Understanding Data Governance ROI: A Compliance Perspective
|
|
|
- Doreen Powers
- 9 years ago
- Views:
Transcription
1 A DataFlux White Paper Prepared by: Gwen Thomas Understanding Data Governance ROI: A Compliance Perspective Leader in Data Quality and Data Integration FLUX International +44 (0)
2 Most organizations today have concluded that they need to move to formal data governance. The arguments are compelling: Formal data governance helps make cross-functional decisions effectively. It helps identify data stakeholders and gives them a voice in establishing rules and policies for how information is managed and used. It provides a mechanism for orderly and thorough escalation and resolution of data-related issues. It brings together business and technology representatives with multiple perspectives to collaboratively examine issues and suggest controls. Data governance helps establish standards that contribute to increasing the value of information assets, to cost containment, and to compliance. While these are common outcomes of data governance programs and projects, not all data governance efforts are equal. Some are large, involving many participants and areas of an organization, while others may consist of one facilitator/administrator and scattered input by others. Some data governance programs look only at strategic issues and decisions, while others dive into detailed needs and processes. And while some data governance programs may exist to support IT-centric efforts such as data warehouses, master data management (MDM) or metadata management projects, others may focus on bringing cross-functional perspective and power to the work of setting policy, aligning business rules and definitions, or supporting architectural decisions. Regardless of the primary focus of a data governance program, there are two efforts that nearly every program is expected to support in some way: data quality/standardization and compliance. How much attention should any data governance program give to these efforts? How much should be spent, and what is the expected rate of return or return on investment (ROI) for the involvement of data governance especially in the area of meeting compliance requirements? When is it reasonable to measure ROI, and how do we go about measuring it when our data governance efforts do not directly result in revenue? In this paper, we ll look at the role of data governance programs in supporting compliance efforts. We ll look at the types of contributions they make, especially in the area of managing compliance costs. And we ll introduce an ROI formula you can use in those circumstances where it s important to quantify the value of those contributions. 1
3 Data Governance in Support of Compliance For many organizations, the question is not whether they should have data governance. Rather, the question is how much data governance they should fund: How broad and deep should their program reach? Should it address only present and future efforts or participate in remedial efforts? How should data governance align with data quality and integration efforts? For some data governance initiatives, answering these questions can be fairly straightforward. When the focus is on revenue-generating activities, for example, it s often feasible to calculate ROI for data governance contributions even when a contribution is two or three degrees of separation from the money involved. In these cases, ROI numbers can help leaders decide which data governance efforts to fund, and for what amounts. But what about data governance programs with a focus on compliance? Strict ROI is rarely the driver behind compliance. Organizations "do" compliance because they are compelled to; it's simply not seen as optional. Data governance programs with a focus on compliance, then, tend to focus on requirements and controls: what they are, how to align them and how to assign accountabilities. The value of such data governance programs is based on cost containment: data governance efforts can definitely avoid unnecessary compliance-related spending. Types of Compliance Initiatives Compliance may take many forms: adherence to legal and regulatory requirements, contractual compliance, and adherence to standards and other requirements set internally or by partners or industry groups. Legal and regulatory compliance Today, a slew of regulations affect how data must be managed. For example: The Payment Card Industry Data Security Standard (PCI-DSS) imposes 12 data security requirements. It s mandatory for organizations that process debit and credit cards. The Gramm-Leach-Bliley Act (GLBA) imposes strict privacy and security controls on financial information by financial institutions. The Health Insurance Portability and Accountability Act (HIPAA) imposes requirements for managing the security and privacy of medical records and personally identifiable information. 2
