SlideShare a Scribd company logo
CHAPTER 10
INFORMATION GOVERNANCE
Information Governance and Information
Technology Functions
ITS 833
Dr. Mia Simmons
Chapter Overview
■ This chapter will cover pages 189-206 in
your book.
■ This chapter discusses how Information
Technology (IT) aligns directly with the
success of Information Governance.
2
What is Information Technology?
■ Information technology (IT) is a core function impacted by
information governance (IG) efforts.
– The IT side, shared responsibility for IG means the IT
department itself must take a closer look at IT processes
and activities with an eye to IG.
– A focus on improving IT efficiency, software development
processes, and data quality will help contribute to the
overall IG program effort
3
CIO & IT Leaders Key Focus Areas
■ Four IG areas for successful delivery of IG efforts:
1. Don’t focus on technology, focus on business impact
■ IT needs to become more business savvy, more businesslike,
more
focused on delivering business benefits that can help the
organization
to meet its business goals and achieve its business objectives.
2. Customize your IG approach for your specific business,
folding in
any industry-specific best practices possible.
■ there are components that are common to all industries, but
tailoring
your approach to your organization is the only way to deliver
real
business value and results
3. Make the business case for IG by tying it to business
objectives
■ The business case must be presented in order to gain
executive
sponsorship, which is an essential component of any IG effort.
4. Standardize use of business terms
■ IG requires a cross-functional effort, so you must be speaking
the
same language, which means the business terms you use in your
organization must be standardize
4
Data
Governance
■ Data is big, data is growing, data is
valuable, and the insights that can be
gained by analyzing clean, reliable data
with the latest analytic tools are a sort of
new currency.
■ focuses on information quality from the
ground up (at the lowest or root level), so
that subsequent reports, analyses and
conclusions are based on clean, reliable,
trusted data (or records) in database
tables
■ Data governance is a newer, hybrid
quality control discipline that includes
elements of data quality, data
management, IG policy development,
business process improvement, and
compliance and risk management.
■ Data governance with real-time analytics
and business intelligence (BI) software
not only can yield insights into significant
and emerging trends but also can provide
solid information for decision makers to
use in times of crisis—or opportunity.
5
Steps to Governing Data
Effectively
1. Recruit a strong executive sponsor.
2. Assess your current state
3. Set the ideal state vision and strategy.
4. Compute the value of your data.
5. Asses Risk
6. Implement a going-forward strategy
7. Assign accountability for data quality to
business units, not IT.
8. Manage the change
9. Monitor your data governance program.
6
Data Governance Framework
7
Data Governance Framework
■ Data Governance Framework a visual model to help guide
planning efforts and a “logical structure for classifying,
organizing, and communicating complex activities involved in
making decisions about and taking action on enterprise
data.”
8
Information Management
■ Principal function of Information Technology
■ Subcomponent tasks used to collect and process data:
1. Master data management (MDM) is a key process for IG
success in the IT department, which extends to involved
business units
2. Information lifecycle management (ILM) is managing
information appropriately t and optimally at different stages
of its useful life, from creation through distribution and use,
including meeting legal and regulatory requirements, and
through its final disposition, which can be destruction,
archiving, or transfer to another entity
3. Data architecture refers to the “design of structured and
unstructured information systems” 17 in an effort to
optimize data flow between applications and systems so that
they are able to process data efficiently.
4. Data modeling can be complex, yet it is an important step in
overall IG for g the IT department. It “illustrates the
relationships between data
9
Data Modeling to Integration
■ A user interface is constructed for the application, followed
by movement
of data or e-documents through work steps using workflow
capabilities,
and then integration with existing applications. Accomplished
through an
application programming interface, a sort of connector that
allows
interaction with other applications and databases.
10
Data Modeling Integration cont…
■ 6 approaches to data modeling:
1. Conceptual. The conceptual approach merely diagrams data
relationships at the “highest level” 20 showing the storage,
warehousing, and movement of data between applications.
2. Enterprise. The enterprise approach is a more business-
oriented
version of conceptual data modeling that includes specific
requirements for an enterprise or business unit.
