310 likes | 488 Views
SPRINGCLEANING@MUN. Four Strategies Toward Filling the Governance Toolkit at Memorial University . How do you start?. How do you do it effectively?. How do you get buy in?. Data governance. Backyard Cleanup Community Cleanup. Cleaning up our own backyard. Data classification Data masking.
E N D
SPRINGCLEANING@MUN Four Strategies Toward Filling the Governance Toolkit at Memorial University.
How do you start? How do you do it effectively? How do you get buy in? Data governance
Backyard Cleanup Community Cleanup
Cleaning up our own backyard Data classification Data masking
C&Cdata classification policy A guideline A framework A shared language A unit-specific standard
The classes www.mun.ca/cc/dc
Data Owner Governs the administrative data. Data Steward Classifies and manages administrative data for a given business data domain. Data Custodian Safeguards administrative data Data User Uses data responsibly. Responsible rolesWe all have a part to play.
ATIPPA – NL Privacy Act PHIA - NL Health Record Privacy Act PIPEDA - Canadian Privacy Act EDS – Electronic Data Security Memorial University Policy Related policies
Tuesday May 13 2014 C&C data classificationkick-offevent
How is C&Cusing its Data classification policy? Real examples. From our staff.
Bill Downey, PMO • Michael Windsor, Service Desk • Don Bryant, TSG C&C Data Classification Kick-off The elevator speeches
The band from left to right: David Pierce, John Martin, Melanie Burgess, Barbara Dawson, Heather Rhodes, Stephen Hennessey, Matthew Hare
our informationin four classificationsprotection for all when we classifyit is time to specifythe purpose of data Haikus
130 staff > 93 staff attended kick-off > 100 mugs handed out 7 units classifying data Measures of success
Meta-data – known sensitive data (SIN, DOB) Actual-data – potential sensitive data Discovery
Functional masking document (FMD) Techniques Date skew Substitution Static view Masking
Refresh DEVL DB Locked copy of PROD The Plan
Community Cleanup Reporting organization Identity and access management
empowering end users access defined by business need Enterprise reporting tools
common needs and differences consistent data for KPIs ad hoc reporting detailed report specifications report inventory data dictionary Business needs
Gaps authorization needed data not available in ODS data synchronization training
legally bound to protect right people right tools right time Identity and Access Management
Increase service delivery identity 1 password way data flow system Strategy
Your experiences Your plans Your strategies Discussion
John Martin Manager of Application Production Support jjmartin@mun.ca Heather Rhodes Business Analyst hrhodes@mun.ca Enterprise Application Services Computing & Communications Memorial University Presenters