4 The Sarbanes-Oxley Act affects how public companies treat financial information, including how it is managed, controlled and reported. Consequences of noncompliance can be severe: there can be significant fines for companies, and in some cases CEOs and CFOs can be subject to personal fines and even prison terms. Contractual compliance In today s interdependent environments, what happens to information within one organization s firewall may have a critical impact on customers, partners, suppliers and other stakeholders. As a result, it is becoming more common to see contractual requirements that place restrictions on how information is acquired, managed, stored, processed, moved, displayed and disclosed. The language of such constraints because they are stemming from business reasons and are written by lawyers rather than legislators may be difficult to reconcile with regulatory compliance requirements. However, they are probably touching the same databases, processes and systems. Adherence to standards Let s not overlook the importance of enforcing adherence to standards set by internal staff. Often, the successful implementation of new systems and the value expected from significant programs and projects hinges on the assumption that information can be passed between systems and can be effectively identified and analyzed. Adherence to naming conventions and other standards may be critical to many efforts. Requirements may be set by internal data management groups, or they may be industry standards or conventions designed to support interoperability. 3
5 Deciding How Much to Fund If your compliance requirements and subsequent data governance or data quality requirements are vague or subjective, you need to decide how to comply and how much to invest. You can prepare for that decision by performing the following process: 1. Identify the absolute minimum needed to reach compliance 2. Assess the benefits of doing more than the minimum 3. Assess the potential consequences and costs of non-compliance 4. Identify opportunities for managing the costs of the compliance process In assessing the potential consequences of non-compliance, you ll want to quantify what is at risk: Penalties and fines HIPAA, Sarbanes-Oxley, and other regulations generally impose penalties for non-compliance. These may come in the form of fines or, in some cases, the risk of incarceration for corporate leaders. Costs of notifying customers and stakeholders The expenses involved in alerting customers when then their private information has been breached can be significant. And such notification can be required by law. For instance, SB 1386 (the California Security Breach Information Act) is a California state law that applies if you have even one customer in California. If a commercial company, non-profit, or agency collects personal information, it must notify each person in their database should there be a security breach involving personal information. This information can include the customer s Social Security number, driver's license number, account number, credit or debit card number, or security code or password for accessing their financial account. Many other states have followed California s lead and have passed similar laws. The value of customers, partners or investors who might react to non-compliance When regulatory noncompliance is reported, or when security breaches occur, individual customers may lose confidence in an organization s ability to safeguard their information. Inevitably, some customers leave. What is their value? What is the value of a corporate customer who leaves (or never signs on) because of your organization s inability to adhere to contractual requirements? Compliance Costs Tied to Lack of Auditor Confidence In deciding how much attention to pay to data-related compliance efforts, smart organizations ask another key question: "What additional testing and auditing costs could we incur if our auditors lose confidence in the data we present to them or in our controls environment?" 4
6 Consider a situation where an auditor is reviewing Sarbanes-Oxley controls in software applications that manage financial data. At least three things could happen that would affect compliance costs. 1. The auditor accesses the repository that houses the official list of corporate applications, but the system that the auditor is looking for isn t there. Oops. The auditor has just lost confidence in the data in that repository and may require an application inventory review as part of the audit an activity that will be expensive and disruptive. 2. The auditor finds an application in the system, but the official record says that the system does not contain financial data, when the auditor knows that it does. Now the quality of the information in the repository is suspect. Additional testing and investigation may be required. 3. The system s record is complete, but the code used in the repository to signify the presence of financial data does not match the code used in data flow models or lists of controls or in risk management narratives. Now, the auditor has to reconcile these areas. At the very least, auditing costs will rise to accommodate this reconciliation. More likely, the auditor s confidence in your efforts will be diminished, and this will contribute to future judgment calls about whether to mandate additional examinations. Data governance programs that focus on supporting compliance efforts often participate in pre-auditing reviews of materials that will be put in front of auditors. They are ideally situated to pick up on missing elements (such as a simple mapping of codes from one system to another) that can go a long way toward increasing auditor confidence. They may also be able to identify additional controls that have been put in place by business or technical staff, and they may be the keepers of roles and responsibilities charts that highlight accountabilities of interest to auditors. Why This is Hard Make no mistake: managing information has become much harder in recent years even if systems, applications and processes have not changed. Why is this? It s because information management efforts that support processes or systems that come into scope for compliance now have four times as many goals to meet. Now, the requirement is to: Do the (information management) work Control it Document it Prove compliance 5
