SlideShare ist ein Scribd-Unternehmen logo
1 von 36
11
ENABLING DATA GOVERNANCE
Eryk B. Pratama
IT Advisory & Cyber Security Consultant at Global Consulting Firm
20 June 2020 | 19:00
PHPID-OL#35
The Journey through Data Trust, Ethics, and Quality
About Me
q Global IT Advisory & Cyber Security Professional
q Community Enthusiast
q Blogger / Writer
q Knowledge Hunter
q https://medium.com/@proferyk
q https://www.slideshare.net/proferyk
https://www.linkedin.com/in/erykbudipratama/
You can subscribe to my telegram channel.
§ IT Advisory & Risk (t.me/itadvindonesia)
§ Data Privacy & Protection (t.me/dataprivid)
§ Komunitas Data Privacy & Protection (t.me/dataprotectionid)
Agenda
01 Introduction
02 Data Trust
03 Data Ethics
04 Data Quality
Introduction
“ Data is the new oil “
“ Data is the new gold “
Data, Information, Knowledge and Wisdom (DIKW) Hierarchy
Introduction
Wisdom
Knowledge
Information
Data
DIKW Hierarchy
Data is the foundation of the pyramid, information is the next layer,
then knowledge, and, finally, wisdom is the apex. DIKW is a model or
construct that has been used widely within Information Science and
Knowledge Management. Some theoreticians in library and
information science have used DIKW to offer an account of logico-
conceptual constructions of interest to them, particularly concepts
relating to knowledge and epistemology.
Source: COBIT 5
Data/Information Lifecycle
Introduction
Source: ISACA – Getting Started with Data Governance with COBIT 5
It is important to plan the life cycle of data along with their placement within the governance structure. As practices
operate, the data supporting or underlying them reach the various levels of their natural life cycles. Data is planned,
designed, acquired, used, monitored and disposed of.
Critical information security control
Store | Data at Rest Share | Data in Motion Use | Data in Use
Data
Security
Data
Quality
Data
Governance
Data Governance DNA
Introduction
ProcessPeopleTechnology
•Data Policies
•Data Standards
•Business Data Ownership
•Data Workflow
•Data Quality Rules & Policies
•Data Cleansing Standards
•Compliance Rules
•Compliance & Security Policies
•Local, National & International
Laws
•Data Stewards
•Business Data Owners
•Data Mgmt Committee
•Data Administration
•Data Quality Services Team
•Data Governance
•DBAs
•Corporate Security
•Auditors
•Compliance Dept.
•Data Rules Library
•Automated Notifications
(Workflow)
•Data Profiling, Quality &
Monitoring Tools
•ETL Tools
•Audit Reports
•Security Software
•Access Rights Management
•Data Audit Trails
Data Governance Organization (Simple)
Introduction
Sponsor
Data Steward
Data OwnerData OwnerData Analyst
Data
Consumer
Data
Consumer
Data
Consumer
Data
Consumer
Technical
Support
Technical
Support
Data Governance Organization (Recommended)
Introduction
Corporate Governance
Committee
Data Management Lead
Database
Administrators
Data ArchitectsData Stewards
Business SMEs
Provide corporate governance to strategic data management decisions
such as new subject areas, new data sources, new business problems
solved with the data management, and new expenditures for processors
and storage
• Business Data Owner
• Understand data
• Define rules
• Identify errors
• Set thresholds for acceptable
levels of data quality
Oversee the organizations’ data stewardship, data administration and data
quality programs
Change
Management
• Resolve data integration issues
• Determine data security
• Document data definitions, calculations
and summarizations
• Maintain/update business rules
• Analyze and improve data quality
• Define mandatory data elements that
need to be measured
• Define and review metrics for measuring
data quality
• Translate Business Rules into
Data Models
• Maintain Conceptual, Logical
and Physical Data Models
• Assist in Data Integration
Resolution
• Maintain Metadata Repository
• Generate Physical Database
Schema
• Performance Database Tuning
• Create Database Backups
• Plan for Database Capacity
• Implement Data Security
Requirements
• Provide education on the
importance of data quality to the
company
• Communicate data quality
improvements to all employees
Data Trust
A growing reliance on data and analytics …
Data Trust
… trigger the rise of Four Anchors to make analytics more trusted
Data Trust
Does it perform as intended?Are the inputs and the
development process high
quality?
Is its use considered
acceptable?
Is its long term operation
optimised?
Percentage of respondents who reported being very confident in their D&A insights
Four Dimension of Data Trust
Data Trust
Quality
Effectiveness
Organizations need to ensure that the input and output can be in accordance with the context in the information /
insight will be used.
Effectiveness in this case is the extent to the output can achieve the expected results and provide value to the decision
makers who use the information.
Integrity
In this context, integrity refers to the use of data that is ethical and acceptable to related parties and complies with
existing regulations (for example data privacy).
In this context, resilience means how to ensure that the data source and output can be optimized for the long term.
Resilience
Does it perform as intended?Are the inputs and the development
process high quality?
Is its use considered acceptable? Is its long term operation
optimised?
Data sourcing is the key trust in stage of the analytics lifecycle
Data Trust
Data Ethics
Data Ethics & Privacy News
Data Ethics
Ethics in Data Processing
Data Ethics
In the context of personal data, data represent the characteristics of individuals that can later be used
to determine decisions that can affect the life of the individual. For example health data / medical
records. What is the impact if a medical record is leaked? Unauthorized and irresponsible people can
exploit it for financial needs, for example by selling medical records to companies that need the data.
Impact on
People
Abuse
Potential
The
economic
value of data
Misuse of data can have a negative impact on individuals. For example when we register a credit card at
the mall. Mostly, there will be offers from either other credit card providers or other advertisements
that we would ask from where or whom this sales person obtain our number. Another example is the
leak of permanent voter list (which the KPU said that those data indeed opened for public). What can
you do with that data? We can sell those data to certain parties. For criminals, this information can be
used for fraud activities.
Proper data processing will provide economic value. The ethics of the data owner can determine how
this value is obtained and who may take economic value from the data.
Ethical Decision Point
Data Ethics
Source: https://www.accenture.com/us-en/blogs/blogs-new-data-ethics-guidelines-organizations-digital-trust
Implementation of Data Ethics
Data Ethics
Vision
Vision really determines the direction / goals of the organization. In this context, the organization
needs to determine what ethical data usage is in the organization. The vision can be adopted from
data ethics principles chosen by Management.
Strategy
Strategies are arranged to achieve the vision. In this case, organizations need to develop strategies
so that data ethics can be applied and carried out consistently as part of the organization's culture.
Governance
To "force" stakeholders to carry out data ethics practices, organizations need to develop effective
policies and procedures and ensure that each related party has clearly defined responsibilities.
Infrastructure & Architecture
Managing complex data (especially for large organizations) will certainly be easier and integrated if
the organization has visibility of all data and is outlined in architecture (for example Enterprise
Architecture) and supported by systems and infrastructure that are qualified and reliable.
Data Insight
The use of insight to support clear and accurate data results is certainly very necessary. Use of tools
(such as dashboards) can help organizations monitor and provide early warnings of potential ethical
data violations.
Training & Development
People are the main factor in the context of data ethics. Organizations need to conduct training
related to ethics in the use (and misuse) of data. Of course this can be done when the organization
conducts socialization or training related to Data Privacy and Personal Data Protection, because data
ethics is attached to both
https://medium.com/@proferyk
Source: https://home.kpmg/pl/en/home/insights/2018/01/report-building-trust-in-analytics.html
RUU Perlindungan Data Pribadi
Data Ethics
Key Highlight
§ Explicit Consent is required from the data owner for
personal data processing.
§ Responding timelines for Data subject rights have been
separately called out in the RUU PDP.
§ Data controller to notify the data owner and the Minister
within 3 days of data breach.
§ Penalties for non-compliance may range from Rp 20 Billion
to Rp 70 Billion or Imprisonment ranging from 2 to 7 years
Data Owner Data Controller Data Processor Data Protection Officer
Data Privacy Framework
Data Ethics
NIST Privacy KPMG PrivacyISO/IEC 27701
§ Information Lifecycle
Management
§ Governance and Operating
Model
§ Inventory/Data Mapping
§ Regulatory Management
§ Risk and Control
§ Policies
§ Processes, Procedures and
Technology
§ Security for Privacy
§ Third Party Oversight
§ Training and Awareness
§ Monitoring
§ Incident Management
§ Inventory and Mapping
§ Data Processing Ecosystem Risk
Management
§ Governance Policies, Processes,
and Procedures
§ Awareness and Training
§ Monitoring and Review
§ Data Processing Management
§ Communication
§ Data Security
§ Protective Technology
§ Detection Processes
§ Respond Processes
§ Recovery Processes
§ Conditions for collection and
processing
§ Obligations to PII principals
§ Privacy by design and privacy by
default
§ PII sharing, transfer, and
disclosure
§ PIMS-specific requirements
related to ISO/IEC 27001
§ PIMS-specific requirements
related to ISO/IEC 27002
§ Additional ISO/IEC 27002
guidance for PII controllers
§ Additional ISO/IEC 27002
guidance for PII processors
Data Privacy Framework
Further Discussion
§ Data Privacy & Protection News (t.me/dataprivid)
§ Komunitas Data Privacy & Protection (t.me/dataprotectionid)
Data Quality
Common Questions
Data Quality
qHow can poor quality data impact our decisions?
qHow can we decrease costs connected with poor
quality data?
qHow can we improve the success of data related
projects?
qWhich approach should we choose to
continuously improve data?
qHow can we set up efficient and sustainable data
governance?
Source: ISACA – Getting Started with Data Governance with COBIT 5
Does our data fit the purpose we use it for?
Basic Data Quality Criteria
Data Quality
Accuracy Completeness
Consistency Timeliness
Accuracy Completeness
Consistency
Purpose of Data Quality Management
Data Quality
Develop an approach that managed appropriately to make data "fit for
purpose" based on the needs of customer data.
Define standards, needs, and specifications for quality control
purposes as part of the data lifecycle.
Define and implement processes to measure, monitor, and report
levels of data quality.
Identify opportunities to improve data quality through improved
processes and systems.
Data Quality Assessment
Data Quality
Some recommended steps are as follows.
1. Define the purpose of the assessment.
2. Identifying data to be assessed; focus on small data first or on specific problems.
3. Identify data usage and who will use the data.
4. Identify risks from data to be assessed, including their impact on business processes.
5. Check data in accordance with predetermined rules.
6. Document the issues found.
7. Conduct further analysis to quantify findings, prioritize issues based on business impact, and
develop hypotheses for root causes of the issues found.
8. Meet with Data Stewards / Owners, Subject Matter Experts, and data users to confirm issues and
priorities for improvement.
9. Use the assessment findings to improvement of data quality management processes.
Sample of Data Quality Worksheet
Data Quality
Data Quality Check Example
(Simple Case)
Data Quality
Data Quality Check (example)
Data Quality
To properly analyze certain data set, a look how it is stored and what are the examples of the records inside it
should be always taken. It helps to understand the provided unprocessed information and gives an idea what
are the characteristics of an ideal record plus it’s meaning.
Basic Checks
fill percentage
number of
duplicates
distinct and
unique values
Basic Data Quality Checks
Data Quality
As we can see on the above graph values of the data can be divided into several categories:
§ Empty records or the one with "Null“ value are grouped into “Null“ category
§ The other ones (”Not Null”) can be divided further into duplicates and distinct content.
If the percentage of the missing data is too big, we needs to take into account replacing them by specific
numbers or exclude the whole column/attribute from the set.
Duplicate repeated more than once in the given data.
Distinct non-null values that are different from each other.
Unique values that have no duplicates.
Non-
Unique
number of values that have at
least one duplicate in the list.
ILLUSTRATIVES
Case Example
Data Quality
Having given below data, a fast quality check can be done. Let’s assume that it is an analysis of phone numbers of 20 clients.
Having an output for “Phone” column:
§ We can see that out of 20 samples all of the records are non-empty and 1 of
them is a duplicate.
§ Taking into account that phone numbers have unique values that probably
means that two of our clients share the same number or the same client is
in the system twice (e.g. with a typo in his name).
§ The minimum value consists only zeros, therefore here we can also
distinguish wrongly typed phone number.
Case Example
Data Quality
The minimum value consists only zeros, therefore here we can also distinguish wrongly typed phone number.
Case Example
Data Quality
From the below shown mask analysis it might be observed that there are two records which are not in the correct format (9
digit number). First one has only 3 digits and the second one has a letter on the 6th place.
The quantile analysis in this case doesn’t bring much useful information, since the phone numbers are not scalable.
Q & A
https://medium.com/@proferyk
https://www.slideshare.net/proferyk
IT Advisory & Risk (t.me/itadvindonesia)
Data Privacy & Protection (t.me/dataprivid)
Komunitas Data Privacy & Protection (t.me/dataprotectionid)
Thank You J
https://medium.com/@proferyk
https://www.slideshare.net/proferyk
IT Advisory & Risk (t.me/itadvindonesia)
Data Privacy & Protection (t.me/dataprivid)
Komunitas Data Privacy & Protection (t.me/dataprotectionid)

Weitere ähnliche Inhalte

Was ist angesagt?

Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationEryk Budi Pratama
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & SecurityEryk Budi Pratama
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data GovernanceDATAVERSITY
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...Hernan Huwyler, MBA CPA
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR DemystifiedSPIN Chennai
 
Implementing Effective Data Governance
Implementing Effective Data GovernanceImplementing Effective Data Governance
Implementing Effective Data GovernanceChristopher Bradley
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by QualsysQualsys Ltd
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentationPriyanka Aash
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiEryk Budi Pratama
 
Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment FrameworkMark S. Mahre
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationAlan McSweeney
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...IT Governance Ltd
 
DAMA Feb2015 Mastering Master Data
DAMA Feb2015 Mastering Master DataDAMA Feb2015 Mastering Master Data
DAMA Feb2015 Mastering Master DataMary Levins, PMP
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...Christopher Bradley
 
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance -  Combining Data Management with Organizational ...DAS Slides: Data Governance -  Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...DATAVERSITY
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentationMidhun Nirmal
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowPECB
 

Was ist angesagt? (20)

Privacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program ImplementationPrivacy-ready Data Protection Program Implementation
Privacy-ready Data Protection Program Implementation
 
Data Privacy & Security
Data Privacy & SecurityData Privacy & Security
Data Privacy & Security
 
Data Architecture for Data Governance
Data Architecture for Data GovernanceData Architecture for Data Governance
Data Architecture for Data Governance
 
How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...How can the ISO 27701 help to design, implement, operate and improve a privac...
How can the ISO 27701 help to design, implement, operate and improve a privac...
 
GDPR Demystified
GDPR DemystifiedGDPR Demystified
GDPR Demystified
 
Implementing Effective Data Governance
Implementing Effective Data GovernanceImplementing Effective Data Governance
Implementing Effective Data Governance
 
GDPR: Training Materials by Qualsys
GDPR: Training Materials  by QualsysGDPR: Training Materials  by Qualsys
GDPR: Training Materials by Qualsys
 
ISO 27001
ISO 27001ISO 27001
ISO 27001
 
Gdpr overview ciso platform presentation
Gdpr overview ciso platform presentationGdpr overview ciso platform presentation
Gdpr overview ciso platform presentation
 
Urgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data PribadiUrgensi RUU Perlindungan Data Pribadi
Urgensi RUU Perlindungan Data Pribadi
 
GDPR RACI.pdf
GDPR RACI.pdfGDPR RACI.pdf
GDPR RACI.pdf
 
Technology Alignment Framework
Technology Alignment FrameworkTechnology Alignment Framework
Technology Alignment Framework
 
ISO 27701
ISO 27701ISO 27701
ISO 27701
 
Data Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata HarmonisationData Profiling, Data Catalogs and Metadata Harmonisation
Data Profiling, Data Catalogs and Metadata Harmonisation
 
Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...Legal obligations and responsibilities of data processors and controllers und...
Legal obligations and responsibilities of data processors and controllers und...
 
DAMA Feb2015 Mastering Master Data
DAMA Feb2015 Mastering Master DataDAMA Feb2015 Mastering Master Data
DAMA Feb2015 Mastering Master Data
 
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
DMBOK 2.0 and other frameworks including TOGAF & COBIT - keynote from DAMA Au...
 
DAS Slides: Data Governance - Combining Data Management with Organizational ...
DAS Slides: Data Governance -  Combining Data Management with Organizational ...DAS Slides: Data Governance -  Combining Data Management with Organizational ...
DAS Slides: Data Governance - Combining Data Management with Organizational ...
 
Iso 27001 isms presentation
Iso 27001 isms presentationIso 27001 isms presentation
Iso 27001 isms presentation
 
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to KnowISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
ISO/IEC 27701 vs. ISO/IEC 27001 vs. NIST: Essential Things You Need to Know
 

Ähnlich wie Enabling Data Governance - Data Trust, Data Ethics, Data Quality

The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarEryk Budi Pratama
 
An examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analyticsAn examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analyticsUncodemy
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptxRavindra Babu
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 
big data.pptx
big data.pptxbig data.pptx
big data.pptxVirajSaud
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Soumodeep Nanee Kundu
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfSoumodeep Nanee Kundu
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analyticsarchijain931
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityPrecisely
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analyticspriyanka rajput
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
 
DATAFICATION - Datafication refers to the transformation of various aspects
DATAFICATION - Datafication refers to the transformation of various aspectsDATAFICATION - Datafication refers to the transformation of various aspects
DATAFICATION - Datafication refers to the transformation of various aspectsincmagazineseo
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONPranav Godse
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overviewelvinchan
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uaeRishalHalid1
 

Ähnlich wie Enabling Data Governance - Data Trust, Data Ethics, Data Quality (20)

The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
An examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analyticsAn examination of the ethical considerations involved in data analytics
An examination of the ethical considerations involved in data analytics
 
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
Data Analytics Ethics: Issues and Questions (Arnie Aronoff, Ph.D.)
 
Ethics in Data Management.pptx
Ethics in Data Management.pptxEthics in Data Management.pptx
Ethics in Data Management.pptx
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 
big data.pptx
big data.pptxbig data.pptx
big data.pptx
 
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
Ethical Considerations in Data Analysis_ Balancing Power, Privacy, and Respon...
 
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdfNavigating the Complex Terrain of Data Governance in Data Analysis.pdf
Navigating the Complex Terrain of Data Governance in Data Analysis.pdf
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
Ethical Considerations in Data Analytics
Ethical Considerations in Data AnalyticsEthical Considerations in Data Analytics
Ethical Considerations in Data Analytics
 
How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
DATAFICATION - Datafication refers to the transformation of various aspects
DATAFICATION - Datafication refers to the transformation of various aspectsDATAFICATION - Datafication refers to the transformation of various aspects
DATAFICATION - Datafication refers to the transformation of various aspects
 
week 7.pptx
week 7.pptxweek 7.pptx
week 7.pptx
 
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTIONETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
ETHICAL ISSUES WITH CUSTOMER DATA COLLECTION
 
Information Risk Management Overview
Information Risk Management OverviewInformation Risk Management Overview
Information Risk Management Overview
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Data privacy and security in uae
Data privacy and security in uaeData privacy and security in uae
Data privacy and security in uae
 
BRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEBBRG_TAP_IG_20150826_WEB
BRG_TAP_IG_20150826_WEB
 

Mehr von Eryk Budi Pratama

Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIRingkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIEryk Budi Pratama
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityEryk Budi Pratama
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaEryk Budi Pratama
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykEryk Budi Pratama
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykEryk Budi Pratama
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEryk Budi Pratama
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceEryk Budi Pratama
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsEryk Budi Pratama
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDEryk Budi Pratama
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Eryk Budi Pratama
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsEryk Budi Pratama
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsEryk Budi Pratama
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationEryk Budi Pratama
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Eryk Budi Pratama
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Eryk Budi Pratama
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5Eryk Budi Pratama
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?Eryk Budi Pratama
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - FundamentalEryk Budi Pratama
 
Software Development Methodology - Unified Process
Software Development Methodology - Unified ProcessSoftware Development Methodology - Unified Process
Software Development Methodology - Unified ProcessEryk Budi Pratama
 

Mehr von Eryk Budi Pratama (20)

Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTIRingkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
Ringkasan Standar Kompetensi Data Protection Officer | Agustus 2023 | IODTI
 
Cybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber SecurityCybersecurity 101 - Auditing Cyber Security
Cybersecurity 101 - Auditing Cyber Security
 
Modern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL IndonesiaModern IT Service Management Transformation - ITIL Indonesia
Modern IT Service Management Transformation - ITIL Indonesia
 
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - ErykData Loss Prevention (DLP) - Fundamental Concept - Eryk
Data Loss Prevention (DLP) - Fundamental Concept - Eryk
 
Cyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - ErykCyber Resilience - Welcoming New Normal - Eryk
Cyber Resilience - Welcoming New Normal - Eryk
 
Enterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating ModelEnterprise Cybersecurity: From Strategy to Operating Model
Enterprise Cybersecurity: From Strategy to Operating Model
 
Blockchain for Accounting & Assurance
Blockchain for Accounting & AssuranceBlockchain for Accounting & Assurance
Blockchain for Accounting & Assurance
 
Guardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & AnalyticsGuardians of Trust: Building Trust in Data & Analytics
Guardians of Trust: Building Trust in Data & Analytics
 
The Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA IDThe Art of Cloud Auditing - ISACA ID
The Art of Cloud Auditing - ISACA ID
 
Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0Cybersecurity Skills in Industry 4.0
Cybersecurity Skills in Industry 4.0
 
Identity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOpsIdentity & Access Management for Securing DevOps
Identity & Access Management for Securing DevOps
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Industry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT SkillsIndustry 4.0 : How to Build Relevant IT Skills
Industry 4.0 : How to Build Relevant IT Skills
 
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web ApplicationWeb Application Hacking - The Art of Exploiting Vulnerable Web Application
Web Application Hacking - The Art of Exploiting Vulnerable Web Application
 
Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)Emerging Technology Risk Series - Internet of Things (IoT)
Emerging Technology Risk Series - Internet of Things (IoT)
 
Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)Protecting Agile Transformation through Secure DevOps (DevSecOps)
Protecting Agile Transformation through Secure DevOps (DevSecOps)
 
IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5IT Governance - Capability Assessment using COBIT 5
IT Governance - Capability Assessment using COBIT 5
 
IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?IT Governance - Governing IT: Do or Die?
IT Governance - Governing IT: Do or Die?
 
IT Operating Model - Fundamental
IT Operating Model - FundamentalIT Operating Model - Fundamental
IT Operating Model - Fundamental
 
Software Development Methodology - Unified Process
Software Development Methodology - Unified ProcessSoftware Development Methodology - Unified Process
Software Development Methodology - Unified Process
 

KĂźrzlich hochgeladen

Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxolyaivanovalion
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Delhi Call girls
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfadriantubila
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlkumarajju5765
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAroojKhan71
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 

KĂźrzlich hochgeladen (20)

Zuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptxZuja dropshipping via API with DroFx.pptx
Zuja dropshipping via API with DroFx.pptx
 
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
Best VIP Call Girls Noida Sector 39 Call Me: 8448380779
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
VIP Call Girls Service Miyapur Hyderabad Call +91-8250192130
 
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girlCall Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
Call Girls 🫤 Dwarka ➡️ 9711199171 ➡️ Delhi 🫦 Two shot with one girl
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Midocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFxMidocean dropshipping via API with DroFx
Midocean dropshipping via API with DroFx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 

Enabling Data Governance - Data Trust, Data Ethics, Data Quality

  • 1. 11 ENABLING DATA GOVERNANCE Eryk B. Pratama IT Advisory & Cyber Security Consultant at Global Consulting Firm 20 June 2020 | 19:00 PHPID-OL#35 The Journey through Data Trust, Ethics, and Quality
  • 2. About Me q Global IT Advisory & Cyber Security Professional q Community Enthusiast q Blogger / Writer q Knowledge Hunter q https://medium.com/@proferyk q https://www.slideshare.net/proferyk https://www.linkedin.com/in/erykbudipratama/ You can subscribe to my telegram channel. § IT Advisory & Risk (t.me/itadvindonesia) § Data Privacy & Protection (t.me/dataprivid) § Komunitas Data Privacy & Protection (t.me/dataprotectionid)
  • 3. Agenda 01 Introduction 02 Data Trust 03 Data Ethics 04 Data Quality
  • 5. “ Data is the new oil “ “ Data is the new gold “
  • 6. Data, Information, Knowledge and Wisdom (DIKW) Hierarchy Introduction Wisdom Knowledge Information Data DIKW Hierarchy Data is the foundation of the pyramid, information is the next layer, then knowledge, and, finally, wisdom is the apex. DIKW is a model or construct that has been used widely within Information Science and Knowledge Management. Some theoreticians in library and information science have used DIKW to offer an account of logico- conceptual constructions of interest to them, particularly concepts relating to knowledge and epistemology. Source: COBIT 5
  • 7. Data/Information Lifecycle Introduction Source: ISACA – Getting Started with Data Governance with COBIT 5 It is important to plan the life cycle of data along with their placement within the governance structure. As practices operate, the data supporting or underlying them reach the various levels of their natural life cycles. Data is planned, designed, acquired, used, monitored and disposed of. Critical information security control Store | Data at Rest Share | Data in Motion Use | Data in Use
  • 8. Data Security Data Quality Data Governance Data Governance DNA Introduction ProcessPeopleTechnology •Data Policies •Data Standards •Business Data Ownership •Data Workflow •Data Quality Rules & Policies •Data Cleansing Standards •Compliance Rules •Compliance & Security Policies •Local, National & International Laws •Data Stewards •Business Data Owners •Data Mgmt Committee •Data Administration •Data Quality Services Team •Data Governance •DBAs •Corporate Security •Auditors •Compliance Dept. •Data Rules Library •Automated Notifications (Workflow) •Data Profiling, Quality & Monitoring Tools •ETL Tools •Audit Reports •Security Software •Access Rights Management •Data Audit Trails
  • 9. Data Governance Organization (Simple) Introduction Sponsor Data Steward Data OwnerData OwnerData Analyst Data Consumer Data Consumer Data Consumer Data Consumer Technical Support Technical Support
  • 10. Data Governance Organization (Recommended) Introduction Corporate Governance Committee Data Management Lead Database Administrators Data ArchitectsData Stewards Business SMEs Provide corporate governance to strategic data management decisions such as new subject areas, new data sources, new business problems solved with the data management, and new expenditures for processors and storage • Business Data Owner • Understand data • Define rules • Identify errors • Set thresholds for acceptable levels of data quality Oversee the organizations’ data stewardship, data administration and data quality programs Change Management • Resolve data integration issues • Determine data security • Document data definitions, calculations and summarizations • Maintain/update business rules • Analyze and improve data quality • Define mandatory data elements that need to be measured • Define and review metrics for measuring data quality • Translate Business Rules into Data Models • Maintain Conceptual, Logical and Physical Data Models • Assist in Data Integration Resolution • Maintain Metadata Repository • Generate Physical Database Schema • Performance Database Tuning • Create Database Backups • Plan for Database Capacity • Implement Data Security Requirements • Provide education on the importance of data quality to the company • Communicate data quality improvements to all employees
  • 12. A growing reliance on data and analytics … Data Trust
  • 13. … trigger the rise of Four Anchors to make analytics more trusted Data Trust Does it perform as intended?Are the inputs and the development process high quality? Is its use considered acceptable? Is its long term operation optimised? Percentage of respondents who reported being very confident in their D&A insights
  • 14. Four Dimension of Data Trust Data Trust Quality Effectiveness Organizations need to ensure that the input and output can be in accordance with the context in the information / insight will be used. Effectiveness in this case is the extent to the output can achieve the expected results and provide value to the decision makers who use the information. Integrity In this context, integrity refers to the use of data that is ethical and acceptable to related parties and complies with existing regulations (for example data privacy). In this context, resilience means how to ensure that the data source and output can be optimized for the long term. Resilience Does it perform as intended?Are the inputs and the development process high quality? Is its use considered acceptable? Is its long term operation optimised?
  • 15. Data sourcing is the key trust in stage of the analytics lifecycle Data Trust
  • 17. Data Ethics & Privacy News Data Ethics
  • 18. Ethics in Data Processing Data Ethics In the context of personal data, data represent the characteristics of individuals that can later be used to determine decisions that can affect the life of the individual. For example health data / medical records. What is the impact if a medical record is leaked? Unauthorized and irresponsible people can exploit it for financial needs, for example by selling medical records to companies that need the data. Impact on People Abuse Potential The economic value of data Misuse of data can have a negative impact on individuals. For example when we register a credit card at the mall. Mostly, there will be offers from either other credit card providers or other advertisements that we would ask from where or whom this sales person obtain our number. Another example is the leak of permanent voter list (which the KPU said that those data indeed opened for public). What can you do with that data? We can sell those data to certain parties. For criminals, this information can be used for fraud activities. Proper data processing will provide economic value. The ethics of the data owner can determine how this value is obtained and who may take economic value from the data.
  • 19. Ethical Decision Point Data Ethics Source: https://www.accenture.com/us-en/blogs/blogs-new-data-ethics-guidelines-organizations-digital-trust
  • 20. Implementation of Data Ethics Data Ethics Vision Vision really determines the direction / goals of the organization. In this context, the organization needs to determine what ethical data usage is in the organization. The vision can be adopted from data ethics principles chosen by Management. Strategy Strategies are arranged to achieve the vision. In this case, organizations need to develop strategies so that data ethics can be applied and carried out consistently as part of the organization's culture. Governance To "force" stakeholders to carry out data ethics practices, organizations need to develop effective policies and procedures and ensure that each related party has clearly defined responsibilities. Infrastructure & Architecture Managing complex data (especially for large organizations) will certainly be easier and integrated if the organization has visibility of all data and is outlined in architecture (for example Enterprise Architecture) and supported by systems and infrastructure that are qualified and reliable. Data Insight The use of insight to support clear and accurate data results is certainly very necessary. Use of tools (such as dashboards) can help organizations monitor and provide early warnings of potential ethical data violations. Training & Development People are the main factor in the context of data ethics. Organizations need to conduct training related to ethics in the use (and misuse) of data. Of course this can be done when the organization conducts socialization or training related to Data Privacy and Personal Data Protection, because data ethics is attached to both https://medium.com/@proferyk Source: https://home.kpmg/pl/en/home/insights/2018/01/report-building-trust-in-analytics.html
  • 21. RUU Perlindungan Data Pribadi Data Ethics Key Highlight § Explicit Consent is required from the data owner for personal data processing. § Responding timelines for Data subject rights have been separately called out in the RUU PDP. § Data controller to notify the data owner and the Minister within 3 days of data breach. § Penalties for non-compliance may range from Rp 20 Billion to Rp 70 Billion or Imprisonment ranging from 2 to 7 years Data Owner Data Controller Data Processor Data Protection Officer
