Institutional Data Governance Policy
|
|
|
- Rudolf McLaughlin
- 9 years ago
- Views:
Transcription
1 Scope This document sets out the policy and framework to be followed to manage Institutional Data and applies to data in all its forms. Status and Effective date Approved, April 2015 Validity: under annual review. Audience This policy applies to everyone at the university and sets out responsibilities for Stewards, Custodians, and Users of Institutional Data. This policy informs governance forums and decision makers for key university resources; such as people, process, technology, data and space. Those involved in university processes, Business Continuity, Information Compliance, Reporting, Decision Support and a range of other functions and stakeholders all benefit from wellgoverned data. The IT architecture and strategy is informed by and supports the goals of Data Governance. Purpose and Goals Institutional data is key to data-driven decision making, identifying new opportunities, planning and g risk management. Processes and Technology depend on Institutional Data. They transmit, use, transform and supply Data to support University strategy and operations. Institutional Data is a strategic asset of the University and shall be managed according to sound data governance procedures and approved principles. A set of applicable principles relating to data and broader aspects of governance is maintained by ITGS in conjunction with DGSG. In accordance with this policy DGSG shall assign stewardship responsibilities for university data; establish standards for the custodianship of such data. Benefits of applying this policy will include ensuring data is fit for the purposes of internal and external reporting, and is appropriately categorised for storage, retrieval, destruction, backup, and access as needed to ensure proper management and protection of Institutional Data; with the goals of: Enabling better decision-making; Reducing operational friction; Protecting the needs of data stakeholders; Institutional Data Governance Policy Summary Everyone has a responsibility to look after university data, and abide by DGSG policy, and all applicable laws including the Data Protection Act. Data matters because it is the lifeblood of business processes and is used to make decision. Everyone uses data in what they do (processes) and often this data is provided by (IT systems) technology. Mismanagement of data by students, staff or others may lead to fines, reputational damage, and can have other process and financial implications. DGSG looks after Data Governance and Strategy and is accountable to PET. DGSG appoints senior level individuals as Data Stewards look after particular sets of data, such as people data, student data, and so on. For example the HR Director is a suitable Steward for People Data. Data Stewards shall appoint Data Custodians as required to assist in the execution of the data strategy, policy and procedures for their area of stewardship. A number of groups work together, and report to DGSG, to look after particular areas of data, such as statutory management returns, research management data, and user groups for decision support. DGSG provides IT with requirements to support Data Governance including Decision Support. IT deliver those requirements through the IT Roadmap and associated technical decisions and standards governed by ITGS Since data is central to what we do, and we all use or create data, a number of principles help us all in our decisions and use of data. Version 1 - Approved Page 1 of 13 April 2015
2 Training management and staff to adopt common approaches to data issues; Building standard, repeatable processes; Reducing costs and increasing effectiveness through coordination of efforts; Ensuring efficiency and transparency of processes; Informing business continuity (ensuring the ongoing availability and disaster recovery of key data); Supporting IT roadmap planning and technical decisions; Reducing the risk of mismanagement of data by students, staff or others; which may lead to fines, reputational damage, and can have other process and financial implications. Governance Roles and Responsibilities No one person, department, division, school, or group owns Institutional Data, even though specific units bear some responsibility for certain data. The University owns the data (or in some cases, such as with National Security numbers, is the custodian of data), but a specific person in the form of the Steward has ultimate responsibility to define management of the assigned data set within the scope of legal and regulatory obligations. The roles and responsibilities outlined below will govern management, access, and accountability for Institutional Data and will be assigned by the DGSG. Institutional Data Governance DGSG looks after Data Governance and Strategy and is accountable to PET. The University Secretary appoints Committee members, who include representatives from Academia, Research and Information Technology and senior University management. The DGSG may create further subcommittees and task forces as needed. Data Governance shall be collaborative and transparent. Relationship between Governance Bodies and Governed University Resources None of the university s key resources (people, process, data, technology and space) can be considered in isolation: Effective investments in the university are often multi-faceted. Changes to people, process, space, technology and data must be actively governed and co-ordinated across academic and support disciplines. The university has adopted the COBIT and TOGAF frameworks for governance and architecture. Best practice principles from these frameworks have been adapted and adopted by ITGS and apply across the governance and planning of business process, technology and data. DGSG shall direct, monitor and evaluate Data, ensuring appropriate reference and collaboration with the other key resources governed outside of DGSG immediate remit: particularly people, process, technology, space, and the relevant governance vehicles as applicable. This supports holistic and end to end outcomes for the University. 1. PET / EPET set overall direction 2. ITGS governs (evaluates, directs and monitors) IT and IT Data Architecture. ITGS ensures university wide review for the King s approach to managing process and the associated activity model. This provides an organisationally neutral holistic model. ITGS provides a single governance framework through for university-wide IT Architecture, Roadmap, Procurement and Standards 3. Information Security Group addresses university wide information security policies, performance and issues 4. DGSG directs all matters for KCL data governance. Includes Data Stewards, IT and Management/ Returns Reporting. DGSG governs Data Strategy in partnership with IT (for Data Architecture and Systems Implementation). Version 1 - Approved Page 2 of 13 April 2015
3 5. Data Governance Focus Groups form on an ad hoc or project basis around domain areas, such as HR, Finance, Student data. Some groups may be standing groups such as Management Information & Reporting. This also includes any relevant user groups such as Decision Support (Insight User Group). 6. Statutory Returns Management Group oversees processes and procedures associated with statutory returns 7. SRM sub-groups as required oversee individual returns 8. King s Futures, Faculty and Directorate Strategies provide requirements that DGSG and ITGS take into their work: shaping and impacting policies, procedures and roadmaps. 9. Business Continuity Planning Group (chaired by Estates) to ensure that management of data is adequately factored into emergency preparations D Close alignment between ITGS and DGSG ensures IT Architecture supports the Data Vision and joint agreement on Data Policies and Strategy. DGSG ensures that Data Management leverages the ITGS approved Decision Support Strategy, capabilities and roadmap for IT Data Support. King s Governance Principles for Data Principles apply to all forms of data governance and planning, and guide governance decisions, process and systems development. DGSG shall ensure that an approved set of principles for data is reviewed, agreed and is compatible with other governance requirements. The principles relating to data and broader aspects of governance is maintained by ITGS in conjunction with DGSG. Data policies that impact general Information Security shall be reviewed and approved by the Information Security Forum. Principles help stakeholders make data-related strategic and tactical decisions within and across Data Domains. The current set of ITGS approved principles is maintained on sharepoint here and is summarised below. Data is an Asset - Data is an asset that has value to the University and is managed accordingly. Look after data and protect it. Data that has shared value should be shared - Users have access to the data necessary to perform their duties; therefore, data is shared across University functions and organizations. Use of data shall comply with the direction set by the Data Steward (e.g. people data shall be handled in accordance with the direction set by the people data steward, wherever that data is held in the university) Data is Accessible - Data is accessible for users to perform their agreed functions when and how they need it. Data Trustee - Each core University data element has a trustee accountable for data quality. Common Vocabulary and Data Definitions - Data is defined consistently throughout the University, and the definitions are understandable and available to all users. Data Security - Data, whether stored, in transit or in use, is protected from unauthorized use and disclosure to ensure the required levels of confidentiality, integrity and accessibility Interoperability - Software and hardware should conform to defined standards that promote interoperability for data, applications, and technology. Law, regulations and standards Everyone responsible for using data has to follow the data protection principles. They must make sure the information is: used fairly and lawfully used for limited, specifically stated purposes used in a way that is adequate, relevant and not excessive maintained in an accurate state kept for no longer than is absolutely necessary handled according to people s data protection rights kept safe and secure not transferred outside the UK without adequate protection Nothing in this policy precludes the disclosure of Institutional Data to external organizations, governmental agencies, or authorized individuals as required or permitted by legislation. The university s policies on disclosure and personal data should be consulted as appropriate, available through the Policy Zone Version 1 - Approved Page 3 of 13 April 2015
4 Data shall be managed with due regard to all applicable laws and regulations, as well as relevant best practice frameworks. Of particular note is the Data Protection Act, which controls how your personal information is used by organisations, businesses or the government. Everyone responsible for using data has to follow strict rules called data protection principles. They must make sure the information is: used fairly and lawfully used for limited, specifically stated purposes used in a way that is adequate, relevant and not excessive maintained in an accurate state kept for no longer than is absolutely necessary handled according to people s data protection rights kept safe and secure not transferred outside the UK without adequate protection There is stronger legal protection for more sensitive information, such as: ethnic background political opinions religious beliefs health sexual health criminal records Reference shall be made to relevant standards, such as ISO27001, the best practice standard for Information Security, with the specific aims of ensuring data is appropriately managed and safeguarded to ensure appropriate Data Confidentiality, Integrity, and Accessibility. Reference shall also be made to Higher Education bodies such as HESA, HEFCE or JISC where collaboration or other models may prove useful to the University. The Director of Governance and Legal Affairs Management has responsibility for interpreting the laws governing data access and related issues. Personal responsibility All users of data have responsibility for preserving the security and integrity of Institutional Data. Proper stewardship and custodianship of university Institutional Data will facilitate appropriate access to data. All data users must adhere to the following: Confidentiality: Respecting the confidentiality and privacy rights of individuals whose records they may access. Ethics: Observing the ethical restrictions that apply to data to which they have access. Policy Adherence: Abiding by applicable laws and University policies with respect to access, use, protection, proper disposal, and disclosure of data. Quality Control: Reviewing reports created from data to ensure that the analysis results are accurate and the data has been interpreted correctly. Responsible Access: Accessing and using Institutional Data only as required in their conduct of University business. Reporting any breaches of University information in a timely manner according to procedures defined in the Incident Management Policy. Change Management Modifications to the approach, reference data values and the structure/use of master data, metadata and models used for Data Governance will be change-managed through DGSG. Version 1 - Approved Page 4 of 13 April 2015
5 Data Strategy A vision statement and plan for data strategy shall be maintained. This sets priority and direction for data and datarelated activities. Such strategy will take into account the overall university approach for the deployment and development of its key resources: people, process, technology, data and space. Technology for Data DGSG shall specify and prioritise the requirements and strategy for data management. The technology to implement those requirements and strategy shall be specified and implemented by IT as part of the IT Roadmap for Projects and Improvements. DGSG shall prioritise the Decision Support section of the roadmap as part of the overall IT prioritisation via ITGS. DGSG shall review and validate a record of University Data and Solution owners and stakeholders for each application on the IT Portfolio. IT shall create and maintain this record. User groups for Data Technology and Decision Support DGSG shall sponsor and direct user groups as required for Data Technology and Decision Support. They shall comprise representatives from across the University and include user and IT representatives. They shall make recommendations to DGSG to support the development of Data and IT Strategy. They shall assist the University in the realisation of the approved and agreed Strategies and making best use of the available capabilities (people, process, technology etc.) Data Stewards, Custodians and Statutory Returns Managers DGSG shall appoint Data Stewards and ensure that all relevant Data Entities have a responsible Steward, and ensure Statutory Returns Managers are appointed. A Data Steward or Custodian may be assigned the role of a Statutory Returns Manager. Data Stewards look after particular sets of data, such as people data, student data, and so on. Data Stewards shall be responsible for the management of data under their oversight, under the direction of the DGSG. They shall appoint Data Custodians as required to assist in the execution of the data strategy, policy and procedures for their area of stewardship. Use of data from one domain by another (sometimes known as transformed data) shall comply with the direction of the steward for the data as per the source. For example, the rules, definitions and treatment of people data, wherever that data may be held shall comply with the rules, definitions and treatment established by the people data domain owner. The responsibilities of Data Stewards, Custodians and Statutory Returns Managers are elaborated in appendix: terms and definitions. Data Classification DGSG shall ensure that there is an approved Data Classification classifying each data element according to an agreed university definition; an example of this definition might be Sensitive (high risk), Restricted (medium risk) and Public (low risk). Institutional Data Model DGSG shall oversee the university Institutional Data Model, including the definition of different types of institutional data, and defining the standard for documentation of data elements. This includes documenting data flows between systems and organisations so the origin of data elements can be traced through organisational systems and processes. The types of institutional data will align with the King s Activity Model wherever possible. The key value-adding activities areas are in the academic endeavour: Education and Research. The supporting activities are Support and Administration, Collaboration and Infrastructure. Partners may be a value-add activity or support, depending on the nature of the partnership. Version 1 - Approved Page 5 of 13 April 2015
6 Access to Data Institutional Data is available to individuals carrying out their University responsibilities on an as needed basis. An individual interested in utilizing Institutional Data for any other purpose must request the Institutional Data through a Freedom of Information request. Appendix: Terms and definitions Term Role: Data Stewards Definition DGSG shall appoint Data Stewards and ensure that all relevant Data Entities have a responsible Steward. Data Stewards look after particular sets of data, such as people data, student data, and so on. For example the HR Director is a suitable Steward for People Data. Data Stewards shall be responsible for the management of data under their oversight, under the direction of the DGSG. They shall appoint Data Custodians as required to assist in the execution of the data strategy, policy and procedures for their area of stewardship. Use of data from one domain by another (sometimes known as transformed data) shall comply with the direction of the steward for the data as per the source. For example, the rules, definitions and treatment of people data, wherever that data may be held shall comply with the rules, definitions and treatment established by the people data domain owner. Stewardship can be considered as Taking responsibility for the survival and wellbeing of something that is valued. The responsibility for taking good care of resources entrusted to one. The science, art and skill of responsible and accountable management of resources. Being responsible for managing property or resources; the individual's responsibility to manage his/her life and property with proper regard for the rights of others. The practice of managing or looking after the wellbeing of something. Data Stewardship, is concerned with taking care of data assets that do not necessarily belong to the stewards themselves. Data Stewards represent the concerns of others. Some may represent the needs of the entire organization. Others may be tasked with representing a smaller constituency: such as a faculty, directorate or department. By virtue of their positions, Stewards of Institutional Data have the primary administrative and management responsibilities for segments of Institutional Data within their functional areas. Stewards of Institutional Data implement policy, define procedures pertaining to the use and release of the data for which they are responsible, and ensure the feasibility of acting on those procedures. Stewards are responsible for defining procedures and making policy interpretations for their business unit(s). Any such business unit specific items must, at minimum, meet University policy standards. They are responsible for coordinating their work with other university offices associated with the management and security of data, such as the Information Security Officer and IT staff. Access: Approving requests for access to Institutional Data within their functional area, specifying the appropriate access procedure, and ensuring appropriate access rights and permissions according to classification of data. Communication: Ensuring that Consumer/Users of the data for which the Stewards are responsible are aware of information handling procedures. Compliance and Data Security: The Steward is ultimately responsible for compliance with applicable legal and regulatory requirements, and with University policies and procedures, including specific policies or procedures established by Information Security, ITGS and DGSG. Stewards must be knowledgeable about applicable laws and regulations to the extent necessary Version 1 - Approved Page 6 of 13 April 2015
7 Term Definition to carry out the stewardship role. Stewards must take appropriate action if incidents violating any of the above policies or requirements occur Data Classification: Classifying each data element according to University definition - Sensitive (high risk), Restricted (medium risk) and Public (low risk). Data Lifecycle and Retention: Ensuring appropriate generation, use, retention, disposal, etc., of data and information consistent with University Policies, among them the Information Security Policy and standards for disposal. Data Manipulation, Extracting and Reporting: Ensuring proper use of Institutional Data and recommending appropriate policies regarding the manipulation or reporting of Institutional Data elements (in line with reporting standards established by the ITGS and DGSG) and implementing business unit procedures to carry out these policies. Data Quality, Integrity and Correction: Ensuring the accuracy and quality of data (access control, backup, etc.) and implementing programs for data quality improvement. Developing procedures for standardizing code values and coordinating maintenance of look-up tables used for Institutional Data. Consulting with data consumers / users to determine appropriate data sources. Determining update precedence when multiple sources for data exist. Determining the most reliable source for data. Data Storage: Documenting official storage locations and determining archiving and retention requirements for data elements. Education (Training and Advice): Ensuring that education of employees responsible for managing the data is provided in reporting standards, data retention, data handling, and data security. Policy Implementation: Establishing specific goals, objectives, and procedures to implement the policy and monitor progress toward implementation. Role: Data Custodians Data Custodians are university officials and their staff who have operational level responsibility for the capture, maintenance, dissemination and storage of Institutional Data. Stewards of Institutional Data may appoint Custodians to assist with data administration activities. A Custodian of Institutional Data is given specified responsibilities and receives guidance for appropriate and secure data handling from the Stewards. A Custodian has the responsibility for the day to day maintenance and protection of data. Specific responsibilities also include: Access: With guidance from the respective Stewards and in collaboration with technical support staff and University Counsel, Custodians recommend appropriate procedures that satisfy specified information security requirements including legal and compliance obligations as well as applicable University policies. Coordination: With guidance from the respective Stewards and in collaboration with technical support staff and University Counsel, Custodians recommend appropriate procedures that satisfy specified information security requirements including legal and compliance obligations as well as applicable University policies Data Collection and Maintenance: Collecting and maintaining complete, accurate, valid, and timely data for which they are responsible Data Security: Administering and monitoring access in collaboration with technical support staff, defining mitigation and recovery procedures. Reporting any breaches of University information in a timely manner in accordance with the Incident Management Policy. Coordinating data protection with the Information Security Office as necessary Documentation: Writing the documentation for each data element based upon stewardship requirements, policy, and best practices. This documentation will include, at a minimum, the data source, data provenance, data element business name, and data element definition. It should Version 1 - Approved Page 7 of 13 April 2015
8 Term Definition also include documentation of reporting processes, and the basis for data categorisations within these processes (for example, categorisation of student and staff activity, or of expenditure data). Education (Training and Advice): At the direction of the Steward, providing education in data retention, data handling, and data security to employees responsible for managing the data Role Statutory Returns Managers Access The Return Mangers for the statutory returns should ensure the following: Processes exist for gathering new/changed data requirements in a timely manner and ensuring deadlines are met HESA s check documentation is reviewed in detail by someone other than the principal return compiler, and any highlighted issues (e.g. significant year on year changes) are addressed through further data and sense checking as necessary Data in the returns are optimised and aligned with other statuary returns to ensure institutional consistency. All errors and warnings identified by HESA via the Minerva database are addressed in a timely manner and with appropriate detail (e.g. provide explanations of why apparently anomalous data is correct) Initial data quality improvement priority lists are produced prior to first submission of the return, for review by SMRG and by Line Managers or Accountable officers Data quality summaries are produced following the Commit stage, for review by the SMRG. These should include: o o o o Success in addressing data quality issues, level and materiality of risk attached to issues that will take longer to address, and plans for further data quality improvements in the short term and in subsequent years Deadlines met/not met to date Summary progress on Minerva queries & plan for resolving outstanding queries Confirmation of plans for formal sign off through Accountable officers Where there are concerns that the resources are not in place to execute the responsibilities above, the Return Mangers for the statutory returns will raise this with line managers in the first instance. Where there are concerns that outstanding data quality issues present material risks to the integrity of the return, the Return Mangers should raise this with