Information Management and BI 1(a) Flashcards

1
Q

Name the 6 Phases in the “Information Lifecycle Mgmt” (ILM):

A

IC MUAD

(1) ID
(2) Capture
(3) Manage/Organize
(4) Utilize/Share/Access
(5) Archive
(6) Destroy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Under “Information Lifecycle Mgmt” (ILM). what is involved in the 1st Phase: “IDENTIFY “:

A
  • IDENTIFY (1 of 6 ILM Phases)
  • Must have formal, structured approach
  • ID what data to capture that has potential to assist mgmt in decisions
  • Ensure security and BI needs met w/ data being ID’d
  • To ID complete body of data, structure could involve: cross-functional team, IT governance guideline and/or body, change control committee, end users, business mgrs, info security and BI specialists
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Under “Information Lifecycle Mgmt” (ILM). what is involved in the 2nd Phase: “CAPTURE”:

A
  • CAPTURE (2 of 6 ILM Phases)
  • Capture data by Transactional Processing Sys (TPS)
  • If data in external sys or location to TPS, might involve manual processes
  • Captured data need to be aggregated into a DW or similar system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Under “Information Lifecycle Mgmt” (ILM). what is involved in the 3rd Phase: “MANAGE”:

A
  • MANAGE (3 of 6 ILM Phases)
  • Key factors:
    (1) Ensure appropriate access to users (Logical access, availability and restricted access to data)
    (2) Ensure data integrity/quality w/ adequate controls over input, processing, storage, and output.
  • Controls at point of data entry are considered more efficient and effective than controls at processing or output
    phases.
    (3) Ensure timeliness of delivery of data
    (4) Format, transform data into information
  • Organize data into systems, tables/files, BI (DW)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Under “Information Lifecycle Mgmt” (ILM). what is involved in the 4th Phase: “UTILIZE”:

A
  • UTILIZE (4 of 6 ILM Phases)

- Provide proper use of data as info to users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Under “Information Lifecycle Mgmt” (ILM). what is involved in the 5th Phase: “ARCHIVE”:

A
  • ARCHIVE (5 of 6 ILM Phases)
  • DW often used to archive permanent and semi-permanent data
  • Use archival techniques, useful lives to develop policy for archiving info and data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Under “Information Lifecycle Mgmt” (ILM). what is involved in the 6th Phase: “DESTROY”:

A
  • DESTROY (6 of 6 ILM Phase)
  • Destroy data if end of its life span
  • Need data destruction policies, developed based on contractual, legal, and other constraints
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the rules under the “Health Information Portability and Accountability Act” (HIPAA) of 1996?

A
  • Federal law
  • HIPAA established standards for electronic health care transactions and data for patients
  • Law on Personally identifiable info (PII) – info to access to financial assets, or personal medical info
  • Administrative Simplification (Title II) provisions of HIPAA require health care entities to provide privacy and security for PII for health data
  • Need policies and info monitoring to ensure compliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the rules under the Gramm-Leach-Bliley Act (GLBA) of 1999?

A
  • Federal law on privacy and security about Personally identifiable info (PII) – info to access to financial assets, or personal medical info
  • GLBA applies to financial institutions like commercial / investment banks, securities firms and insurance companies
  • Some key aspects of GLBA apply to entities that receive PII like credit reporting agencies, appraisers, mortgage brokers
  • Safeguards Rule requires financial institutions to design, implement and maintain safeguards to protect customer info
  • Req’mts include written info security (InfoSec) plan that describes how entity plans to protect PII, for consumers past or present
  • Mgmt need to study how they manage private data and do risk analysis to comply w/ GLBA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the rules under the “California Database Breach Act” (SB-1386) of 2002?

A
  • State law on privacy and security
  • Related to personally identifiable info (PII) – info to access to financial assets, or personal medical info
  • Effective 7/1/03, CA residents whose unencrypted PII was or believed to have been, acquired by unauth person must be notified by entity w/ breach
  • Any agency, person, or business that conducts business in CA, and owns or licenses digitized PII must disclose security breach to residents affected
  • Mgmt must do risk assessment to determine if subject to CA SB-1386, or similar state law, and take action w/ PandP and monitoring process
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the rules under the Massachusetts Data Privacy Act (MDPA), bill 201 CMR 17?

A
  • State law on privacy and security about Personally identifiable info (PII) – info to access to financial assets or personal medical info
  • Must comply if do business w/ MA residents or businesses in MA
  • MDPA establishes minimum standards for safeguarding PII of any MA resident of by org’s or individuals who own, license, store or maintain PII
  • Applies to collection, storage, or processing of PII.
  • Entity (data center) that simply stores PII, or processes PII (credit card processing) may be subject to this law.
  • PII is defined in MDPA as SSN, driver’s license or state-issued ID numbers, financial acct numbers, and credit/debit card numbers (CVV codes, PINs or pw’s)
  • Care s/b taken by entities that maintain PII data to make sure if subject to MDPA
How well did you know this?
1
Not at all
2
3
4
5
Perfectly