1. Data Management Maturity Survey ITANA.org DASIG interested in state of practices in higher education. This survey captures maturity levels for 9 key as of. Each question is based on a 1 to 10 ranking. On a scale of 1 to 10 with 1 being defined as lowest on scale 10 begin defined as highest level of accomplishment in a, please rank your institution s maturity related to following as. 1. Data governance 1 - my institution has no formal governance policies no governance bodies currently in place. 5 a governance group has been formed, representing major administrative as from Data decisions related to those as discussed by stewards, with some actions resulting from those discussions. 10 every decision is governed by a formal process /or policy. Each a has a formal governance body that oversees quality use of its respective. Data policies strictly enforced. All movement throughout organization is regulated managed. Data governance Page 1
2. Data Architecture, analysis design Data Architecture, analysis design 1 re is no formal architecture related to. Data exists in multiple files bases, using multiple formats technologies. Changes to any structures made on fly, based on needs of individual as or project teams. Changes made by project teams or DBAs responsible for applications. There no models of any sort, limited if any documentation regarding or structures. 5 documentation exists for most systems in form of dictionaries physical models. There is at minimum a review done with affected as prior to structure changes being made. Enterprise level architectural planning is in early stage of development, not yet an effective practice enterprisewide 10 a architecture exists which encompasses all for Meta is a top priority, is used to document all. Change best practices require that any change to production stores requires review documentation. Data models maintained at an enterprise level for both logical physical views of. Page 2
3. Database 1 - bases managed by 5 minimal softw changes made that uses to schemas for m vendor supplied (schema is softw. Some 10- installed out optimization to base of box, base needs scripts environments schemas run as occur, primarily for analyzed provided by security or before vendor performance projects or reasons. Sporadic start. developer support, Stard to maintain dependent on maintenance presence of a processes base). guru, usually change At times person who created control individual that information applied DBAs system, is across all called in to norm for non- bases. do tasks enterprise/localized A stard that cannot bases, while schema be done by enterprise-level supports a vendor systems formal provided under joint architecture. scripts. of There is no more centralized base business IT optimization resources. outside what vendor provides. Database Page 3
4. Data security Data security 5 security roles recognized at level. Movement is underway to 10 migrate security is security to a managed at role-based role level. model. Data Regular 1 security is audits of security is maintained at security hled by policy individual application application level. Data conducted, administrators, security with many times audits occur divergences being a project infrequently. acted upon leader or Identity appropriately. programmer A central who manages is a growing security system. a of Security is awness, tool is provided at a but rolebased security utilized, with screen or function level, authorization meta with that is not yet being functionality implemented populated to being granted at required individually to application systems for a person. level, since population in There no many each security audits, different respective minimal if auntication format. any Automated transaction log authorization reviews of review. schemes update logs in place, all managed conducted to differently. It look for is not always variances. possible to completely track who has accessed specific elements of, nor for what purpose. Page 4
5. Data quality Data quality 1 information 10 quality is 5 continuous poor. There consistency quality is no of improvement consistency quality across programs of major in place across systems is systems or improving. stewarded. stores. Major Automated Multiple elements methods sources of stardized, employed to entry systems review for same of record quality, have been with element identified. feedback allowed, with Reporting being no cross methods forwarded to correlation employed to of validity perform respective cross-system stardized validity. stewards. form of entry 6. Reference master 5 MDM reference considered to be a good idea, 1 re being added to 10 re multiple future is a single versions of implementation view of coded items. master values used Research has across in many begun on which as across subsets of might be All appropriate in validation No validation an MDM occurs across program, against codes which types of master occurs, reference view. refore make sense for Regular codes inclusion in updates strategies. made horrendously Attempts have to out of sync. been made to master This causes create master to problems categories of reflect with codes, changes at reporting with some success. There consistent is some level. Page 5
Reference master validation. amount of synchronization of master codes across major systems. 7. Data whousing business intelligence 10 from all strategic systems is housed in a 1 if a whouse whouse, exists, it with contains dimensions minimal as. marts Minimal if established any 5 a which allow dimensions whouse for major exist to exists, with types of, dimensionalized analysis most likely from review. All is a copy of several of associated major meta transactional master image of systems. There is is a integrated application stardized with system. reporting reporting Meta is environment tools that limited, tool, with a access master set of meta whouse. is not that is created Reporting synced manually. from all across Updates to systems is various stores in conducted domains. whouse through a Reporting is done at portal in done in an intervals whousing ad hoc consistent with environment, manner, business thus requiring systems that ensuring intimate is consistent knowledge extracted from. results of cross context functional structure. analysis. Updates to Data updates to done at rom whouse intervals occur on a frequency associated with business Page 6
Data whousing business intelligence 8. Document /Content /Records (electronic records only, not paper based) Document /Content /Records cycles. 5 recognition of need 1 - re for formal no formal policies designated archival as for workflows is 10 - unstructured in place. Work has of. begun to Documents document unstructured on ly is a departmental important priority. file systems, /or There is still user legally room for desktops, required improvement google docs documents. but or Some work classification places. There has already schemas with no been designated formalized accomplished retention classification to move periods schemes, electronic security retention records off of periods, user archivals or desktops workflows. onto secured storage as. Page 7
9. Meta 5 meta has been defined as 10 - important meta to is a top Work is priority, underway to is used to implement document all a meta. repository, Meta to supports an develop 1 SOA processess meta is architecture. necessary not a A meta to populate priority to repository is it keep automatically it maintained, maintained. Minimal, if is There is an any, essential for awness meta is auditing of how maintained. integration important it purposes. will become Sufficient to address resources meta allocated to more broadly with development a support movement of meta toward tools more processes. exped business intelligence capabilities. Meta t 10. Which of as above is most critical to you /your institution right now? Data governance Data architecture, analysis, design Database Data security Data quality Reference master Data whousing business intelligence Document /Content /Records Meta Page 8
11. Additional Comments Please feel free to add additional information which would clarify or add context to your answers, or cover or as which may not have been covered in above questions. 2. Biographical Information We would like to get a small amount of information about you your 1. Please provide following information so we can contact you for furr followup. Name: Institution: Email Address: Page 9