7 Even if you had controls and documentation that were perfectly adequate for operational purposes, they may not meet compliance requirements. For instance, the type of documentation needed for compliance purposes may be of a different type, or of greater complexity, than that needed for ongoing operations. Data integrity and security controls that have been baked into a system or process or database because they are "best practices" may need to be called out and formally rated for their ability to manage risk to prevent undesired outcomes, to detect them, or to correct them. Proving compliance can involve creating audit trails, documenting the performance of certain processes, and even participating in audits. All told, the effort to support compliance can be significant. Managers are generally experienced in overseeing the "doing" of data management work. Often, however, they are not so experienced in designing and supervising the other activities. Certainly it is unfair to expect every manager to be an expert in all of the compliance requirements that must be adhered to, as well as preferred approaches to controls, documentation and proof of compliance. The result of this situation is ungoverned compliance efforts that can be unduly complicated and expensive. AMR Research estimated 2008 costs for governance, risk management and compliance to top $32 billion 1. Within this complicated tangle of compliance efforts there are bound to be redundancies; after all, we have multiple groups devising multiple controls to manage multiple sets of compliance requirements. Each of these controls follows a lifecycle that includes requirements, design, development, testing, implementation, monitoring and reporting. An ungoverned, unaligned approach requires excessive management oversight time. Other problems include: Missed opportunities to employ multi-purpose controls; ones that can satisfy many requirements. Also, missed opportunities to employ control functionality that is embedded in most commercial MDM, ETL, and data quality tools. Controls that contradict or overwrite each other, rendering each other unable to achieve their compliance goals. Data Governance as a Vehicle for Spending Less Data governance programs with a focus on data quality and compliance are often charged with providing input to data-related controls strategies. Through the work of data stewards or data governance administrators, committees, or work groups, data governance can help answer the following questions: 1 AMR Research. The Governance, Risk Management, and Compliance Spending Report, : Inside the $32B GRC Market. March 25,
8 How can we identify all the compliance requirements that touch the same data, systems, or processes? How can we communicate compliance requirements to all that are affected by them? How can we align requirements and rules? How can we ensure that data-related controls don't negate each other? How can we design multi-purpose controls? How can we take advantage of existing controls to meet compliance requirements? How can we employ our data stewards and others to support compliance? How can we embed compliance activities and controls into operational and data management processes? How can we be confident that our efforts will be effective? How can we be confident that our efforts will satisfy auditors? How can we minimize the burden of compliance on management? On superusers? On others? Return on Investment for Compliance-Focused Data Governance Sometimes it s not clear how involved data governance programs should be in answering these questions, or in reacting to the responses to them. Sometimes an organization wants to examine the ROI for such involvement. Using the ROI metric can be challenging, however, because data-related efforts are sometimes two or more degrees of separation from actual hard-dollar benefits. If you want to calculate ROI for such efforts, you ll need to use a modified ROI formula. Degrees of Separation from the Ultimate Benefit Projects that are just one degree of separation from money are easy to understand. Direct-mail campaigns, for example, are always based on ROI. Conduct the campaign, and you can expect a certain amount of revenue. Divide the revenue minus costs by the costs, as shown in Figure 1, and you have the ROI for the campaign. 7
9 ROI = ( Total Benefit Cost of ) - Benefit 100% X Cost of Benefit ( ) Figure 1: Formula for ROI On the other hand, consider an effort to clean up customer data before conducting the campaign. This effort is two degrees of separation from the ultimate benefit. It should result in a higher return for the campaign, so it s probably worth the effort since it will improve (or protect) the ROI of the main activity. Now consider a data governance effort to establish data standards and data quality rules. This effort has to take place before the clean-up; it is three degrees of separation from the ultimate benefit. Still important, just a little farther removed from hard dollars. Data governance in support of compliance efforts is almost always two or three degrees of separation from the ultimate benefit. Organizations rarely look for hard dollar returns on these efforts. Still, if it s important to do so, you can measure a data governance contribution and compute the ROI for that contribution. What you need are three numbers: 1. The total benefit of compliance or at least the risk you are avoiding, such as the costs of an extra 20% in auditing fees. You ll probably need to use rough estimates for this number. Most organizations don t keep track of these potential costs. 2. The percentage of credit that data governance would be given for avoiding these costs. If this cost is a certainty without data governance, then this figure will be 100%. If several efforts will go into avoiding this expense, then data governance should be allocated a smaller percentage. 3. The costs of the data governance contribution. Now you can plug those figures into a modified ROI formula, as shown in Figure 2. ROI of = DGov ( Percentage ) Total of benefit Benefit X contributed - 100% X by DGov Cost of DGov contribution Figure 2: The ROI of data governance. ( ) Cost of DGov contribution 8
10 Conclusion Data governance programs with an emphasis on data quality and compliance can make important contributions. The cross-functional nature of such programs means that multiple perspectives from across the organization can be brought to the work of deciding on compliance approaches and even specific controls. Whether the value of the contribution is so obvious that monetary calculations are not necessary, or whether ROI formulas are applied to decide whether to invest in an effort, most organizations with formal data governance agree on this: data governance makes compliance more effective, more thorough, less likely to overlook gaps and omissions, and certainly less expensive. 9
The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money
A DataFlux White Paper Prepared by: Gwen Thomas The ROI of Data Governance: Seven Ways Your Data Governance Program Can Help You Save Money Leader in Data Quality and Data Integration www.dataflux.com
Self-Service SOX Auditing With S3 Control
Self-Service SOX Auditing With S3 Control The Sarbanes-Oxley Act (SOX), passed by the US Congress in 2002, represents a fundamental shift in corporate governance norms. As corporations come to terms with
White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA
White Paper Achieving GLBA Compliance through Security Information Management White Paper / GLBA Contents Executive Summary... 1 Introduction: Brief Overview of GLBA... 1 The GLBA Challenge: Securing Financial
Expanding Data Governance Into EIM Governance. [email protected] 321-438-0774. The Data Governance Institute page 1
Gwen Thomas President, page 1 has three arms: 1. Training/consulting 2. Membership (The Data Governance & Stewardship Community of Practice) ce) at www.datastewardship.com 3. Information services, publishing
How To Ensure Financial Compliance
Evolving from Financial Compliance to Next Generation GRC Gary Prince Principal Solution Specialist - GRC Agenda Business Challenges Oracle s Leadership in Governance, Risk and Compliance Solution Overview
Design of Database Security Policy In Enterprise Systems
Design of Database Security Policy In Enterprise Systems by Krishna R Singitam Database Architect Page 1 of 10 Table of Contents 1. Abstract... 3 2. Introduction... 3 2.1. Understanding the Necessity of
Compliance Management, made easy
Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one
HIPAA PRIVACY AND SECURITY AWARENESS
HIPAA PRIVACY AND SECURITY AWARENESS Introduction The Health Insurance Portability and Accountability Act (known as HIPAA) was enacted by Congress in 1996. HIPAA serves three main purposes: To protect
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management. White Paper / PCI
White Paper Achieving PCI Data Security Standard Compliance through Security Information Management White Paper / PCI Contents Executive Summary... 1 Introduction: Brief Overview of PCI...1 The PCI Challenge:
Emptoris Contract Management Solution for Healthcare Providers
Emptoris Contract Management Solution for Healthcare Providers An Emptoris White Paper Emptoris, an IBM Company www.emptoris.com CMS-HP-4/12 Emptoris Contract Management Solution for Healthcare Providers
Align Technology. Data Protection Binding Corporate Rules Processor Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Processor Policy Confidential Contents INTRODUCTION TO THIS POLICY 3 PART I: BACKGROUND AND ACTIONS 4 PART II: PROCESSOR OBLIGATIONS 6 PART III:
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration.
Make information work to your advantage. Help reduce operating costs, respond to competitive pressures, and improve collaboration. May 2011 Advisory Consulting Table of contents Transform data from a hindrance
The DGI Data Governance Framework
WHEN WHY to achieve 1 Develop a value statement 2 Prepare a roadmap 3 Plan and Fund 4 Design the program WHO WHAT 5 Deploy the program 6 Govern the data 7 Monitor, Measure, Report HOW The DGI Framework
building a business case for governance, risk and compliance
building a business case for governance, risk and compliance contents introduction...3 assurance: THe last major business function To be integrated...3 current state of grc: THe challenges... 4 building
Gwen Thomas, The Data Governance Institute. Abstract
WHEN WHY to achieve WHO WHAT HOW The DGI Framework Gwen Thomas, The Institute Abstract can mean different things to different people. Adding to this ambiguity, governance and stewardship can be perceived
Data Governance. Unlocking Value and Controlling Risk. Data Governance. www.mindyourprivacy.com
Data Governance Unlocking Value and Controlling Risk 1 White Paper Data Governance Table of contents Introduction... 3 Data Governance Program Goals in light of Privacy... 4 Data Governance Program Pillars...
Physician Payments Sunshine Act
Physician Payments Sunshine Act The Sunshine Act: A tough act to follow? The Physician Payments Sunshine Act will require companies to record any physician payments or benefits provided in 2012 and to
Best Practices in Enterprise Data Governance
Best Practices in Enterprise Data Governance Scott Gidley and Nancy Rausch, SAS WHITE PAPER SAS White Paper Table of Contents Introduction.... 1 Data Governance Use Case and Challenges.... 1 Collaboration
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation MELISSA J. KRASNOW, DORSEY & WHITNEY LLP
CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes.
TECHNOLOGY BRIEF: REDUCING COST AND COMPLEXITY WITH GLOBAL GOVERNANCE CONTROLS CA HalvesThe Cost Of Testing IT Controls For Sarbanes-Oxley Compliance With Unified Processes. Table of Contents Executive
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP A Note discussing written information security programs (WISPs)
MASSIVE NETWORKS Online Backup Compliance Guidelines... 1. Sarbanes-Oxley (SOX)... 2. SOX Requirements... 2
MASSIVE NETWORKS Online Backup Compliance Guidelines Last updated: Sunday, November 13 th, 2011 Contents MASSIVE NETWORKS Online Backup Compliance Guidelines... 1 Sarbanes-Oxley (SOX)... 2 SOX Requirements...
An Oracle White Paper January 2010. Access Certification: Addressing & Building on a Critical Security Control
An Oracle White Paper January 2010 Access Certification: Addressing & Building on a Critical Security Control Disclaimer The following is intended to outline our general product direction. It is intended
Data Quality Assessment. Approach
Approach Prepared By: Sanjay Seth Data Quality Assessment Approach-Review.doc Page 1 of 15 Introduction Data quality is crucial to the success of Business Intelligence initiatives. Unless data in source
Thought Leadership White Paper
Thought Leadership White Paper Introduction Contracts form the foundation of all businesses and every business relationship. They define every aspect of a business s activities procurement, sales, marketing,
Making Compliance Work for You
white paper Making Compliance Work for You with application lifecycle management Rocket bluezone.rocketsoftware.com Making Compliance Work for You with Application Lifecycle Management A White Paper by
CSR Breach Reporting Service Frequently Asked Questions
CSR Breach Reporting Service Frequently Asked Questions Quick and Complete Reporting is Critical after Data Loss Why do businesses need this service? If organizations don t have this service, what could
HIPAA Employee Compliance Program TRAINING MANUAL
HIPAA Employee Compliance Program TRAINING MANUAL Training Manual to Assist Employees in HIPAA Compliance January 2013 Program For HIPAA Compliance Plan Goal The purpose of this manual is to instruct our
Align Technology. Data Protection Binding Corporate Rules Controller Policy. 2014 Align Technology, Inc. All rights reserved.
Align Technology Data Protection Binding Corporate Rules Controller Policy Contents INTRODUCTION 3 PART I: BACKGROUND AND ACTIONS 4 PART II: CONTROLLER OBLIGATIONS 6 PART III: APPENDICES 13 2 P a g e INTRODUCTION
Building a Culture of Compliance
Charles H. Le Grand, CHL Global Associates Sponsored by IBS America, Inc.* http:// Building a Culture of Compliance i Overview 1 What Is Compliance? 1 A Culture of Compliance 2 Attributes of a Culture
COMPLIANCE GUIDELINE April 2009
COMPLIANCE GUIDELINE April 2009 Table of Contents Preamble...3 Introduction...4 Scope...5 Coming into effect and updating...6 1. Compliance management framework...7 2. Compliance monitoring function...8
Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation
View the online version at http://us.practicallaw.com/7-523-1520 Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation Melissa J. Krasnow, Dorsey & Whitney LLP
Checklist for a Watertight Cloud Computing Contract
Checklist for a Watertight Cloud Computing Contract Companies of all industries are recognizing the need and benefit of moving some if not all of their IT infrastructure to a Cloud whether public or private.
White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA
White Paper Achieving HIPAA Compliance through Security Information Management White Paper / HIPAA Contents Executive Summary... 1 Introduction: Brief Overview of HIPAA... 1 The HIPAA Challenge: Protecting
HOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM
HOW TO USE THE DGI DATA GOVERNANCE FRAMEWORK TO CONFIGURE YOUR PROGRAM Prepared by Gwen Thomas of the Data Governance Institute Contents Why Data Governance?... 3 Why the DGI Data Governance Framework
Active Directory Auditing The Need and Result
Jai hanumaan www.lepide.com Active Directory Auditing The Need and Result Whitepaper 2013 What are IT Audits? Increasing number of cases of malpractices and lackadaisical approach towards handling sensitive
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures
Whitesheet Navigate Your Way to Compliance The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is an American federal law that requires organizations that handle personal health information
NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16
NEW PERSPECTIVES on Healthcare Risk Management, Control and Governance www.ahia.org Journal of the Association of Heathcare Internal Auditors Vol. 32, No. 3, Fall, 2013 Professional Fee Coding Audit: The
Agile Master Data Management A Better Approach than Trial and Error
Agile Master Data Management A Better Approach than Trial and Error A whitepaper by First San Francisco Partners First San Francisco Partners Whitepaper Executive Summary Market leading corporations are
White Paper. Ensuring Network Compliance with NetMRI. An Opportunity to Optimize the Network. Netcordia
White Paper Ensuring Network Compliance with NetMRI An Opportunity to Optimize the Network Netcordia Copyright Copyright 2006 Netcordia, Inc. All Rights Reserved. Restricted Rights Legend This document
Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations
White Paper September 2009 Addressing IT governance, risk and compliance (GRC) to meet regulatory requirements and reduce operational risk in financial services organizations Page 2 Contents 2 Executive
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
Operationalizing Data Governance through Data Policy Management
Operationalizing Data Governance through Data Policy Management Prepared for alido by: David Loshin nowledge Integrity, Inc. June, 2010 2010 nowledge Integrity, Inc. Page 1 Introduction The increasing
Data Governance for Master Data Management and Beyond
Data Governance for Master Data Management and Beyond A White Paper by David Loshin WHITE PAPER Table of Contents Aligning Information Objectives with the Business Strategy.... 1 Clarifying the Information
Total Reconciliation Solution (T-Recs ) Enterprise A Control Framework for Governance, Risk Management and Compliance
Total Reconciliation Solution (T-Recs ) Enterprise A Control Framework for Governance, Risk Management and Compliance power No activity is more central to preparing accurate financial statements than timely
What Should IS Majors Know About Regulatory Compliance?
What Should IS Majors Know About Regulatory Compliance? Working Paper Series 08-12 August 2008 Craig A. VanLengen Professor of Computer Information Systems/Accounting Northern Arizona University The W.
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions
Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions Table of Contents Understanding HIPAA Privacy and Security... 1 What
Guide to Internal Control Over Financial Reporting
Guide to Internal Control Over Financial Reporting The Center for Audit Quality prepared this Guide to provide an overview for the general public of internal control over financial reporting ( ICFR ).
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
GUIDANCE FOR MANAGING THIRD-PARTY RISK
GUIDANCE FOR MANAGING THIRD-PARTY RISK Introduction An institution s board of directors and senior management are ultimately responsible for managing activities conducted through third-party relationships,
A Best Practice Guide
A Best Practice Guide Contents Introduction [2] The Benefits of Implementing a Privacy Management Programme [3] Developing a Comprehensive Privacy Management Programme [3] Part A Baseline Fundamentals
Ten Steps to Quality Data and Trusted Information
Ten Steps to Quality Data and Trusted Information ABSTRACT Do these situations sound familiar? Your company is involved in a data integration project such as building a data warehouse or migrating several
By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN
Major Changes to HIPAA Security and Privacy Rules Enacted in Economic Stimulus Package By Ross C. D Emanuele, John T. Soshnik, and Kari Bomash, Dorsey & Whitney LLP Minneapolis, MN The HITECH Act is the
Data Quality for BASEL II
Data Quality for BASEL II Meeting the demand for transparent, correct and repeatable data process controls Harte-Hanks Trillium Software www.trilliumsoftware.com Corporate Headquarters + 1 (978) 436-8900
Security in Fax: Minimizing Breaches and Compliance Risks
Security in Fax: Minimizing Breaches and Compliance Risks Maintaining regulatory compliance is a major business issue facing organizations around the world. The need to secure, track and store information
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff
Whitepaper Data Governance Roadmap for IT Executives Valeh Nazemoff The Challenge IT Executives are challenged with issues around data, compliancy, regulation and making confident decisions on their business
SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS
COMPLIANCE AND INDUSTRY REGULATIONS INTRODUCTION Multiple federal regulations exist today requiring government organizations to implement effective controls that ensure the security of their information
Data Governance With a Focus on Information Quality
MIT Information Quality Industry Symposium, Information Quality By Gwen Thomas, President, The The Data Governance Institute Objectives of this presentation Identify interdependencies between Information
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry
Information Protection Framework: Data Security Compliance and Today s Healthcare Industry Executive Summary Today s Healthcare industry is facing complex privacy and data security requirements. The movement
An Executive Overview of GAPP. Generally Accepted Privacy Principles
An Executive Overview of GAPP Generally Accepted Privacy Principles Current Environment One of today s key business imperatives is maintaining the privacy of your customers personal information. As business
Outsourcing & Regulatory Compliance Risks
Outsourcing & Regulatory Compliance Risks By Matthew Sullivan Today s marketplace dictates that Financial Services Institutions (FSIs) consider using offshore IT services to remain competitive. However,
Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting
Consulting and Professional Services Designing an Operational Risk Program for a Community Bank Stephan Salvador Managing Director, Risk Management Consulting Designing an Operational Risk Program for
Making the Business Case for IT Asset Management
1 The business case for IT Asset Management Making the Business Case for IT Asset Management Executive Summary IT Asset Management (ITAM) is an important business discipline that provides insight into
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
Call Recording and Regulatory Compliance
Call Recording and Regulatory Compliance An OAISYS White Paper Americas Headquarters OAISYS 7965 South Priest Drive, Suite 105 Tempe, AZ 85284 USA www.oaisys.com (480) 496-9040 CONTENTS 1 Introduction
Auditing your institution's cybersecurity incident/breach response plan. Baker Tilly Virchow Krause, LLP
Auditing your institution's cybersecurity incident/breach response plan Objectives > Provide an overview of incident/breach response plans and their intended benefits > Describe regulatory/legal requirements
Data Governance Primer. A PPDM Workshop. March 2015
Data Governance Primer A PPDM Workshop March 2015 Agenda - SETTING THE STAGE - DATA GOVERNANCE BASICS - METHODOLOGY - KEYS TO SUCCESS Copyright 2015 Noah Consulting LLC. All Rights Reserved. Industry Drivers
The potential legal consequences of a personal data breach
The potential legal consequences of a personal data breach Tue Goldschmieding, Partner 16 April 2015 The potential legal consequences of a personal data breach 15 April 2015 Contents 1. Definitions 2.
Virginia Longitudinal Data System
Virginia Longitudinal Data System Book of Data Governance Version 1.0 Page 1 Signature Page The following parties agree upon the policies and procedures outlined in this version of the VLDS Book of Data
Regulatory Compliance and its Impact on Software Development
Regulatory Compliance and its Impact on Software Development Abdelwahab Hamou-Lhadj Software Compliance Research Group Department of Electrical and Computer Engineering Concordia University 1455 de Maisonneuve
Bridging the HIPAA/HITECH Compliance Gap
CyberSheath Healthcare Compliance Paper www.cybersheath.com -65 Bridging the HIPAA/HITECH Compliance Gap Security insights that help covered entities and business associates achieve compliance According
DATA QUALITY MATURITY
3 DATA QUALITY MATURITY CHAPTER OUTLINE 3.1 The Data Quality Strategy 35 3.2 A Data Quality Framework 38 3.3 A Data Quality Capability/Maturity Model 42 3.4 Mapping Framework Components to the Maturity
3 rd Party Vendor Risk Management
3 rd Party Vendor Risk Management Session 402 Tuesday, June 9, 2015 (11 to 12pm) Session Objectives The need for enhanced reporting on vendor risk management Current outsourcing environment Key risks faced
Big G and li,le g Data Governance
Big G and li,le g Data Governance a presenta6on for DAMA Indiana Gwen Thomas President, The Data Governance Ins6tute Governance and Management Big G Governance: The policy making layer Management & Architecture:
Masterminding Data Governance
Why Data Governance Matters The Five Critical Steps for Data Governance Data Governance and BackOffice Associates Masterminding Data Governance 1 of 11 A 5-step strategic roadmap to sustainable data quality
California State University, Sacramento INFORMATION SECURITY PROGRAM
California State University, Sacramento INFORMATION SECURITY PROGRAM 1 I. Preamble... 3 II. Scope... 3 III. Definitions... 4 IV. Roles and Responsibilities... 5 A. Vice President for Academic Affairs...
