Chapter 8 - Data Governance Flashcards
what umbrella term is a business function that is the set of policies, procedures and controls that an organization develops to safeguard its information while making it useful and accessible
Data Governance
What two things are vital for any data governance program?
1) Strong Executive/Management support
2) All levels of the org must understand the important of well-governed data
what term describes the act of devloping the POLICIES and PROCEDURES for looking after an organizations data quality, security, privacy and regulatory compliance?
Data Stewardship
Which role is RESPONSIBLE for data stewardship?
Data Stewards
Which role forms the link between technical and non-technical divisions within an organization and works with data owners to establish policies?
Data Steward
A data owner is usually a ____ business _____ with overall ___________ for a specific data _________
A data owner is usually a SENIOR business LEADER with overall RESPOSIBILITY for a specific data DOMAIN
WHAT contains data about a particular operational division?
data domain or data subject area
Which two data roles work with each other to establish policies and procedures for their domain?
The DATA OWNER works with the DATA STEWARD to establish/define policies and procedures for their domain?
if the data owner and data steward establish policies and procedures, which two roles work together to implement those data governance policies?
The SUBJECT AREA DATA STEWARD works with the DATA CUSTODIAN to IMPLEMENT the data governance policies
Which role does the actual implementing or operation of the technical controls execute data governance policies?
The DATA CUSTODIAN
which tool is used in data governance to define data categories, descriptions and disclosure implications for data?
The DATA CLASSIFICATION MATRIX
what is vital to consider about the data when developing access requirements to ensure proper data stewardship?
data classification
the broad classifications of data are agreed between who?
The Data Steward and the Data Owner
which two roles work to develop the procedures for granting access to information?
The Data Steward and the Subject Area Data Steward
a role-based access approach facilitates maintenance of __________ and improves _________. I
a role-based access approach facilitates maintenance of PERMISSIONS and improves CONSISTENCY.
An org chart can help inform how you develop what in regards to data?
roles for role-based access
what policy describes the access requirements data subject area and access type, including reading, creating, updating and deleting?
Access Control Policy
before sharing data with an outside party, what should you establish with them?
A Data Use Agreement.
Regarding sharing data with another company, what must you implement if sharing information regarding research on human subjects?
An Institutional Review Board
body that reviews and approves sharing of data regarding research using human subjects.
institutional review board
What is essential to understand when drafting a Data Use Agreement?
The Data Classification for each piece of data to shared
The Data Usage Agreement provides details governing what 3 things about the data?
The Transfer
The Usage
And Disclosure Protocols
what are the two most common locations for data-at-rest?
Databases and flat files
What do Oracle and Microsoft use to encrypt data and LOG FILES?
TDE (Transparent Data Encryption)
Johnny is entering data into a web-form, what should he check before he enters it?
Should check for a padlock icon in the browser.
What encryption protocols should you use to encrypt the copying of data between transactional and analytical system in an ETL process?
SFTP or SCP (Secure Copy Protocol)
Tilly wants load data into a training data base. She doesn’t have any test data and only has production data. She needs to ensure she doesn’t copy over sensitive information. What could she do to ensure it doesn’t get copied across?
She can implement Data Masking Strategy to ensure sensitive data isn’t revealed.
Fran is sharing data with an external 3rd party. Some of the data is sensitive. She decides she will de-identify the data to prevent identification. Is this enough?
No. She must consider the re-identification possibilities and remove absolutely every variable that is not needed.
What considering storage environment requirements and on a shared drive in particular, what’s the safest way to manage share drive permissions to control access to data?
Identifying user groups and create roles for those groups and assigning users to them.
as opposed to file based/individual permissions
What’s the risk around using cloud-based collaboration by design like Google Docs? What should you considered as a mitigation?
The ability to share documents resides with the individual who created the documents that are collaborated on. You need to ensure there is suitable administrative controls to combat this.
When storing data in the cloud, how can you minimize the risk that only authorized people have access to your data (and not the cloud provider!)?
By use of a customer-managed encryption key.
Regarding data retention. Bob fires Alice for poor performance. How long is he legally obliged to store her employment data for?
1 year from termination date
Regarding data retention, how long are US companies legally obliged to store tax data?
7 years
What requirements define how to collect, process, use, store, retain and remove data?
Use Requirements
Regarding data retention, apart from legal obligations of retaining data, what other reason would you store data?
You’d store data if it had a particular organizational significant and then use that for statistical trending