Databases Reference
In-Depth Information
and procedures. A software solution utilized by a data governance com-
mittee would provide several functions including:
• Identifying and addressing critical data quality management issues
• Monitoring and improving data quality in an iterative environment
(constantly checking the same systems using the same metrics)
• Allowing a malleable solution where flexible rules can be defined to
measure appropriate use thresholds
• Allowing access controls for data monitoring to C-level executives
(CIOs, CEOs, CFOs, CMO, and CMIOs), IT and Compliance Officer,
PIs, and other data governance committee members along with
real-time feedback and quality reporting and alerts
• Providing logical interfaces between systems and other data report-
ing tools
A major responsibility of a data governance committee that is focused
on privacy and regulatory compliance includes oversight of technology
acquisitions that enable smart and accurate data management. As tech-
nology changes, the tools used to ensure appropriate access, timely access,
and controlled access are constantly evolving; i.e., data monitoring was
previously conducted on a system-by-system basis and required person-
nel to import data results from each system and compile the results. Today
organizations can purchase applications that reside on top of each system
through the use of interfaces and integration allowing data extraction,
in real time, and for the quality reporting and analysis. An effective data
governance committee will remain focused on acquiring such technologies
and implementing polices appropriately. This can be costly and may create
barriers for implementation. Nonetheless, if the governance committee
uses technological solutions to communicate initiatives, enforce policies
and procedures, monitor data issues, and correct data discrepancies, the
overall organizational momentum will help empower the committee. Data
issues can derive from incorrectly formatted data to out-of-date infor-
mation, improperly accessed, allowing erroneous business decisions and
affecting overall business intelligence. Figure  6.5 depicts a circular tech-
nology management solution where each circle initiates the next process
in a linked pattern. Moreover, the process can begin in any of the circles.
In this model, technology management will initiate a process for archi-
tecture management, change management, privacy and security access
Search WWH ::




Custom Search