3. Logical. Pertinent to the design and architecture of physical
storage,
logical data modeling “illustrates the specific entities, attributes
and
relationships involved in a business function.”
4. Physical. The physical approach depicts the “implementation
of a
logical data model” relative to a specific application and
database
system.
5. Data integration. This approach is just what it says; it
involves
merging data from two or more sources, processing the data,
and
moving it into a database. “This category includes Extract,
Transform, and Load (ETL) capabilities.”
6. Reference data management. This approach often is confused
with
MDM, although they do have interdependencies.
11
IT Governance
■ IT governance is the primary way that stakeholders can ensure
that
investments in IT create business value and contribute toward
meeting
business objective.
12
IT Governance Frameworks
■ Implementing an IT Governance Program
– Must align with business objectives and incorporate IT
strategies
■ CobiT (Control Objectives for Information and related
Technology) is a process
based IT governance framework that represents a consensus of
experts
worldwide
– IT Control offers:
■ Cut IT risks while gaining business value from IT under an
umbrella
of a globally accepted framework.
■ Assist in meeting regulatory compliance requirements.
■ Utilize a structured approach for improved reporting and
management decision making.
■ Provide solutions to control assessments and project
implementations to improve IT and information asset control.
13
IT Governance Frameworks
■ COBIT 5 released in 2012
■ “CobiT 5 is based on five key principles for governance and
management of enterprise IT:
– Principle 1: Meeting Stakeholder Needs
– Principle 2: Covering the Enterprise End-to- End
– Principle 3: Applying a Single, Integrated Framework
– Principle 4: Enabling a Holistic Approach
– Principle 5: Separating Governance From Management
14
IT Governance Frameworks
■ COBIT 5 describes 7 enablers:
1. Principles, policies and frameworks are the vehicle to
translate the desired
behavior into practical guidance for day-to-day management.
2. Processes describe an organized set of practices and activities
to achieve
certain objectives and produce a set of outputs in support of
achieving overall
IT-related goals.
3. Organizational structures are the key decision-making
entities in an
enterprise.
4. Culture, ethics and behavior of individuals and of the
enterprise are very
often r underestimated as a success factor in governance and
management
activities.
5. Information is required for keeping the organization running
and well
governed, but at the operational level, information is very often
the key
product of the enterprise itself.
6. Services, infrastructure and applications include the
infrastructure,
technology and applications that provide the enterprise with
information
technology processing and services.
7. People, skills and competencies are required for successful
completion of all
activities, and for making correct decisions and taking
corrective action
15
IT Governance Frameworks
■ ValIT (Value-oriented) - principles and best practices focus is
on leveraging IT
investments to gain maximum value.
■ ITIL is a set of process-oriented best practices and guidance
originally
developed in the United Kingdom to standardize delivery of IT
service
management. ITIL is applicable to both the private and public
sectors and is
the “most widely accepted approach to IT service management
in the world.
■ ISO/IEC 38500:2008 is an international standard that provides
high-level
principles and guidance for senior executives and directors, and
those
advising them, for the effective and efficient use of IT
16
IG Best
Practices
for
Database
Security
and
Compliance
■ Database Security Best Practices:
– Inventory and document
– Assess exposure/weaknesses.
– Shore up the database
– Monitor. On a regular basis,
monitor and document any
configure
– Deploy monitoring/auditing
tools
– Verify privileged access
– Protect sensitive data
– Deploy masking
– Integrate and automate
standardized security processes
17
Chapter Summary
■ Focusing on business impact and customizing your IG
approach to meet
business objectives are key best practices for IG in the IT
department.
■ Effective data governance can yield bottom-line benefits
derived from
new insights.
■ Good data governance ensures that downstream negative
effects of
poor data are avoided and that subsequent reports, analyses, and
conclusions are based on reliable, trusted data.
■ Master data management is a key IG process in IT.
■ IT governance seeks to align business objectives with IT
strategy to
deliver business value.
■ ValIT is a framework that focuses on delivering IT vale. It is
folded into
CobiT 5.
■ ITIL is the “most widely accepted approach to IT service
management in
the world.”
■ Identifying sensitive information in your databases and
implementing
database security best practices help reduce organizational risk
and the
cost of compliance
18
Information Governance
Chapter 10
Complete Week 9 Objectives

More Related Content

Similar to CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx

COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
Maganathin Veeraragaloo
 
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
vrickens
 
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
donnajames55
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsGoutama Bachtiar
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013James Sutter
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013Jim Sutter
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
Sayyed Zakir Ali Rizwe
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
Goutama Bachtiar
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
ssusera19f45
 
Critical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance ImplementationsCritical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance Implementations
Rachid Meziani, PhD, CGEIT, PMP
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
IJCSIS Research Publications
 
SG Data Mgt - Findings and Recommendations.pptx
SG Data Mgt - Findings and Recommendations.pptxSG Data Mgt - Findings and Recommendations.pptx
SG Data Mgt - Findings and Recommendations.pptx
ssuser57f752
 
INF3703 - Chapter 15 Databases For Business Intelligence
INF3703 - Chapter 15 Databases For Business IntelligenceINF3703 - Chapter 15 Databases For Business Intelligence
INF3703 - Chapter 15 Databases For Business Intelligence
bloeyyy
 
Data Governance
Data GovernanceData Governance
Data Governance
Axis Technology, LLC
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
Robert Sheesley, CBA, CPHIMS
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
Mike Wright
 
COBIT
COBITCOBIT
COBIT
Ai Lun Wu
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
Sherri Booher
 
Knowledge management and business intelligence
Knowledge management and business intelligenceKnowledge management and business intelligence
Knowledge management and business intelligence
Azmi Taufik
 

Similar to CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx (20)

COBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORKCOBIT 2019 - DIGITAL TRUST FRAMEWORK
COBIT 2019 - DIGITAL TRUST FRAMEWORK
 
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
 
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docxITS 833 – INFORMATION GOVERNANCEChapter 10 -  Information Go.docx
ITS 833 – INFORMATION GOVERNANCEChapter 10 - Information Go.docx
 
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
PECB Webinar: Aligning COBIT 5.0 and ISO/IEC 38500
 
Understanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor RelationshipsUnderstanding IT Strategy, Sourcing and Vendor Relationships
Understanding IT Strategy, Sourcing and Vendor Relationships
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013It Governance OC CIO Nov,2013
It Governance OC CIO Nov,2013
 
IT Governance - COBIT Perspective
IT Governance - COBIT PerspectiveIT Governance - COBIT Perspective
IT Governance - COBIT Perspective
 
Governance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 FrameworkGovernance and Management of Enterprise IT with COBIT 5 Framework
Governance and Management of Enterprise IT with COBIT 5 Framework
 
IT Governance Presentation by omaha 2008
IT Governance Presentation by  omaha 2008IT Governance Presentation by  omaha 2008
IT Governance Presentation by omaha 2008
 
Critical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance ImplementationsCritical Success Factors (CSFs) for Effective IT Governance Implementations
Critical Success Factors (CSFs) for Effective IT Governance Implementations
 
Implementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance FrameworkImplementation of a Decision System for a Suitable IT Governance Framework
Implementation of a Decision System for a Suitable IT Governance Framework
 
SG Data Mgt - Findings and Recommendations.pptx
SG Data Mgt - Findings and Recommendations.pptxSG Data Mgt - Findings and Recommendations.pptx
SG Data Mgt - Findings and Recommendations.pptx
 
INF3703 - Chapter 15 Databases For Business Intelligence
INF3703 - Chapter 15 Databases For Business IntelligenceINF3703 - Chapter 15 Databases For Business Intelligence
INF3703 - Chapter 15 Databases For Business Intelligence
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Gaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptxGaining and Maintaining IT & Business Alignment.pptx
Gaining and Maintaining IT & Business Alignment.pptx
 