their line manager in the first instance, who in turn should raise this with the Accountable officer. This should be done in a timely manner (at least 4 weeks before the last submission date). Accountable officers should: Confirm to the Principal, through the DG&SG, that a data quality assurance process has been followed and returns can be signed off by the Head of the Institution. Review proposals for system changes to improve data quality and prepare appropriate responses Ensure there are effective mechanisms for statutory requirements to be incorporated into system development programmes/projects Access is the right to read, enter, copy, query, download, or update data University employees or agents must be granted access to data elements according to the procedures specified by the Steward of that data and consistent with applicable laws and regulations. Users desiring data shall submit a completed form requesting access and acknowledging responsibility to the Steward of that data. The form contains the appropriate level of approval as determined by the Steward. If approval is granted, the Custodian will enter the User s credentials into a registration system, allowing access. If warranted, the Steward or Custodian will seek additional approvals. The DGSG will set policy for access to Institutional Data. Version 1 - Approved Page 8 of 13 April 2015
9 Term COBIT Compliance Conflict Resolution Data Data (information) Security Data Administration Data Classification Data Collection and Maintenance Definition Procedures shall be defined and documented by Stewards to permit access to data elements in Institutional Datasets, and authorised by DGSG COBIT is the leading best practice framework for governance that where information is a key resource for enterprises. From the time that information is created to the moment that it is destroyed, technology plays a significant role. Information technology is increasingly advanced and has become pervasive in enterprises and in social, public and business environments. COBIT practices help organisations govern the related aspects of process, information and technology. COBIT helps enterprises and their executives to: Maintain high-quality information to support business decisions. Generate business value from IT-enabled investments, i.e., achieve strategic goals and realise business benefits through effective and innovative use of IT. Achieve operational excellence through the reliable and efficient application of technology. Maintain risk at an acceptable level. Optimise the cost of services and technology. Comply with ever-increasing relevant laws, regulations, contractual agreements and policies. The Steward is ultimately responsible for compliance with applicable legal and regulatory requirements, and with University policies and procedures, including specific policies or procedures established by ITGS and DGSG. Stewards must be knowledgeable about applicable laws and regulations to the extent necessary to carry out the stewardship role. Stewards must take appropriate action if incidents violating the above occurs. DGSG will govern and arbitrate the definition of centrally-used administrative data attributes, data policy, and categorisation of data for internal or external reporting purposes, and levels of access are resolved, particularly for data elements that cross stewardship boundaries. In resolving these conflicts, DGSG would commission and draw on relevant analysis of business systems and processes and assess the impact (or potential impact) of particular policies or procedures on the University s performance. Data in all its forms is subject to DGSG governance (including but not limited to machine readable data, data in electronic communication systems, data in print, and backup and archived data on all media). Data Security includes administering and monitoring access in collaboration with technical support staff, defining mitigation and recovery procedures. Reporting any breaches of University information in a timely manner in accordance with the Incident Management Policy. Coordinating data protection with the Information Security Office as necessary Ensuring formal guidelines and tools are used to manage the University s data resources. Ensuring all Institutional Data has an identified Steward who effectively oversees the administration and management of all Institutional Data for which they are responsible. Data classifications, outlined in the Information Security Policy, categorize Institutional Data based on the level of potential risk if the data were exposed. A data classification matrix is maintained that includes the security classification of the data and identifies a Steward and Custodian(s) for the data. Access to data will be granted based on these classifications and the role and job requirements of the requestor. It is possible for data to be combined or gathered in specific ways that reveal information that might become sensitive in aggregate. Ensuring the accuracy and quality of data (access control, backup, etc.) and implementing programs for data quality improvement. Developing procedures for standardizing code values and coordinating maintenance of look-up tables used for Institutional Data. Consulting with data consumers / users to determine appropriate data sources Determining update precedence when multiple sources for data exist. Version 1 - Approved Page 9 of 13 April 2015
10 Term Data Lifecycle and Retention Data management Data Protection Act Data Quality, Integrity, and Correction Data Storage Data User Education (Training and Advice) Definition Determining the most reliable source for data. Ensuring appropriate generation, use, retention, disposal, etc., of data and information consistent with University Policies, among them the Information Security Policy and standards for disposal. Ensuring policies and procedures that manage Institutional Data as a University resource are established and these are communicated to the University community by the Data Stewards. These policies and procedures should include: Specific goals, objectives, and action plans to implement the policy and monitor progress in its implementation Identification of data entities and data sources that comprise Institutional Data and maintaining these entries in the IT Service Knowledge Management System or as Configuration Items in a Configuration Management Database. As this is an ongoing process there needs to be a regular and at least annual review of entries Prioritized management of Institutional Data including identifying in consultation with relevant consumers and users of the data which data is most critical and assigning appropriate management priorities to all data entities and sources Acceptable delivery modes for transmitting Institutional Data This DGSG policy is underpinned by the university s commitment to complying with the Data Protection Act 1998 and the 8 Data Protection Principles, which are:- Personal data shall be processed fairly and lawfully. Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes. Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed. Personal data shall be accurate and, where necessary, kept up to date. Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes. Personal data shall be processed in accordance with the rights of data subjects under this Act. Appropriate technical and organisational measures shall be taken against unauthorised or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data. Personal data shall not be transferred to a country or territory outside the European Economic Area unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data. Ensuring proper use of Institutional Data and recommending appropriate policies regarding the manipulation or reporting of Institutional Data elements (in line with reporting standards established by the ITGS and DGSG) and implementing business unit procedures to carry out these policies. Documenting official storage locations, archiving and retention requirements for data elements. Data Users are everyone who access Institutional data in performance of their assigned duties (Students, Researchers, Staff, Affiliates and Third Parties with access to University Data) Consumers / Users are employees or agents of the University who access Institutional Data in performance of their assigned duties. This access includes reading, entering, downloading, copying, querying, analysing, or updating data or information. Ensuring that education of employees responsible for managing the data is provided in reporting standards, data retention, data handling, and data security. Version 1 - Approved Page 10 of 13 April 2015
11 Term Institutional Data Model Institutional Data Record Definition Ensuring the creation and maintenance of an Institutional Data model and defining the standard for documentation of data elements. This includes definition and documentation of data entities, data flows between systems and organisations so that the origin of data elements can be traced through the organisational systems and processes. Data that is created, acquired, or maintained by University employees in performance of official administrative job duties. Institutional Data is a subset of the University's information resources and administrative records and includes any information in print, electronic, or audio-visual format that meets the following criteria: Acquired or maintained by university employees in performing their job duties; Relevant to planning, managing, operating, or auditing a major function at the university; Created, referenced or required for use by more than one organizational unit: Included in official University administrative reports or official university records Data or information in a fixed form that is created or received in the course of individual or institutional activity and set aside (preserved) as evidence of that activity for future reference Appendix: King s Principles for Data Governance and Decision Support King's ITGS Principles on Sharepoint A number of Governing and Architectural Principles apply to Data Governance and Decision Support. These are listed below: Cover the University end-to-end - Governing Principle 2 Architectural Principles Deliver Benefit to the University Architecture Principle Business Continuity - Architecture Principle Common Use Applications Architecture Principle Data is an Asset - Architecture Principle Data that has shared value should be shared - Architecture Principle Data is Accessible - Architecture Principle Data Trustee - Architecture Principle Common Vocabulary and Data Definitions Architecture Principle Data Security - Architecture Principle Design Factors - Architecture Principle Control Technical Diversity - Architecture Principle Interoperability - Architecture Principle The following architecture principles are of particular relevance Version 1 - Approved Page 11 of 13 April 2015
12 Data is an Asset Data is an asset that has value to the University and is managed accordingly Data is a valuable corporate resource; it has real, measurable value. In simple terms, the purpose of data is to aid decision-making. Accurate, timely data is critical to accurate, timely decisions. Most corporate assets are carefully managed, and data is no exception. Data is the foundation of our decision making, so we must also carefully manage data to ensure that we know where it is, can rely upon its accuracy, and can obtain it when and where we need it. Auditability ensures that data integrity and transparency can be demonstrated for all data Importance recognises that some data is more critical than other data and identifies the importance of the data so that appropriate controls exist for the data. It is necessary for data of critical importance to be treated differently from data of a trivial or unimportant nature Data will be standardized insofar as it is possible to limit the number of processes, categorisations and treatments necessary. Data that has shared value should be shared Users have access to the data necessary to perform their duties; therefore, data is shared across University functions and organizations. Timely access to accurate data is essential to improving the quality and efficiency of University decision-making. It is less costly to maintain timely, accurate data in a single application, and then share it, than it is to maintain duplicative data in multiple applications. The University holds a wealth of data, but it is stored in hundreds of incompatible stovepipe databases. The speed of data collection, creation, transfer, and assimilation is driven by the ability of the organization to efficiently share these islands of data across the organization. Shared data will result in improved decisions since we will rely on fewer (ultimately one virtual) sources of more accurate and timely managed data for all of our decision-making. Electronically shared data will result in increased efficiency when existing data entities can be used, without re-keying, to create new entities. Data is Accessible Data is accessible for users to perform their functions when and how they need it. Wide access to data leads to efficiency and effectiveness in decision-making, and affords timely response to information requests and service delivery. Using information must be considered from a University perspective to allow access by a wide variety of users. Staff time is saved and consistency of data is improved. Data transparency enables the origin of data to be identified and assured for integrity from the data source to the destination storage location at all times Data Trustee or Stewardship Each core University data domain has a trustee accountable for data quality. One of the benefits of an architected environment is the ability to share data (e.g., text, video, sound, etc.) across the University. As the degree of data sharing grows and business units rely upon common information, it becomes essential that only the data trustee makes decisions about the content of data. Data integrity should be preserved through storage, retrieval, manipulation, transformation, replication and maintenance activities. Since data loses its integrity when it is entered multiple times, cost of ownership is multiplied and decision support is compromised, the data trustee will have sole responsibility for data entry which eliminates redundant human effort and data storage resources. Stewardship ensures there is accountability for stewardship activities by individual data contributor and groups of Data Stewards. Accountabilities ensures there is identified ownership of data elements and data sets. Checks and balances are needed on an on-going basis to actively identify areas for improvement and to adherence to Data Governance. This reduces the likelihood of a single person being able to inadvertently or wilfully breach this policy. Version 1 - Approved Page 12 of 13 April 2015
13 Common Vocabulary and Data Definitions Data is defined consistently throughout the University, and the definitions are understandable and available to all users. The data that will be used in the development of applications must have a common definition throughout the Headquarters to enable sharing of data. A common vocabulary will facilitate communications and enable dialogue to be effective. In addition, it is required to interface systems and exchange data. Data Security Data, whether stored, in transit or in use, is protected from unauthorized use and disclosure to ensure the required levels of confidentiality, integrity and accessibility. Secure yet Pragmatic (Be secure whilst not over-complicating what we have) Data Security is subject to external regulation and compliance. Fines must be avoided and University reputation protected. Like any asset, data must be protected and secure (preserving confidentiality, integrity and accessibility). A major part of a University s Intellectual Property (IP) is hosted in the IT domain. The University s IP must be protected. This protection must be reflected in the IT architecture, implementation, and governance processes. University data must be safeguarded against inadvertent or unauthorized alteration, sabotage, disaster, or disclosure. Designs for security solutions should be as simple as is needed to make them effective and be coherent across the whole architecture. Unnecessary complexity is a threat to performance, maintainability and good security. A complex security system solution increases the likelihood of unknown and unforeseen weaknesses in its security, and makes it more difficult to understand. A solution cannot be protected sufficiently if it is not sufficiently understood and easy to manage. Secure architectures are most effective when based on a thorough understanding of the requirements, leading to a design that provides effective adequate protection while minimizing complexity and impact on operational performance Interoperability Interoperable (Ensure what we have works well together). Software and hardware should conform to defined standards that promote interoperability for data, applications, and technology. Standards help ensure consistency, thus improving the ability to manage systems and improve user satisfaction, and protect existing IT investments, thus maximizing return on investment and reducing costs. Standards for interoperability additionally help ensure support from multiple vendors for their products, and facilitate supply chain integration. We adapt and apply best practice, proven technology and ways of working to work for Kings Version 1 - Approved Page 13 of 13 April 2015
Institutional Data Governance Policy
Institutional Data Governance Policy Policy Statement Institutional Data is a strategic asset of the University. As such, it is important that it be managed according to sound data governance procedures.
Rowan University Data Governance Policy
Rowan University Data Governance Policy Effective: January 2014 Table of Contents 1. Introduction... 3 2. Regulations, Statutes, and Policies... 4 3. Policy Scope... 4 4. Governance Roles... 6 4.1. Data
Data Governance Policy. Staff Only Students Only Staff and Students. Vice-Chancellor
Name of Policy Description of Policy Policy applies to Data Governance Policy To establish proper standards to assure the quality and integrity of University data. This policy also defines the roles and
NSW Data & Information Custodianship Policy. June 2013 v1.0
NSW Data & Information Custodianship Policy June 2013 v1.0 CONTENTS 1. PURPOSE... 4 2. INTRODUCTION... 4 2.1 Information Management Framework... 4 2.2 Data and information custodianship... 4 2.3 Terms...
Information Management Advice 39 Developing an Information Asset Register
Information Management Advice 39 Developing an Information Asset Register Introduction The amount of information agencies create is continually increasing, and whether your agency is large or small, if
PROCEDURE. The permission rights assigned to allow data custodians to view, copy, enter, download, update or query data.
Section: Subject: Administration (AD) Data Governance AD.3.3.1 DATA GOVERNANCE PROCEDURE Legislation: Alberta Evidence Act, RSA 2000, c.a-18; Electronic Transactions Act, SA 2001, c.e- 5.5; Freedom of
Newcastle University Information Security Procedures Version 3
Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations
University of Liverpool
University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY
ADMINISTRATIVE DATA MANAGEMENT AND ACCESS POLICY PURPOSE The value of data as an institutional resource is increased through its widespread and appropriate use; its value is diminished through misuse,
Guidelines for Best Practices in Data Management Roles and Responsibilities
Guidelines for Best Practices in Data Management Roles and Responsibilities September 2010 Data Architecture Advisory Committee A subcommittee of Information Architecture & Standards Branch Table of Contents
KEELE UNIVERSITY IT INFORMATION SECURITY POLICY
Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical
INFORMATION MANAGEMENT STRATEGIC FRAMEWORK GENERAL NAT 11852-08.2004 OVERVIEW
GENERAL OVERVIEW NAT 11852-08.2004 SEGMENT FORMAT PRODUCT ID INFORMATION MANAGEMENT STRATEGIC FRAMEWORK In the context of the Information Management Strategic Framework, information is defined as: information
How To Develop An Enterprise Architecture
OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY
Scotland s Commissioner for Children and Young People Records Management Policy
Scotland s Commissioner for Children and Young People Records Management Policy 1 RECORDS MANAGEMENT POLICY OVERVIEW 2 Policy Statement 2 Scope 2 Relevant Legislation and Regulations 2 Policy Objectives
Council Policy. Records & Information Management
Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant
University of Michigan Medical School Data Governance Council Charter
University of Michigan Medical School Data Governance Council Charter 1 Table of Contents 1.0 SIGNATURE PAGE 2.0 REVISION HISTORY 3.0 PURPOSE OF DOCUMENT 4.0 DATA GOVERNANCE PROGRAM FOUNDATIONAL ELEMENTS
Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1
Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1 Document Control Document history Date Version No. Description Author September 2013 1.0 Final Department of
LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction
LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed
5 FAM 630 DATA MANAGEMENT POLICY
5 FAM 630 DATA MANAGEMENT POLICY (Office of Origin: IRM/BMP/OCA/GPC) 5 FAM 631 GENERAL POLICIES a. Data management incorporates the full spectrum of activities involved in handling data, including its
Information Governance Policy
Information Governance Policy Implementation date: 30 September 2014 Control schedule Approved by Corporate Policy and Strategy Committee Approval date 30 September 2014 Senior Responsible Officer Kirsty-Louise
Institutional Data Governance Policy
Institutional Data Governance Policy Vanderbilt University and Medical Center Effective Date: 07/09/2014 Revision Date: N/A DOCUMENT CONTROL Document Title Institutional Data Governance Policy Summary:
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12)
University of Hawai i Executive Policy on Data Governance (Draft 2/1/12) I. Definition Data governance is the exercise of authority and control (planning, monitoring, and enforcement) over the management
Electronic Documents: is any electronic media content that is intended to be used in either an electronic form or as printed output.
Information Governance (IG) encompasses sets of multi disciplinary structures, policies, procedures, processes and controls implemented to manage records and information at an enterprise level, supporting
Wright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
2. Scope 2.1 This policy covers all the activities and processes of the University that uses personal information in whatever format.