  • 22. Data Privacy Framework Data Ethics NIST Privacy KPMG PrivacyISO/IEC 27701 § Information Lifecycle Management § Governance and Operating Model § Inventory/Data Mapping § Regulatory Management § Risk and Control § Policies § Processes, Procedures and Technology § Security for Privacy § Third Party Oversight § Training and Awareness § Monitoring § Incident Management § Inventory and Mapping § Data Processing Ecosystem Risk Management § Governance Policies, Processes, and Procedures § Awareness and Training § Monitoring and Review § Data Processing Management § Communication § Data Security § Protective Technology § Detection Processes § Respond Processes § Recovery Processes § Conditions for collection and processing § Obligations to PII principals § Privacy by design and privacy by default § PII sharing, transfer, and disclosure § PIMS-specific requirements related to ISO/IEC 27001 § PIMS-specific requirements related to ISO/IEC 27002 § Additional ISO/IEC 27002 guidance for PII controllers § Additional ISO/IEC 27002 guidance for PII processors Data Privacy Framework Further Discussion § Data Privacy & Protection News (t.me/dataprivid) § Komunitas Data Privacy & Protection (t.me/dataprotectionid)
  • 24. Common Questions Data Quality qHow can poor quality data impact our decisions? qHow can we decrease costs connected with poor quality data? qHow can we improve the success of data related projects? qWhich approach should we choose to continuously improve data? qHow can we set up efficient and sustainable data governance? Source: ISACA – Getting Started with Data Governance with COBIT 5 Does our data fit the purpose we use it for?
  • 25. Basic Data Quality Criteria Data Quality Accuracy Completeness Consistency Timeliness Accuracy Completeness Consistency
  • 26. Purpose of Data Quality Management Data Quality Develop an approach that managed appropriately to make data "fit for purpose" based on the needs of customer data. Define standards, needs, and specifications for quality control purposes as part of the data lifecycle. Define and implement processes to measure, monitor, and report levels of data quality. Identify opportunities to improve data quality through improved processes and systems.
  • 27. Data Quality Assessment Data Quality Some recommended steps are as follows. 1. Define the purpose of the assessment. 2. Identifying data to be assessed; focus on small data first or on specific problems. 3. Identify data usage and who will use the data. 4. Identify risks from data to be assessed, including their impact on business processes. 5. Check data in accordance with predetermined rules. 6. Document the issues found. 7. Conduct further analysis to quantify findings, prioritize issues based on business impact, and develop hypotheses for root causes of the issues found. 8. Meet with Data Stewards / Owners, Subject Matter Experts, and data users to confirm issues and priorities for improvement. 9. Use the assessment findings to improvement of data quality management processes.
  • 28. Sample of Data Quality Worksheet Data Quality
  • 29. Data Quality Check Example (Simple Case) Data Quality
  • 30. Data Quality Check (example) Data Quality To properly analyze certain data set, a look how it is stored and what are the examples of the records inside it should be always taken. It helps to understand the provided unprocessed information and gives an idea what are the characteristics of an ideal record plus it’s meaning. Basic Checks fill percentage number of duplicates distinct and unique values
  • 31. Basic Data Quality Checks Data Quality As we can see on the above graph values of the data can be divided into several categories: § Empty records or the one with "Null“ value are grouped into “Null“ category § The other ones (”Not Null”) can be divided further into duplicates and distinct content. If the percentage of the missing data is too big, we needs to take into account replacing them by specific numbers or exclude the whole column/attribute from the set. Duplicate repeated more than once in the given data. Distinct non-null values that are different from each other. Unique values that have no duplicates. Non- Unique number of values that have at least one duplicate in the list. ILLUSTRATIVES
  • 32. Case Example Data Quality Having given below data, a fast quality check can be done. Let’s assume that it is an analysis of phone numbers of 20 clients. Having an output for “Phone” column: § We can see that out of 20 samples all of the records are non-empty and 1 of them is a duplicate. § Taking into account that phone numbers have unique values that probably means that two of our clients share the same number or the same client is in the system twice (e.g. with a typo in his name). § The minimum value consists only zeros, therefore here we can also distinguish wrongly typed phone number.
  • 33. Case Example Data Quality The minimum value consists only zeros, therefore here we can also distinguish wrongly typed phone number.
  • 34. Case Example Data Quality From the below shown mask analysis it might be observed that there are two records which are not in the correct format (9 digit number). First one has only 3 digits and the second one has a letter on the 6th place. The quantile analysis in this case doesn’t bring much useful information, since the phone numbers are not scalable.
  • 35. Q & A https://medium.com/@proferyk https://www.slideshare.net/proferyk IT Advisory & Risk (t.me/itadvindonesia) Data Privacy & Protection (t.me/dataprivid) Komunitas Data Privacy & Protection (t.me/dataprotectionid)
  • 36. Thank You J https://medium.com/@proferyk https://www.slideshare.net/proferyk IT Advisory & Risk (t.me/itadvindonesia) Data Privacy & Protection (t.me/dataprivid) Komunitas Data Privacy & Protection (t.me/dataprotectionid)