WLS Services Brochure March 2013
WLS Services Brochure March 2013WLS Services Brochure March 2013
WLS Services Brochure March 2013
 
COBIT
COBITCOBIT
COBIT
 
IT Governance Framework
IT Governance FrameworkIT Governance Framework
IT Governance Framework
 
Knowledge management and business intelligence
Knowledge management and business intelligenceKnowledge management and business intelligence
Knowledge management and business intelligence
 

More from keturahhazelhurst

1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
keturahhazelhurst
 
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx
keturahhazelhurst
 
1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx
keturahhazelhurst
 
1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx
keturahhazelhurst
 
1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx
keturahhazelhurst
 
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx
keturahhazelhurst
 
1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx
keturahhazelhurst
 
1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx
keturahhazelhurst
 
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx
keturahhazelhurst
 
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
keturahhazelhurst
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
keturahhazelhurst
 
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx
keturahhazelhurst
 
1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx
keturahhazelhurst
 
1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx
keturahhazelhurst
 
1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx
keturahhazelhurst
 
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx
keturahhazelhurst
 
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx
keturahhazelhurst
 
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx
keturahhazelhurst
 
1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx
keturahhazelhurst
 
1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx
keturahhazelhurst
 

More from keturahhazelhurst (20)

1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
1. The ALIVE status of each SEX. (SEX needs to be integrated into th.docx
 
1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx1. Some potentially pathogenic bacteria and fungi, including strains.docx
1. Some potentially pathogenic bacteria and fungi, including strains.docx
 
1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx1. Terrestrial Planets                           2. Astronomical.docx
1. Terrestrial Planets                           2. Astronomical.docx
 
1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx1. Taking turns to listen to other students is not always easy f.docx
1. Taking turns to listen to other students is not always easy f.docx
 
1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx1. The main characters names in The Shape of Things are Adam and E.docx
1. The main characters names in The Shape of Things are Adam and E.docx
 
1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx1. Select one movie from the list belowShutter Island (2010; My.docx
1. Select one movie from the list belowShutter Island (2010; My.docx
 
1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx1. Select a system of your choice and describe the system life-cycle.docx
1. Select a system of your choice and describe the system life-cycle.docx
 
1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx1. Sensation refers to an actual event; perception refers to how we .docx
1. Sensation refers to an actual event; perception refers to how we .docx
 
1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx1. The Institute of Medicine (now a renamed as a part of the N.docx
1. The Institute of Medicine (now a renamed as a part of the N.docx
 
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
1. The Documentary Hypothesis holds that the Pentateuch has a number.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx1. Search the internet and learn about the cases of nurses Julie Tha.docx
1. Search the internet and learn about the cases of nurses Julie Tha.docx
 
1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx1. Review the three articles about Inflation that are found below th.docx
1. Review the three articles about Inflation that are found below th.docx
 
1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx1. Review the following request from a customerWe have a ne.docx
1. Review the following request from a customerWe have a ne.docx
 
1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx1. Research risk assessment approaches.2. Create an outline .docx
1. Research risk assessment approaches.2. Create an outline .docx
 
1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx1. Research has narrowed the thousands of leadership behaviors into .docx
1. Research has narrowed the thousands of leadership behaviors into .docx
 
1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx1. Research Topic Super Computer Data MiningThe aim of this.docx
1. Research Topic Super Computer Data MiningThe aim of this.docx
 
1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx1. Research and then describe about The Coca-Cola Company primary bu.docx
1. Research and then describe about The Coca-Cola Company primary bu.docx
 
1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx1. Prepare a risk management plan for the project of finding a job a.docx
1. Prepare a risk management plan for the project of finding a job a.docx
 
1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx1. Please define the term social class. How is it usually measured .docx
1. Please define the term social class. How is it usually measured .docx
 

Recently uploaded

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 

Recently uploaded (20)

The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 

CHAPTER 10INFORMATION GOVERNANCEInformation Governance a.docx

  • 1. CHAPTER 10 INFORMATION GOVERNANCE Information Governance and Information Technology Functions ITS 833 Dr. Mia Simmons Chapter Overview ■ This chapter will cover pages 189-206 in your book. ■ This chapter discusses how Information Technology (IT) aligns directly with the success of Information Governance. 2 What is Information Technology? ■ Information technology (IT) is a core function impacted by
  • 2. information governance (IG) efforts. – The IT side, shared responsibility for IG means the IT department itself must take a closer look at IT processes and activities with an eye to IG. – A focus on improving IT efficiency, software development processes, and data quality will help contribute to the overall IG program effort 3 CIO & IT Leaders Key Focus Areas ■ Four IG areas for successful delivery of IG efforts: 1. Don’t focus on technology, focus on business impact ■ IT needs to become more business savvy, more businesslike, more focused on delivering business benefits that can help the organization to meet its business goals and achieve its business objectives. 2. Customize your IG approach for your specific business, folding in any industry-specific best practices possible.
  • 3. ■ there are components that are common to all industries, but tailoring your approach to your organization is the only way to deliver real business value and results 3. Make the business case for IG by tying it to business objectives ■ The business case must be presented in order to gain executive sponsorship, which is an essential component of any IG effort. 4. Standardize use of business terms ■ IG requires a cross-functional effort, so you must be speaking the same language, which means the business terms you use in your organization must be standardize 4 Data Governance ■ Data is big, data is growing, data is valuable, and the insights that can be gained by analyzing clean, reliable data with the latest analytic tools are a sort of
  • 4. new currency. ■ focuses on information quality from the ground up (at the lowest or root level), so that subsequent reports, analyses and conclusions are based on clean, reliable, trusted data (or records) in database tables ■ Data governance is a newer, hybrid quality control discipline that includes elements of data quality, data management, IG policy development, business process improvement, and compliance and risk management. ■ Data governance with real-time analytics and business intelligence (BI) software not only can yield insights into significant and emerging trends but also can provide solid information for decision makers to use in times of crisis—or opportunity. 5 Steps to Governing Data Effectively 1. Recruit a strong executive sponsor. 2. Assess your current state 3. Set the ideal state vision and strategy.
  • 5. 4. Compute the value of your data. 5. Asses Risk 6. Implement a going-forward strategy 7. Assign accountability for data quality to business units, not IT. 8. Manage the change 9. Monitor your data governance program. 6 Data Governance Framework 7 Data Governance Framework ■ Data Governance Framework a visual model to help guide planning efforts and a “logical structure for classifying, organizing, and communicating complex activities involved in making decisions about and taking action on enterprise data.”
  • 6. 8 Information Management ■ Principal function of Information Technology ■ Subcomponent tasks used to collect and process data: 1. Master data management (MDM) is a key process for IG success in the IT department, which extends to involved business units 2. Information lifecycle management (ILM) is managing information appropriately t and optimally at different stages of its useful life, from creation through distribution and use, including meeting legal and regulatory requirements, and through its final disposition, which can be destruction, archiving, or transfer to another entity 3. Data architecture refers to the “design of structured and unstructured information systems” 17 in an effort to optimize data flow between applications and systems so that they are able to process data efficiently.
  • 7. 4. Data modeling can be complex, yet it is an important step in overall IG for g the IT department. It “illustrates the relationships between data 9 Data Modeling to Integration ■ A user interface is constructed for the application, followed by movement of data or e-documents through work steps using workflow capabilities, and then integration with existing applications. Accomplished through an application programming interface, a sort of connector that allows interaction with other applications and databases. 10 Data Modeling Integration cont… ■ 6 approaches to data modeling: 1. Conceptual. The conceptual approach merely diagrams data relationships at the “highest level” 20 showing the storage, warehousing, and movement of data between applications.
  • 8. 2. Enterprise. The enterprise approach is a more business- oriented version of conceptual data modeling that includes specific requirements for an enterprise or business unit. 3. Logical. Pertinent to the design and architecture of physical storage, logical data modeling “illustrates the specific entities, attributes and relationships involved in a business function.” 4. Physical. The physical approach depicts the “implementation of a logical data model” relative to a specific application and database system. 5. Data integration. This approach is just what it says; it involves merging data from two or more sources, processing the data, and moving it into a database. “This category includes Extract, Transform, and Load (ETL) capabilities.” 6. Reference data management. This approach often is confused with MDM, although they do have interdependencies. 11 IT Governance ■ IT governance is the primary way that stakeholders can ensure that
  • 9. investments in IT create business value and contribute toward meeting business objective. 12 IT Governance Frameworks ■ Implementing an IT Governance Program – Must align with business objectives and incorporate IT strategies ■ CobiT (Control Objectives for Information and related Technology) is a process based IT governance framework that represents a consensus of experts worldwide – IT Control offers: ■ Cut IT risks while gaining business value from IT under an umbrella of a globally accepted framework. ■ Assist in meeting regulatory compliance requirements. ■ Utilize a structured approach for improved reporting and management decision making. ■ Provide solutions to control assessments and project implementations to improve IT and information asset control.
  • 10. 13 IT Governance Frameworks ■ COBIT 5 released in 2012 ■ “CobiT 5 is based on five key principles for governance and management of enterprise IT: – Principle 1: Meeting Stakeholder Needs – Principle 2: Covering the Enterprise End-to- End – Principle 3: Applying a Single, Integrated Framework – Principle 4: Enabling a Holistic Approach – Principle 5: Separating Governance From Management 14 IT Governance Frameworks ■ COBIT 5 describes 7 enablers: 1. Principles, policies and frameworks are the vehicle to translate the desired behavior into practical guidance for day-to-day management. 2. Processes describe an organized set of practices and activities
  • 11. to achieve certain objectives and produce a set of outputs in support of achieving overall IT-related goals. 3. Organizational structures are the key decision-making entities in an enterprise. 4. Culture, ethics and behavior of individuals and of the enterprise are very often r underestimated as a success factor in governance and management activities. 5. Information is required for keeping the organization running and well governed, but at the operational level, information is very often the key product of the enterprise itself. 6. Services, infrastructure and applications include the infrastructure, technology and applications that provide the enterprise with information technology processing and services. 7. People, skills and competencies are required for successful completion of all activities, and for making correct decisions and taking corrective action 15
  • 12. IT Governance Frameworks ■ ValIT (Value-oriented) - principles and best practices focus is on leveraging IT investments to gain maximum value. ■ ITIL is a set of process-oriented best practices and guidance originally developed in the United Kingdom to standardize delivery of IT service management. ITIL is applicable to both the private and public sectors and is the “most widely accepted approach to IT service management in the world. ■ ISO/IEC 38500:2008 is an international standard that provides high-level principles and guidance for senior executives and directors, and those advising them, for the effective and efficient use of IT 16 IG Best Practices for Database
  • 13. Security and Compliance ■ Database Security Best Practices: – Inventory and document – Assess exposure/weaknesses. – Shore up the database – Monitor. On a regular basis, monitor and document any configure – Deploy monitoring/auditing tools – Verify privileged access – Protect sensitive data – Deploy masking – Integrate and automate standardized security processes 17
  • 14. Chapter Summary ■ Focusing on business impact and customizing your IG approach to meet business objectives are key best practices for IG in the IT department. ■ Effective data governance can yield bottom-line benefits derived from new insights. ■ Good data governance ensures that downstream negative effects of poor data are avoided and that subsequent reports, analyses, and conclusions are based on reliable, trusted data. ■ Master data management is a key IG process in IT. ■ IT governance seeks to align business objectives with IT strategy to deliver business value. ■ ValIT is a framework that focuses on delivering IT vale. It is folded into CobiT 5. ■ ITIL is the “most widely accepted approach to IT service management in the world.” ■ Identifying sensitive information in your databases and implementing database security best practices help reduce organizational risk and the cost of compliance