Identify and Analyze Stakeholders A stakeholder is any person or group who can influence or be affected by the Data Management program. Stakeholders can be internal to or external to …
Big Data – Activities
Define Big Data Strategy and Business Needs An organization’s Big Data strategy needs to be aligned with and support its overall business strategy and business requirements and be part of …
Big Data Characterized in terms of V’s
Volume: Refers to the amount of data. Big Data often has thousands of entities or elements in billions of records. Velocity: Refers to the speed at which data is captured, …
Data Management – What is Master Data?
Different types of Data play different roles within an organization. They also have different management requirements. Malcolm Chisholm has proposed a six-layer Taxonomy of Data that includes Metadata, Reference Data, …
Data Management – Security Metrics
It is essential to measure information protection processes to ensure that they are functioning as required. Metrics also enable improvement of these processes. Some metrics measure progress on processes: the …
Data Security – Tools
Information Security Management depends on the size of the organization, the network architecture, the policies and standards used by a security organization. The following is highly recommended to be part …
Data Management – Define Data Security Standards
Policies provide guidelines for behavior. They do not outline every possible contingency. Standards supplement policies and provide additional detail on how to meet the intention of the policies. Define Data …
Data Management – DAM, Data Map, e-Discovery and EDRM
Digital Asset Management (DAM) is process similar to Document Management that focuses on the storage, tracking and use of rich media documents like video, logos, photographs, etc. Data Map is …
Data Management – Data Security Policy
Organizations should create data security policies based on business and regulatory requirements. A policy is a statement of a selected course of action and high-level description of desired behavior to …
Data Security – Types, Restrictions and Risks
Types of Data Security Facility Security Device Security Credential Security Identity Management Systems User ID Standards for Email Systems Password Standards Multiple Factor Identification Electronic Communication Security Data Security Restrictions …