Tips: How to share data during aquisition

Tips: How to share data during aquisition

If your organisation’s preparing for a merger or acquisition, you’ll be aware that there’s a lot of work to be done in little time. Here are some tips on how to meet some of the challenges you’ll face: 

 1. Pick one person or a tight team

Try and give just one person the job of overseeing the data transfers. This will leave the smallest room for errors and miscommunication. Yet, it may be wise to move an IT employee from the company you’re potentially acquiring/merging with, to help with the data transfer and risk identification process. Ensure you allow for time needed to convert any older data for use in newer software.

 2. Audit system and data

Request that your IT department quickly carry a full system and data inventory. if a merger or acquisition goes ahead, they'll need to identify what systems and data need to be integrated, consolidated or eliminated. A good starting point is to identify business, subject and data experts across both businesses.

  3. Centralise business data

Identify the data assets that need to be transferred. Data for the two companies must be accessed and audited, then if applicable, shared and stored securely. This may help to give a single view of what the combined business would look like in real-time.

4. Create an online virtual data room

Move relevant documents to a secure virtual data room. A virtual data room is a secure online data warehouse that contains vital documents, such as contracts, intellectual property information, employee information, financial statements and so on. It can allow access to all documents or only to a subset of documents, and only to pre-approved people.

 5. Disaster prevention and recovery

Consider carrying out background checks on anyone involved in the data transfer process.Think about potential risks that may happen during the transfer, and create a business continuity plan in case of data loss during the data transfer. Before you start the transfer, make sure to back-up all data.

 6. Protect sensitive information

Data breaches aren’t always caused by hackers. For example, sometimes, data is extracted from systems that contain sensitive information during an attempted merger or acquisition. Although it might be important to get data for testing and development, sensitive information should be ‘cloaked’ to avoid issues should the potential deal break down. Reduce the risk of a data breach with file encryption and branded document watermarking. Control user access or restrict the ability to print, share or download files. Agree in advance, who’ll be using the shared data.

要查看或添加评论,请登录

Steve Thomas的更多文章

社区洞察

其他会员也浏览了