University of Westminster Personal Data Protection Policy For Compliance with the Data Protection Act 1998 1. Background 1.1 The Data Protection Act 1998 (DPA) defines personal data as data and information
Information Governance Policy A council-wide information management policy. Version 1.0 June 2013
Information Governance Policy Version 1.0 June 2013 Copyright Notification Copyright London Borough of Islington 2012 This document is distributed under the Creative Commons Attribution 2.5 license. This
Information Security Policy September 2009 Newman University IT Services. Information Security Policy
Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms
ASAE s Job Task Analysis Strategic Level Competencies
ASAE s Job Task Analysis Strategic Level Competencies During 2013, ASAE funded an extensive, psychometrically valid study to document the competencies essential to the practice of association management
Digital Continuity in ICT Services Procurement and Contract Management
Digital Continuity in ICT Services Procurement and Contract Management This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage
INFORMATION SECURITY MANAGEMENT POLICY
INFORMATION SECURITY MANAGEMENT POLICY Security Classification Level 4 - PUBLIC Version 1.3 Status APPROVED Approval SMT: 27 th April 2010 ISC: 28 th April 2010 Senate: 9 th June 2010 Council: 23 rd June
RECORD AND INFORMATION MANAGEMENT FRAMEWORK FOR ONTARIO SCHOOL BOARDS/AUTHORITIES
PURPOSE Records and information are important strategic assets of an organization and, like other organizational assets (people, capital and technology), must be managed to maximize their value. Information
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title
CORK INSTITUTE OF TECHNOLOGY
CORK INSTITUTE OF TECHNOLOGY DATA PROTECTION POLICY APPROVED BY GOVERNING BODY ON 30 APRIL 2009 INTRODUCTION Cork Institute of Technology is committed to a policy of protecting the rights and privacy of
Information Governance Policy
Information Governance Policy 1 Introduction Healthwatch Rutland (HWR) needs to collect and use certain types of information about the Data Subjects who come into contact with it in order to carry on its
UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET. 1283 Data Administration and Management (Public)
Form 1221-2 (June 1969) Subject UNITED STATES DEPARTMENT OF THE INTERIOR BUREAU OF LAND MANAGEMENT MANUAL TRANSMITTAL SHEET 1283 Data Administration and Management (Public) Release 1-1742 Date 7/10/2012
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES
ASTRAZENECA GLOBAL POLICY SAFEGUARDING COMPANY ASSETS AND RESOURCES THIS POLICY SETS OUT THE REQUIREMENTS FOR SAFEGUARDING COMPANY ASSETS AND RESOURCES TO PROTECT PATIENTS, STAFF, PRODUCTS, PROPERTY AND
Digital Continuity Plan
Digital Continuity Plan Ensuring that your business information remains accessible and usable for as long as it is needed Accessible and usable information Digital continuity Digital continuity is an approach
Information Integrity & Data Management
Group Standard Information Integrity & Data Management Serco recognises its responsibility to ensure that any information and data produced meets customer, legislative and regulatory requirements and is
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
Identifying Information Assets and Business Requirements
Identifying Information Assets and Business Requirements This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Mapping the Technical Dependencies of Information Assets
Mapping the Technical Dependencies of Information Assets This guidance relates to: Stage 1: Plan for action Stage 2: Define your digital continuity requirements Stage 3: Assess and manage risks to digital
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
INFORMATION SECURITY POLICY
Information Security Policy INFORMATION SECURITY POLICY Introduction Norwood UK recognises that information and information systems are valuable assets which play a major role in supporting the companies
INTERNATIONAL SOS. Data Protection Policy. Version 1.05
INTERNATIONAL SOS Data Protection Policy Document Owner: LCIS Division Document Manager: Group General Counsel Effective: December 2008 Revised: 2015 All copyright in these materials are reserved to AEA
Information Governance Strategy & Policy
Information Governance Strategy & Policy March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aims 1 3 Policy 2 4 Responsibilities 3 5 Information Governance Reporting Structure 4 6 Managing Information
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.
micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5
October 8, 2014. User Conference. Ronald Layne Manager, Data Quality and Data Governance [email protected]
Ensuring the highest quality data is delivered throughout the university providing valuable information serving individual and organizational need October 8, 2014 Ronald Layne Manager, Data Quality and
Earth Science Academic Archive
Earth Science Academic Archive The Principles of Good Data Management The National Geoscience Data Centre British Geological Survey, Keyworth, Nottingham, NG12 5GG Contents Purpose of this guide 1 What
Life Cycle of Records
Discard Create Inactive Life Cycle of Records Current Retain Use Semi-current Records Management Policy April 2014 Document title Records Management Policy April 2014 Document author and department Responsible
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
White Paper. Enterprise Information Governance. Date Released: September 2014. Author/s: Astral Consulting. www.astral.com.au.
White Paper Enterprise Information Governance Date Released: September 2014 Author/s: Astral Consulting Disclaimer This White Paper is published for general information purposes only. Nothing in the White
CORPORATE RECORDS MANAGEMENT POLICY
1.1 Introduction Derbyshire County Council is dependent on its records to operate efficiently and to account for its actions. This policy defines a structure for Derbyshire County Council to ensure that
Data Governance Policy. Version 2.0 19 October 2015
Version 2.0 19 October 2015 Document Title: Summary: Date of Issue: Status: Contact Officer: Applies To: References: This policy provides the Cancer Institute NSW with an instrument to formally manage
Risk Management of Outsourced Technology Services. November 28, 2000
Risk Management of Outsourced Technology Services November 28, 2000 Purpose and Background This statement focuses on the risk management process of identifying, measuring, monitoring, and controlling the
Chief Information Security Officer
Principles Vision Purpose Statement Chief Information Security Officer healthalliance Purpose, Vision and Principles healthalliance provides shared services to benefit NZ health organisations. We will
Index .700 FORMS - SAMPLE INCIDENT RESPONSE FORM.995 HISTORY
Information Security Section: General Operations Title: Information Security Number: 56.350 Index POLICY.100 POLICY STATEMENT.110 POLICY RATIONALE.120 AUTHORITY.130 APPROVAL AND EFFECTIVE DATE OF POLICY.140
Information Security Managing The Risk
Information Technology Capability Maturity Model Information Security Managing The Risk Introduction Information Security continues to be business critical and is increasingly complex to manage for the
Data Protection Policy June 2014
Data Protection Policy June 2014 Approving authority: Consultation via: Court Audit and Risk Committee, University Executive, Secretary's Board, Information Governance and Security Group Approval date:
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
Information Security Program
Stephen F. Austin State University Information Security Program Revised: September 2014 2014 Table of Contents Overview... 1 Introduction... 1 Purpose... 1 Authority... 2 Scope... 2 Information Security
IT Governance Overview
IT Governance Overview Contents Executive Summary... 3 What is IT Governance?... 4 Strategic Vision and IT Guiding Principles... 4 Campus-Wide IT Strategic Vision... 4 IT Guiding Principles... 4 The Scope
ITIL Managing Digital Information Assets
ITIL Managing Digital Information Assets Shirley Lacy, ConnectSphere Frieda Midgley, Digital Continuity Project Judith Riley, Digital Continuity Project Nigel Williamson, Digital Continuity Project White
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL
TERRITORY RECORDS OFFICE BUSINESS SYSTEMS AND DIGITAL RECORDKEEPING FUNCTIONALITY ASSESSMENT TOOL INTRODUCTION WHAT IS A RECORD? AS ISO 15489-2002 Records Management defines a record as information created,
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY. Data Label: Public
WEST LOTHIAN COUNCIL RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY CONTENTS 1. POLICY STATEMENT... 3 2. PRINCIPLES... 3 DEFINITIONS... 4 3. OBJECTIVES... 4 4. SCOPE... 4 5. OWNERSHIP & RESPONSIBILITIES...
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
IS INFORMATION SECURITY POLICY
IS INFORMATION SECURITY POLICY Version: Version 1.0 Ratified by: Trust Executive Committee Approved by responsible committee(s) IS Business Continuity and Security Group Name/title of originator/policy
An Overview of Data Management
An Overview of Data Management Recognition of Contribution The AICPA gratefully recognizes the invaluable contribution and involvement from the AICPA s IMTA Executive Committee Data Management Task Force
PRINCIPLES FOR ACCESSING AND USING PUBLICLY-FUNDED DATA FOR HEALTH RESEARCH
TARGETED CONSULTATION DRAFT National Health and Medical Research Council PRINCIPLES FOR ACCESSING AND USING PUBLICLY-FUNDED DATA FOR HEALTH RESEARCH Developed by NHMRC s Prevention and Community Health
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting
ITIL 2011 Lifecycle Roles and Responsibilities UXC Consulting Date November 2011 Company UXC Consulting Version Version 1.5 Contact [email protected] http://www.uxcconsulting.com.au This summary
Competency Requirements for Executive Director Candidates
Competency Requirements for Executive Director Candidates There are nine (9) domains of competency for association executives, based on research conducted by the American Society for Association Executives
Information Security Policy. Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services
Information Security Policy Document ID: 3809 Version: 1.0 Owner: Chief Security Officer, Security Services Contents 1 Purpose / Objective... 1 1.1 Information Security... 1 1.2 Purpose... 1 1.3 Objectives...
Guidelines 1 on Information Technology Security
Guidelines 1 on Information Technology Security Introduction The State Bank of Pakistan recognizes that financial industry is built around the sanctity of the financial transactions. Owing to the critical
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience
Copyright 2014 Carnegie Mellon University The Cyber Resilience Review is based on the Cyber Resilience Evaluation Method and the CERT Resilience Management Model (CERT-RMM), both developed at Carnegie
INFORMATION GOVERNANCE POLICY
INFORMATION GOVERNANCE POLICY Including the Information Governance Strategy Framework and associated Information Governance Procedures Last Review Date Approving Body N/A Governing Body Date of Approval
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES
AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by
Based on 2008 Survey of 255 Non-IT CEOs/Executives
Based on 2008 Survey of 255 Non-IT CEOs/Executives > 50% Ranked ITG as very important > 75% of businesses consider ITG to be an integral part of enterprise governance, but the overall maturity level is
Information Management Strategy. July 2012
Information Management Strategy July 2012 Contents Executive summary 6 Introduction 9 Corporate context 10 Objective one: An appropriate IM structure 11 Objective two: An effective policy framework 13
DATA PROTECTION POLICY
Reference number Approved by Information Management and Technology Board Date approved 14 th May 2012 Version 1.1 Last revised N/A Review date May 2015 Category Information Assurance Owner Data Protection
WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity
WHITE PAPER Practical Information Governance: Balancing Cost, Risk, and Productivity Sponsored by: EMC Corporation Laura DuBois August 2010 Vivian Tero EXECUTIVE SUMMARY Global Headquarters: 5 Speen Street
HERTSMERE BOROUGH COUNCIL
HERTSMERE BOROUGH COUNCIL DATA PROTECTION POLICY October 2007 1 1. Introduction Hertsmere Borough Council ( the Council ) is fully committed to compliance with the requirements of the Data Protection Act
Marist College. Information Security Policy
Marist College Information Security Policy February 2005 INTRODUCTION... 3 PURPOSE OF INFORMATION SECURITY POLICY... 3 INFORMATION SECURITY - DEFINITION... 4 APPLICABILITY... 4 ROLES AND RESPONSIBILITIES...
The Manitowoc Company, Inc.
The Manitowoc Company, Inc. DATA PROTECTION POLICY 11FitzPatrick & Associates 4/5/04 1 Proprietary Material Version 4.0 CONTENTS PART 1 - Policy Statement PART 2 - Processing Personal Data PART 3 - Organisational
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
THE BRITISH LIBRARY. Unlocking The Value. The British Library s Collection Metadata Strategy 2015-2018. Page 1 of 8
THE BRITISH LIBRARY Unlocking The Value The British Library s Collection Metadata Strategy 2015-2018 Page 1 of 8 Summary Our vision is that by 2020 the Library s collection metadata assets will be comprehensive,
Corporate Policy and Strategy Committee
Corporate Policy and Strategy Committee 10am, Tuesday, 30 September 2014 Information Governance Policies Item number Report number Executive/routine Wards All Executive summary Information is a key asset
White Paper. PPP Governance
PPP Governance The Governance of Projects, Programs and Portfolios (PPP) (sometimes called project governance for convenience) is the sub-set of corporate and organisational governance 1 focused on assisting
OFFICIAL. NCC Records Management and Disposal Policy
NCC Records Management and Disposal Policy Issue No: V1.0 Reference: NCC/IG4 Date of Origin: 12/11/2013 Date of this Issue: 14/01/2014 1 P a g e DOCUMENT TITLE NCC Records Management and Disposal Policy
Information Management and Protection Policy
Document Title: Information Management and Protection Policy Document Type: Policy No. Of Pages (11) Scope: Government of Newfoundland and Labrador and Public Bodies supported by the Office of the Chief
Research Data Management Procedures
Research Data Management Procedures pro-123 To be read in conjunction with: Research Data Management Policy Version: 2.00 Last amendment: Oct 2014 Next Review: Oct 2016 Approved By: Academic Board Date:
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
