Blueprint for Balance: IBM’s Guide to Managing and Protecting People Data
People analytics aims to provide actionable talent insights
Regardless of the method used, it's crucial to remember that people analytics involves handling personal and sensitive personal information (PI/SPI), which is subject to stringent usage restrictions that can vary by country and specific use-case.
In the past couple of years, IBM transformed its internal people data platform. Workforce360, IBM internal people data platform, aggregates data from over 35 sources, delivering integrated talent insights in just two days—23 days faster than previous methods. It simplifies access by consolidating over 400 reports into fewer interfaces and enhances solution development with its API integrated into over 50 applications, including our AskHR Chatbot supporting 2M interactions a year. Finally, the platform also supports key AI applications for career movement, skills, and compensation. More information on our transformation is available in other articles on my newsletter.
Throughout the years, we have achieved considerable advancements in people data access control. Although there remains substantial work to be accomplished, we can confidently summarize our lessons learned in the realm of data authorization
A. Always secure data, not systems, reports, or (Gen)AI solutions
The need to quickly deploy a people analytics solution in production often tempts developers to protect each report or AI solution independently. This method appears straightforward as it provides clear control over who accesses each item. However, this approach is not scalable, especially as the number of reports increases or when compliance regulations demand stricter scrutiny of data access. Consider the challenges involved in reviewing and further restricting access to specific SPIs (e.g., performance data for European employees). If the authorization process is implemented differently across multiple reports or AI solutions, it becomes extremely difficult to understand who has access to what and to make decisions about removing access to all related data. While initially appealing, this method ultimately complicates data management, reduces flexibility, and must be avoided.
B. Effectively balance the need for security and trust.
Setting up a complex, multi-step authorization process can slow operations and deter users from seeking access, thus restricting data democratization
C. Each data has ONE owner. Make sure you know who is responsible for each decision.
A crucial yet often overlooked aspect of authorization is clarity about who truly "owns" the data. Each piece of people data must have an accountable owner responsible for setting organizational policies that could go beyond legal requirements. The data owner is distinct from the system's custodian, where the data is hosted. They are not the creator of a report or the ChatBot. Nor are they part of the privacy and legal teams, which set compliance policies and offer guidance on business rules. Typically, the data owner should be identified either within the function generating the data (e.g., Compensation, Diversity, Talent Acquisition) or within the Business Unit associated with the data creation (e.g., sales organization for seller quota attainment).
Our Experience with Workforce360
Initially, our people data was scattered across multiple systems, each with varying and sometimes manual access processes. This required navigating multiple lengthy procedures, often resulting in inconsistent access across different systems.
With Workforce360, we phased out these outdated processes in favor of a uniform access system for all people data. This change streamlined the approval process from weeks to just days and increased our ability to adapt to policy changes.
Our security framework
Recommended by LinkedIn
Security objects
All data ingested into WF360 is categorized into Security Objects. A Security Object represents the smallest unit of data to which a user can request access. For example, First Name, Last Name, and employee email are grouped under the Security Object named 'Basic Data.' A user can request access to 'Basic Data' and, if approved, gain access to all data within this group. It is not possible for a user to request access to just the First Name without the Last Name.
Our system includes Security Objects tailored for specific areas such as compensation, talent acquisition, and diversity, to name a few. The number of data objects varies by company, but it is crucial to keep this number as small as possible. At IBM, we maintain less than two dozen Security Objects for all the data in WF360.
When users request data access, they specify the data objects they need along with the relevant business unit and geographic location. To meet strict compliance requirements, access can also be requested for individual countries.
Fast and custom-based access
At IBM, anyone can request access to all PI/SPI data within Workforce360, though not all requests are granted. Ownership of each security object is well-understood, with designated approvers specified by the owner. For instance, the compensation leader may require each Geo compensation director to review global requests for benefits data, while the HR owner of diversity data might limit access strictly to specific individuals within HR or Legal departments.
Clarifying data ownership is crucial for both accountability and consistent decision-making, and it also facilitates fast-track approvals for specific job roles.
In WF360, we identify job-role owners, such as executives overseeing an HRP organization, who are responsible for groups of employees that require specific data to fulfill their roles. Each job-role is defined by objective criteria that determine which employees fall under it, and job-role owners are held accountable for the behavior of this population when it comes to people data usage.
The Workforce360 team coordinates between security object and job-role owners to facilitate fast-path approvals for specific roles. For example, a Comp director may waive additional evaluations for HR partners within a Geo. This streamlined process has significantly reduced approval times from weeks to within 48 hours.
A one-size-fits-all approach to data consumption
When users gain access to data, they can utilize it across all platforms, including Reports, SQL, AI, or our AskHR chatbot. Centralizing access is crucial, as it enhances compliance and speeds up processes. For example, AskHR, IBM's chatbot, delivers people data to HRPs but doesn’t manage access directly. Instead, it uses the same permissions granted for Reports.
Access control management
Thank you for taking the time to read this article. If you're interested in these topics and IBM’s internal people data transformation, I would be delighted if you joined my People Data Platform monthly newsletter.
Retired
7moWell said on this important and complex topic. While it’s obvious that data must be safeguarded against bad actors, it’s (almost) as important to safeguard data against well-meaning but ill-informed actors. As an example, while someone might have valid access to compensation data and age-related data, you would not want these combined as potentially incorrect and damaging conclusions could be reached as there are many factors that affect compensation. Protecting data is everyone’s responsibility as is using it correctly.