1 / 31

SPRINGCLEANING@MUN

SPRINGCLEANING@MUN. Four Strategies Toward Filling the Governance Toolkit at Memorial University . How do you start?. How do you do it effectively?. How do you get buy in?. Data governance. Backyard Cleanup Community Cleanup. Cleaning up our own backyard. Data classification Data masking.

zlhna
Download Presentation

SPRINGCLEANING@MUN

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. SPRINGCLEANING@MUN Four Strategies Toward Filling the Governance Toolkit at Memorial University.

  2. How do you start? How do you do it effectively? How do you get buy in? Data governance

  3. Backyard Cleanup Community Cleanup

  4. Cleaning up our own backyard Data classification Data masking

  5. C&Cdata classification policy A guideline A framework A shared language A unit-specific standard

  6. The classes www.mun.ca/cc/dc

  7. Data Owner Governs the administrative data. Data Steward Classifies and manages administrative data for a given business data domain. Data Custodian Safeguards administrative data Data User Uses data responsibly. Responsible rolesWe all have a part to play.

  8. ATIPPA – NL Privacy Act PHIA - NL Health Record Privacy Act PIPEDA - Canadian Privacy Act EDS – Electronic Data Security Memorial University Policy Related policies

  9. Tuesday May 13 2014 C&C data classificationkick-offevent

  10. The invitation

  11. Here are the classes.LET’S KNOWTHEM.

  12. Keep it safe.KEEP IT SECURE.

  13. How is C&Cusing its Data classification policy? Real examples. From our staff.

  14. Bill Downey, PMO • Michael Windsor, Service Desk • Don Bryant, TSG C&C Data Classification Kick-off The elevator speeches

  15. The band from left to right: David Pierce, John Martin, Melanie Burgess, Barbara Dawson, Heather Rhodes, Stephen Hennessey, Matthew Hare

  16. our informationin four classificationsprotection for all when we classifyit is time to specifythe purpose of data Haikus

  17. 130 staff > 93 staff attended kick-off > 100 mugs handed out 7 units classifying data Measures of success

  18. Data Masking

  19. Meta-data – known sensitive data (SIN, DOB) Actual-data – potential sensitive data Discovery

  20. Functional masking document (FMD) Techniques Date skew Substitution Static view Masking

  21. Refresh DEVL DB Locked copy of PROD The Plan

  22. Community Cleanup Reporting organization Identity and access management

  23. empowering end users access defined by business need Enterprise reporting tools

  24. common needs and differences consistent data for KPIs ad hoc reporting detailed report specifications report inventory data dictionary Business needs

  25. Gaps authorization needed data not available in ODS data synchronization training

  26. legally bound to protect right people right tools right time Identity and Access Management

  27. Current state

  28. Future state

  29. Increase service delivery identity 1 password way data flow system Strategy

  30. Your experiences Your plans Your strategies Discussion

  31. John Martin Manager of Application Production Support jjmartin@mun.ca Heather Rhodes Business Analyst hrhodes@mun.ca Enterprise Application Services Computing & Communications Memorial University Presenters

More Related