and must be arranged and filed in a structured manner according to a predetermined hierarchy based on departmental or operational structures such as work breakdown structures or work areas. In some cases, hard copies of documents and drawings will have to be filed physically where electronic means are not available, as, for example, on remote construction sites. Important documents such as building leases, official purchase orders and contracts require storage space that must be both easily accessible and safe from natural disasters and theft. Special fire and waterproof storage facilities may have to be installed.

Retrieving Information and Acquisition/Modification Permits

Retrieving data electronically will generally not be a problem provided a good configuration-management system and effective indexing and identification methods are in place. In many cases, only certain personnel will be able to access the file and of these only a proportion will have the authority to make changes. Appropriate software will have to be installed to convert data from external sources, in the form of e-mails, faxes, spread sheets or other computerized data transmission processes, into a format compatible with the database in use. When handling hard copies, the method of filing documents in a central filing system must be firmly established and an order of search agreed upon. For example, the filing could be by suppliers’ names (alphabetically), by product type, by order number, by requisition number or by date. Again, some organizations have a corporate system, while others file by project. Whatever system is used, an enormous amount of time will be wasted searching for documents if the filing system is badly designed and, equally importantly, not kept up to date regularly.

Acknowledging Receipt of Information

In many cases, it may be necessary to ensure that the information sent is received and read. The policy of acknowledging certain documents must therefore be set down. A recipient may glance at a letter or scan an e-mail without appreciating its importance. To ensure that the receiver has understood the message, a request must be made to reply either electronically or, in the case of a hard copy, by asking for the return of an attached ‘confirmation of receipt’ slip. This is particularly important when documents such as drawings go to a number of different recipients. Only by counting the return slips can the sender be sure that all the documents are received.

Security Arrangements

Classified or commercially sensitive documents usually have a restricted circulation. Special measures must therefore be put in place to ensure the documents do not fall into the wrong hands. In some government departments, all desks must be cleared every evening and all documents locked away. Electronic data in this category requires special passwords that may have to be changed periodically. Documents no longer required must be shredded and where necessary incinerated. It is known that some private investigators have retrieved the wastepaper bags from the outside of offices and reassembled the paper shreds.

Disaster Recovery Systems

In light of both major natural disasters, such as earthquakes and hurricanes, and terrorist attacks, disaster recovery, also known as business continuity, is now a real necessity. Arrangements must be made to download important data regularly (usually daily) on disk, tape or even film and store them in a location far enough removed from the office to ensure that they can be retrieved if the base data has been destroyed. It will also be necessary to make arrangements for the replacement of any hardware and software systems that may have been destroyed or corrupted.

Configuration Control

Configuration management is an integral part of information management. Version control, change control and distribution control are vital to ensure that everybody works to the latest issue and is aware of the latest decisions, instructions or actions. The subject is discussed in more detail in the chapter on configuration management, but the information policy plan must draw attention to the configuration-management procedures and systems being employed.

Distribution Schedule

The distribution of documents can be controlled either by a central computerized data distribution system activated by the originator of the document or by a special department charged with operating the agreed configuration-management system. One of the key sections of the project-management plan is the document distribution schedule, which sets out who originates a document and who receives it in tabular form. If hard copies have to be sent, especially in the case of drawings, the number of copies for each recipient must also be stated. If this schedule is lodged with the project office or the distribution clerk, the right persons will receive the right number of copies of latest version of a document at the right time. While most document distribution will be done electronically, hard copies may still be required for remote locations or unsophisticated contractors, suppliers or even clients.

Standards to Be Followed

Standard procedures relating to information management must be followed wherever possible. These standards may be company standards or guidelines, codes of practice or recommendations issued by national or international institutions. The British Standards Institution has issued guides or codes of practice for configuration management, project management, risk management and design management, all of which impact on information management. An International Standard BS ISO 15489-I-2001 ‘Information and Documentation – Records Management – Part 1 – General’ is of particular importance.

Legal Requirements

Every project is constrained by the laws, statutory instruments and other legal requirements of the host country. It is important that stakeholders are aware of these constraints and it is a part of the information-management process to disseminate these standards to all the appropriate personnel. The Freedom of Information Act and Data Protection Act are just two such legal statutes that have to be observed. There may also be legal requirements for storing documents (usually for about 7 years) before they can be destroyed.

Foreseeable Risks

All projects carry a certain amount of risk, and it is vital that warnings of these risks are disseminated in a timely fashion to all the relevant stakeholders. In addition to issuing the usual risk register, which lists the perceived risks and the appropriate mitigation strategies, warnings of unexpected or serious risks, imminent political upheaval or potential climatic disasters must be issued immediately to enable effective countermeasures to be taken. This requires a preplanned and rehearsed set of procedures to be set up that can be implemented very rapidly. The appointment of an information risk manager will be part of such a procedure.
An important part of information management is issuing reports. A project manager has to receive reports from other members of the organization to enable him to assess the status of the project and in turn produce his own reports to higher management. Systems must be set up to ensure that these reports are produced accurately, regularly and timely. The usual reports required by a project manager cover progress, cost, quality, exceptions, risks, earned value, trends, variances and procurement or production status. These data will then be condensed into the regular (usually monthly) progress report to the programme manager, sponsor or client as the case may be. Templates and standard formats greatly assist in the production of these reports and modern technology enables much of these data to be converted into graphs, charts and diagrams, but presentation can never be a substitute for accuracy.

Data Collection

As the technical advances of IT expand, more and more data will be collected and screened by more and more organisations and companies. These data are then used for a great number of reasons ranging from security and defence to stock control, marketing, design and planned maintenance, as well as populating expert systems.
The way the data is collected also varies from direct face to face or telephone interviews and questionnaires, through data-logging techniques as used by utility companies to read domestic or commercial metre usage, to the sophisticated methods used by the security services to monitor phone conversations and internet traffic.
However, while the quantity of the data may be impressive, it will be useless, if not dangerous, if the quality is suspect. Equally important is the timing, as late data can seriously affect the making of a decision or the issue of a report.
A case in point is the need for vigorous expediting of data required by procurement departments and design engineers from manufacturers or subcontractors. For this reason, the methods described in Chapter 34 (expediting, monitoring and inspection) should form part of the standard procedures of any design organization. Fig. 34.2 shows a typical questionnaire sent out to prospective bidders to enable their capability, competence and financial stability to be assessed.
Another example is given in Fig. 27.5 which shows what information is required from different suppliers to enable the designers to incorporate the information into their overall scheme. Accompanying such a table would be the organization’s conditions of purchase and the dates for which the different data are required. For example, in the case of pumps, setting plans and information on flanges are required before impeller details.
There are two main types of data collection: qualitative (depth) and quantitative (breadth).

Qualitative

This method includes such techniques as structured interviews, direct observation, discussion groups. Much depends on the skills of the interviewer or discussion leader who must retain an open mind and not ask leading questions. Advantages include high-response rates and the ability to explore in greater depth after an initial analysis.

Quantitative

This covers questionnaires sent by mail or e-mail, telephone surveys, sample surveys based on a large number of participants, etc. Such surveys, which take into account age, ethnicity, income bracket and geographical location are often used by governments, academic researchers, retail businesses and manufacturers. The results of such surveys can affect policies and marketing strategies.
There should be a corporate strategy on data management which covers the operation of central data base, access to data, security, methods of quality verification, evaluation techniques, dissemination and any time or cost constraints.

Big Data

This is the term given to the collection, storing, analysing, categorizing and distributing large amounts of data which is too voluminous to be handled by a conventional relational database.
The collection, analysis and processing of Big Data is carried out by almost every facet of modern society including central and local government, industry, medical services, commercial and financial institutions, scientific institutions, retailers, food distributors and, of course, survey organizations. A recent House of Commons Science and Technology select committee report said that 90% of the world’s electronic data was created in the last two years and would grow yearly by 40% per year for the next 10 years. The capture of this amount of data and its analysis will have an enormous impact on industry and public services worldwide.
The mechanism for collecting Big Data is equally diverse, covering mobile phone networks, internet, mail shots, aerial photography, radio frequency identification, mass surveys and remote sensors. One example of preparing for Big Data is the provision of special brackets on construction plant for the multitude of sensors required to capture the data.
All this information must be tested for accuracy before it can be analysed, categorized and distributed to the users who require it for security, marketing or scientific purposes. Speed of dissemination is important as this will enable better and faster decisions to be made.

Further Reading

Laudon K.C. Management of information systems. 11th ed. Prentice-Hall; 2008.

Marchewska J.T. Information technology project management with CD-rom. 4th ed. Wiley; 2012.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset