Databases Reference
In-Depth Information
the data governance committee ensures that all policies and procedures
are adhered to, violators can be appropriately sanctioned as per institu-
tional policies and regulatory requirements. However, the enforcement
standards must be publically available.
CONCLUSIONS
This chapter provided a comprehensive background for developing data
privacy, security, and compliance through a systematic data governance
structure. The chapter focused on issues related to stakeholder and people
management to ensure privacy, security, and regulatory compliance. There
was an emphasis on process management that included data management,
the policymaking process, and strategies to achieve privacy, security, and
compliance. Important challenges to this process were outlined along with
its causes. Technology management through the use of software solutions
and the creation of a robust system architecture was addressed along with
processes for conducting risk management and enforcement as mandated
by regulation.
REFERENCES
Lederer, S., J. I. Hong, A. K. Dey, and J. A. Landay. 2004. Personal privacy through under-
standing and action: Five pitfalls for designers. Personal Ubiquitous Computing 8 (6):
440-454 .
National Institute of Standards and Technology (NIST). NISTIR 7628. Guidelines for smart
grid cyber security: Vol. 2, Privacy and the smart grid. The smart grid interoperability
panel—Cyber security working group. Washington, D.C.: U. S. Department of
Commerce. Online at: www.csrc.nist.gov/publications/nistir-7628-vol2.pdf (accessed
February 13, 2013).
FURTHER READINGS
Cheong, L., and V. Chang. 2007. The need for data governance: A case study. Paper presented
at the ACIS 2007 Proceedings, no. 100 . Online at: http://aisel.aisnet.org/acis2007/100
(accessed on January 12, 2012).
Khatari, V., and C. V. Brown. 2010. Designing data governance. Communication of the ACM
53 (1): 148-152.
Search WWH ::




Custom Search