I developed a comprehensive data governance framework for the team. Then I adapted it for every other audience that had to understand it. The information doesn't change. The structure, pacing, and entry points do.
The original ran 34 pages, crafted for the people that owned the process and structured around how they think about it. The excerpt below shows where each audience stops reading.
All organizational data assets are classified into four tiers based on sensitivity, regulatory exposure, and business impact upon unauthorized disclosure.
Upon identification of a suspected data incident — defined as any unauthorized access, disclosure, modification, or destruction of data classified Tier 1 or Tier 2 — the discovering party initiates the response protocol by filing a Data Incident Report (DIR) through the GRC platform within 4 hours of discovery.
The DIR triggers automatic notification to the Data Governance Council (DGC) duty officer, the relevant Data Domain Owner (DDO), and the Information Security Incident Response Team (ISIRT). The DGC duty officer performs initial triage within 2 hours of DIR receipt, classifying the incident as Category A (confirmed breach of Tier 1 data with external exposure), Category B (confirmed breach of Tier 2 data or Tier 1 with contained internal exposure), or Category C (suspected but unconfirmed incident requiring investigation).
Each version restructures what the reader sees first and how much detail surfaces at each level.