Information management

Information management should:Capability maturity checklist assessment for project business case management

  • capture data accurately and consistently;
  • develop usable information from raw data;
  • maintain information securely and accessibly during its useful life;
  • support effective decision making and communication.
Indicators Level 2 attributes

 

The need for assessing capability in information management is less about the inherent complexity of the work and more about its external environment.

A large and highly complex piece of work may be very open and straightforward from an information point of view whereas a small project may be commercially sensitive and in need of careful information management.

In an environment where security is important it may be a necessity to have level 3 capability in information management – nothing less would be adequate.

Collect and create data

All necessary data is collected or created.

Document and store information

Data is presented as information that supports decision making processes and keeps stakeholders informed.

Version control and ownership of documents is clear.

Access and disseminate

Documentation is accessible but controlled.

Dissemination is recorded and traceable.

Archive

Documents are archived when no longer required.

Destroy

Destruction of information is ad-hoc unless required for contractual or legal reasons.

 
Indicators Level 3 attributes

Collect and create data

All necessary data is collected or created in a demonstrably consistent manner.

Document and store information

Presentation standards are implemented across all documentation.

Key documents are subject to full configuration management.

Systems exist to support workflow, secure storage and backup.

Access and disseminate

Levels of access are defined and controlled.

There are systems in place to manage authorisations and check dissemination before release.

Archive

Documents are archived when no longer required but document histories are retained.

Destroy

Storage is periodically reviewed and unnecessary documentation destroyed.

 

SHARE THIS PAGE

Please consider allowing cookies to be able to share this page on social media sites.

Change cookie settings
No history has been recorded.
Back to top