Personal Data Management – Information you need to know.

Personal Data Management – Information you need to know.

Facts and conclusion you as an individual need to consider.
* The amount of new data doubles every two years. (IDC)
* 85 % of all data is generated by individuals, or is Meta Data about that data!!
* (IDC) is predicting data growth at 59% per year into the foreseeable future.
* There is not enough media in the world to store all of the data that is being generated. (Gartner)
* The shelf life of digital data is 3 to 5 years. (The length of time for technologies to change.)
* In 10 years there will be at least 50 times the amount of data there is today.

In the “2012 Gartner Magic Quadrant for Enterprise Backup/ Recovery Software,” Gartner forecasts that by 2016, one-third of organizations will change backup vendors due to frustration over cost, complexity and/or capability; and “By 2015, at least 25% of large enterprises will have given up on conventional backup/recovery software, and will employ snapshot and replication techniques instead.”

CONCLUSION 1: Major corporations are making decisions about you and your data without your knowledge, consent, or best interests in mind.

CONCLUSION 2: Individuals must manage their own data, or suffer the consequences of losing it.

How to manage and preserve your own data: snapshot and replication techniques

Call to action: Create and follow a back-up / disaster recovery plan for your personal information.
Here’s how:
1.) Purchase two external high capacity disk drives. As large as you can afford.

HSM Drives

2 Back-up Disk Drives

2.) Attach both to your system. They should appear as separate volumes.
3.) Back up all your information to both Volumes. Use encryption if you are technology savvy enough to figure out how to. You now have 3 copies of your data.
4.) Detach one of the Drives and move it to a secure remote site like a safety deposit box, a fireproof safe, or a trusted family members house. Somewhere where a natural disaster (Fire, flood, Earthquake etc..) will not effect both locations.
5.) Periodically perform a backup of your primary system on the local add-on drive. Retrieve the remote drive, copy your data to that drive also. Maintain three copies at all times. Working copy. Local back-up, and a remote copy.
6.) When a disaster strikes on your system…. Use the local back-up to recover.
7.) When a major disaster strikes and when both your primary and local copies are lost. You still have the remote copy to recover from.

Share this post with your network. Subscribe to this blog for more information about Personal Information Management issues, tips, and advice.


Peter Gailey


4 thoughts on “Personal Data Management – Information you need to know.

  1. Peter,

    Good advice as usual. Is a back up in the cloud (dropbox, apple cloud, or similar)
    good for the remote back up? It isn’t a physical backup but it would be a remote you can access from home. Or is it an option for the fourth copy of information?

    • Rob, Great question. It is my opinion that a remote copy should be managed by you as I have described.

      The “Cloud Services” are in the early stages of their maturity models. And all have security issues. Let me explain. If you read the Terms and Conditions of Google, Yahoo, Facebook, Twitter, Flicker, YouTube, Apple etc… They all state that they read the material uploaded to their sites. Monitor the information. Mine the information. Re-purpose the information. All under the guise of understanding more about you and their customers so that they can create and, eventually provide “Better Service Offerings” in the future. Further more, they are under no requirements to return your information. And there is no remedy (To you as an individual) in their T’s and C’s if they compromise your information. There may be fines associated with breaches, but those are not generally paid to you. You will generally get a few free months of service. And that is little consolation if your data is either compromised, or lost.

      I literally spoke with a lady in Denver yesterday (8-1-12) who said one of her personal pictures was being used by Facebook as a promotional piece for travel partners in Denver. She found out when one of her friends pointed her to the advertisement. This happened without her permission. She was flattered, but surprised. A true story.

      Another example, IF for a variety of reasons, your account is ever compromised in any way by you or someone causing mischief, ALL of these services have every right to close the account (Per the T’s and C’s you have agreed to.) IF your account gets shut down, you no longer have access to your information. At Google for instance that means g-mail, YouTube, your blog, Google Analytics, Google Docs, and many other services you may be using. Bink! No access to your information. No recourse. Nice to know you.

      I highly recommend you perform the three tier backup routine I have described. A.) Working copy. B.) Snapshot local copy. C.) Snapshot Remote Copy. Then and only then, consider the Cloud Services for convenience.

      Please do not get me wrong. I am NOT saying you should forgo using Cloud Services. I use them extensively. But only as a part of my strategy.

      Hope that helps.
      The Personal Information Management Coach

  2. Pingback: Personal Data Management – Information I need to know « Sykes' Blog

  3. The present system allows a user to access data stored on multiple portable devices and to control the functions of multiple hand held devices such as cell phones, PDAs, wireless email terminals, and the like, through a common interface, the system stores one or more associations between a known system user and specific mobile hand held devices. An input device receives information verifying the identity of the user, and the system attempts to establish a communication link with all of the mobile hand held devices associated with the identified user, while excluding communications with all other devices that may be present and capable of communicating with the system. In an embodiment the personal information management system is installed in a vehicle. A user’s presence is verified via a unique identification code received by the vehicle’s remote keyless entry (RKE) system from a corresponding RKE key.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>