{"id":5314,"date":"2018-04-17T10:46:58","date_gmt":"2018-04-17T15:46:58","guid":{"rendered":"https:\/\/www.poweradmin.com\/blog\/?p=5314"},"modified":"2018-04-02T10:55:18","modified_gmt":"2018-04-02T15:55:18","slug":"responsible-data-governance","status":"publish","type":"post","link":"https:\/\/www.poweradmin.com\/blog\/responsible-data-governance\/","title":{"rendered":"Responsible Data Governance"},"content":{"rendered":"<p><span style=\"font-family: verdana, geneva, sans-serif;\"><a href=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/04\/data-governance.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-5315\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/uploads\/2018\/04\/data-governance.jpg\" alt=\"\" width=\"300\" height=\"200\"><\/a>Data governance is a high-sounding term which describes what\u2019s essentially a fundamental process: Effectively managing the information that resides within, and flows in or out of an organization.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">It\u2019s perhaps because the concept is couched in such ominous terms that IT managers and users have a difficult time understanding, interpreting, and applying data governance responsibly.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">In this article, we\u2019ll be looking at some strategies and best practices to help demystify the process, and facilitate its implementation.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Why Data Governance Is Necessary<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Within a typical enterprise, information must be stored or manipulated by people, processes, and technology. Deciding who (or which process or piece of technology) is responsible for what, requires the establishment of clearly defined roles and responsibilities for the various members and elements making up the organization. This applies across multiple sectors, including IT, finance, health-care, administration, manufacturing, and retail.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Hardware and software may be used to manage some key information assets, but for the enterprise as a whole, a formalized structure and management strategy needs to be put in place, to define and enforce policies and rules determining how data should best be treated to ensure maximum operational efficiency, security, confidentiality, and quality control. That\u2019s what \u201cdata governance\u201d is really all about.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Objectives Of Data Governance<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A comprehensive and effective data governance policy sets the framework for how information is managed and used by the enterprise. Data governance also needs to create formalized procedures for resolving any issues related to the information being handled, and to put in place mechanisms which allow business users to make decisions based on data of the highest quality.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The data governance strategies adopted by an enterprise will depend upon how and where relevant data resides within and outside the organization, who owns this information, and who is given the responsibility of \u201c<a href=\"http:\/\/searchdatamanagement.techtarget.com\/essentialguide\/Building-an-effective-data-governance-framework\" rel=\"nofollow\" target=\"_blank\">stewardship<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>\u201d (overseeing and management) for the data that\u2019s being handled.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Establishing An Enterprise Governance Structure<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">A fundamental part of effective data governance is the establishment of <a href=\"https:\/\/www.collibra.com\/blog\/4-data-governance-best-practices\" rel=\"nofollow\" target=\"_blank\">a governance structure<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> for the enterprise. This must take into account factors such as the organizational hierarchy of a business, its various departments and business units, and the assignment of governance roles and responsibilities spanning all of these divisions.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Data governance structures are typically established based on the following categories:<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>Centralized governance: <\/b>Where a central data management authority assumes responsibility for the entire enterprise.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>Decentralized governance<\/b>: Here, a group of discrete authorities or a decentralized data management body cover all aspects of an enterprise.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">\u00b7 <b>Federated governance: <\/b>In this model, there\u2019s little or no shared ownership of data, and governance is the responsibility of independent groups, or multiple groups within the enterprise.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Determining Where Data Resides<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Once a data governance structure has been determined, it\u2019s necessary to establish <a href=\"https:\/\/www.poweradmin.com\/help\/lateststmhelp.aspx?page=monitor_file_system_analyzer.aspx?ref=blog\" target=\"_blank\" rel=\"noopener\">where the information relevant to each division of the enterprise or to each line of business currently resides<\/a>. This usually involves a classification of enterprise information into various \u201cdata domains\u201d such as customer data, vendor information, supply chain, or product specifications.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Within each major classification, it\u2019s then necessary to drill down to the finer details of what each domain actually contains. This should be done with an eye to establishing where the relevant information comes from, who it belongs to, and who within the organization should be involved, when alterations are made to this data.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Identifying What\u2019s Critical To The Enterprise<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Within each \u201cdata domain\u201d, care must then be taken to identify those specific pieces of information which are most critical to the enterprise and its stated business objectives.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">With those objectives and values in mind, it should then be possible to draw up strategies and procedures for how the key data relevant to their achievement needs to be treated and managed.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Maintaining A Secure Environment<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Throughout the governance process, it\u2019s essential to safeguard the integrity and confidentiality of all the enterprise data and external data sources that are being governed. So best practices for information security management and the establishment of a strong cyber-security posture for the enterprise must be followed at all times.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Perimeter firewalls, detection devices, and <a href=\"https:\/\/www.poweradmin.com\/products\/file-sight\/product-information\/information-leak-protection\/?ref=blog\">endpoint defenses<\/a> are only part of the story, here. Network privileges and access management protocols must be strictly observed within the corporate barriers. Digital tokens for authorized access, multi-factor authentication procedures, and strong encryption for information in storage and transit should all be considered, in this regard.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Complying To All Required Standards<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">The demands of <a href=\"https:\/\/www.clarityinsights.com\/blog\/data-governance-best-practices-compliance\" rel=\"nofollow\" target=\"_blank\">industry standards and regulatory compliance<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a> regimes will also have an influence on data governance planning and implementation.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Depending on the industry or market sector, there may be unique and specific demands on how customer or transaction data are stored and manipulated, how data should be protected in transit, and so on.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Auditing and record-keeping requirements may draw up their own set of governance conditions, and these will need to be taken into consideration as well.<\/span><\/p>\n<h2><span style=\"font-family: verdana, geneva, sans-serif;\">Setting Benchmarks And Controls To Measure Success<\/span><\/h2>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Having established clear goals as to why data governance is being imposed, the final but ongoing stage in the process is to ensure that these objectives are quantifiable, and are being monitored and measured to gauge the program\u2019s success.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Adopting measurable criteria <a href=\"http:\/\/agiledata.org\/essays\/dataGovernance.html\" rel=\"nofollow\" target=\"_blank\">can be a challenge<img class=\"extlink-icon\" src=\"https:\/\/www.poweradmin.com\/blog\/wp-content\/plugins\/external-links-nofollow-open-in-new-tab-favicon\/images\/extlink.png\"><\/a>, but benchmarks can be established with a bit of \u201coutside the box\u201d thinking and a focus on key governance areas such as the structure of the scheme itself, data domains, critical data elements, and stewardship.<\/span><\/p>\n<p>\u00a0<\/p>\n<p><span style=\"font-family: verdana, geneva, sans-serif;\">Automation can be of great value in this regard \u2013 from the collection of relevant metrics, through to automated workflow processing and reporting.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data governance is a high-sounding term which describes what\u2019s essentially a fundamental process: Effectively managing the information that resides within, and flows in or out of an organization. \u00a0 It\u2019s perhaps because the concept is couched in such ominous terms that IT managers and users have a difficult time understanding, interpreting, and applying data governance [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-5314","post","type-post","status-publish","format-standard","hentry","category-general-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/comments?post=5314"}],"version-history":[{"count":1,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5314\/revisions"}],"predecessor-version":[{"id":5316,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/posts\/5314\/revisions\/5316"}],"wp:attachment":[{"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/media?parent=5314"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/categories?post=5314"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poweradmin.com\/blog\/wp-json\/wp\/v2\/tags?post=5314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}