14 Data Governance Flashcards

1
Q

What is data governance?

A

Policies meant to protect people and the integrity of the data

Data governance includes international standards, national laws, local laws, industry regulations, company contracts, or personal rules.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data integrity?

A

How valid, or accurate, the data is

Maintaining data integrity involves ensuring that data is not manipulated incorrectly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can happen if data governance rules are ignored?

A

It can hurt the people whose data you are using and have legal repercussions for you personally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two main methods of granting access to data?

A
  • Role-based
  • User group-based
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does role-based access focus on?

A

The role a person plays in a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is user group-based access?

A

Access focused on the specific group to whom the data pertains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Data Use Agreements?

A

Contracts that state how data can be used, processed, deleted, and maintained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data encryption?

A

Using algorithms to translate data from plaintext to cyphertext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Data in transit is vulnerable.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is de-identification/masking of data?

A

Removing personal or sensitive information from data to legally report it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the acceptable use policy outline?

A

How data can be used, how it can’t be used, and what happens if the policy is broken.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What should you do if you suspect a data breach?

A
  • Report the breach
  • Secure operations
  • Fix vulnerabilities
  • Notify the impacted parties
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are some reasons for data deletion?

A
  • Consent is withdrawn
  • Illegal means were used to collect or process the data
  • Legal obligations
  • Data is no longer needed
  • The data retention period ended
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does data retention cover?

A

How long data will be kept and how it will be stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is personally identifiable information (PII)?

A

Data that can be used to identify a specific person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

List some examples of PII.

A
  • Name
  • Physical address
  • Email address
  • IP address
  • Social Security number
  • Phone number
  • License number
  • Passport number
  • Login ID
  • Social media ID
  • Social media posts
  • Date of birth
  • Digital images
  • Geolocation
  • Biometric data
  • Behavioral data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the role of a data analyst regarding data security?

A

To understand and follow data security protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the gold standard in data processing regulations?

A

The European Union General Data Protection Regulation (GDPR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Fill in the blank: Data security is important for maintaining _______.

A

data integrity.

20
Q

What is the consequence of deviating from the Data Use Agreement?

A

It is illegal and will have consequences for the company and the individual.

21
Q

What should you do before sharing data with someone not listed in the Data Use Agreement?

A

Obtain express approval with a release approval.

22
Q

True or False: Data security requirements are solely determined by government regulations.

23
Q

What is the significance of understanding data classifications?

A

Certain types of data are legally protected and have specific rules about how to treat them.

24
Q

What does PII stand for?

A

Personally Identifiable Information

PII includes any data that can identify a specific person.

25
Q

What is an example of PII?

A

Examples include:
* Social Security number
* Phone number
* Date of birth
* Geolocation

26
Q

What is the main purpose of the Data Use Agreement?

A

To outline acceptable use, data processing, data deletion, and data retention.

27
Q

What is PHI?

A

Personal Health Information

PHI includes identifiable information related to a person’s health.

28
Q

Which act is most referenced for protecting health information?

A

Health Insurance Portability and Accountability Act (HIPAA)

29
Q

What does PCI stand for?

A

Payment Card Industry

PCI focuses on financial information related to credit and debit cards.

30
Q

What is an entity in the context of data governance?

A

A table, model, or data object.

31
Q

What are entity relationships?

A

How data objects connect to each other.

32
Q

What are the main types of entity relationship requirements?

A

The main types are:
* Record link restrictions
* Data constraints
* Cardinality

33
Q

What do record link restrictions refer to?

A

Restrictions on linking different pieces of data of the same record.

34
Q

What are data constraints?

A

Rules designed to protect data integrity.

35
Q

What is cardinality in data relationships?

A

The row-to-row relationship between two table entities.

36
Q

What is a one-to-one relationship in cardinality?

A

Each row in the first table corresponds to one row in the second table.

37
Q

What is a one-to-many relationship in cardinality?

A

Each row in the first table corresponds to multiple rows in the second table.

38
Q

What is a many-to-many relationship in cardinality?

A

Each row in one table can correspond to multiple rows in another table and vice versa.

39
Q

What is the focus of PCI compliance?

A

Protecting personally identifiable financial information (PIFI).

40
Q

Fill in the blank: PHI is similar to PII but gets its own classification because there are laws around it specifically, covering any and all _______.

A

medical records

41
Q

True or False: All credit card information is considered PCI and is protected.

42
Q

What should you do if you suspect a data breach has occurred?

A

Inform the impacted parties.

43
Q

Which part of the Data Use Agreement includes explicit details about how the data is not supposed to be used?

A

Acceptable use policy

44
Q

Which variables would be considered PII?

A

All of the following:
* Geolocation
* Social media post
* Social Security number

45
Q

A filter that only allows a specific kind of data to be entered into a dataset can be considered which kind of entity relationship restriction?

A

Data constraint