![]() It can end up in uncounted numbers of reports, online displays, data feeds, and information products. See more on Approaches to Assigning Data Ownership and StewardshipĮnterprise data, by its very nature, flows through an organization, touching many business and technical processes and being stored/moved/transformed by many IT systems. If you do decide to employ the concept of Data Owners, it’s critical that you clearly define responsibilities for Data Owners versus those for Data Stewards. ![]() Before you decide to use the term “Data Owner” in your Data Governance and Stewardship program (or Enterprise Information Management program), you should understand your organization’s approach to Access Management, whether it employs the concept of Data Owners, and what responsibilities they have. More often, it is managed through Information Security, Compliance, Privacy, Risk Management, or other groups. In some organizations, this Access Management function is administered by Data Governance. Often, the permission follows a CRUD schema (create, read, update, delete)Ī) This process is aligned with enterprise compliance and data management efforts (privacy, information lifecycle management, data retention, eSecurity, controls management, etc.), andī) Request/permissions documentation is collected and retained to satisfy compliance and operational goals – A technical resource (usually a DBA) physically grants permission to an application, database, or other data store containing the data.– A business resource (the Data Owner, the person’s manager, etc.) gives the OK.– A person (staff member, contractor, partner, supplier, etc.) requests access to information.They are involved in a process that is something like this: Data Owners are given the right to decide who can have access to enterprise data. In some organizations, this approach is used for Compliance and Access Management purposes. So it is often convenient to designate “Data Owners” (typically from business groups rather than technical teams) who help coordinate those accountabilities. However, accountabilities for working with that data must be assigned to roles in the organization, and individuals (or teams) fill these roles. This approach acknowledges that enterprise data is “owned” by the enterprise rather than individuals or silos within the enterprise.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |