Data security includes the planning, development and execution of security policies and procedures to provide authentication, authorisation, access and auditing of data and information assets.
Data security issues, breaches and unwarranted restrictions on employee access to data cannot directly impact operational success.
The loading of country codes into a CRM is a classic:
Archiving is the process of moving data off immediately accessible storage media and onto media with lower retrieval performance.
The key architecture domains include:
Data Integration and Interoperability is dependent on these other areas of data management:
A limitation of the centralized metadata repository approach is it may be less expensive.
Data governance requires control mechanisms and procedures for, but not limited to, escalating issues to higher level of authority.
The search function associated with a document management store is failing to return known artefacts. This is due to a failure of:
Data asset valuation is the process of understanding and calculating the economic value of data to an organisation. Value comes when the economic benefit of using data outweighs the costs of acquiring and storing it, as
A Metadata repository contains information about the data in an organization, including:
Some common data quality business rule types are:
Which of the following are must-do for any successful Data Governance programme?
Lack of automated monitoring represents serious risks, including:
One of the key differences between operational systems and data warehouses is: