尊敬的 微信汇率:1円 ≈ 0.046239 元 支付宝汇率:1円 ≈ 0.04633元 [退出登录]
SlideShare a Scribd company logo
1
1
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Real World Data Governance
Using Data Governance
to Protect Sensitive Data
Monthly Webinar Series Hosted by DATAVERSITY
Robert S. Seiner – KIK Consulting / TDAN.com
May 17, 2018 – 11:00 a.m. PT / 2:00 p.m. ET
2
2
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Real-World Data Governance
Introduction
• Real-World Data Governance – Monthly Webinar Series
June 21, 2018 – Using Data Governance to Improve Data Understanding
July 18, 2018 – Improving Data Analytics with Data Governance
Third Thurs @ 2pm EST – Register at TDAN.com, KIKconsulting.com, DATAVERSITY.net
• Non-Invasive Data Governance Book
ISBN 9781935504856 / Technics Publishing / Amazon.com
• Speaking @ Dataversity Events
Data Governance & Information Quality (DGIQ) Conference – San Diego – June 11-15, 2018
Data Architecture Summit – Chicago – October 8-11, 2018
• Online Learning Plan
Non-Invasive Data Governance - DATAVERSITY Training Center
Seven Online Courses with Evaluations
• The Data Administration Newsletter (TDAN.com)
Twice Monthly – Data Articles, Columns, Blogs and Features
Produced by DATAVERSITY – Subscribe for emails
• KIK Consulting & Educational Services
KIKConsulting.com
Home of Non-Invasive Data Governance™
3
3
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• In this webinar we will discuss:
– Tips and techniques for classifying data and defining data handling rules
– Delivering roles appropriate for protecting sensitive data
– Selecting appropriate data sharing processes to govern
– Incremental implementation to protect the entire organization
– Measuring protection to demonstrate governance performance
Using Data Governance to Protect Sensitive Data
Agenda for Today’s Webinar
4
4
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Governance
– Data Governance is the Execution and Enforcement of Authority
Over the Protection of Sensitive Data and Data-Related Resources.
• Data Stewardship
– Data Stewardship is the Formalization of Accountability
Over the Protection of Sensitive Data and Data-Related Resources.
Using Data Governance to Protect Sensitive Data
Defining Data Governance
5
5
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Non-Invasive Data Governance™
– The practice of:
• applying formal accountability & behavior
• through non-invasive roles & responsibilities
• to existing and / or new processes
• to assure that the definition, production & usage of data
• assures regulatory compliance, security, privacy, protection & quality.
– Non-Invasive describes how governance is applied to assure
non-threatening management of valuable data assets.
Using Data Governance to Protect Sensitive Data
Defining Data Governance
• The goal is to be:
 Transparent.
 Supportive.
 Collaborative.
6
6
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Definition of Data Classification
– The act of putting data into a category.
• Definition of Data Handling Rules
– The way data should be controlled according to it’s classification.
Using Data Governance to Protect Sensitive Data
Tips / Techniques for Classifying Data, Defining Data Handling Rules
7
7
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Classification
Significantly improve
Information Lifecycle Management (ILM) processes.
Provide ability to
systemically apply governance in the form of
compliance and risk management.
Using Data Governance to Protect Sensitive Data
Data Classification
8
8
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
– Data Production
– Data Usage
Using Data Governance to Protect Sensitive Data
Data Classification
9
9
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
• Data requirements gathering
• Data definition and associated rules
• Data documentation and metadata
– Data Production
– Data Usage
Using Data Governance to Protect Sensitive Data
Data Classification
10
10
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
– Data Production
• Data sourcing
• Data certification
• Data retention and elimination
– Data Usage
Using Data Governance to Protect Sensitive Data
Data Classification
11
11
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Improve ILM processes and systemically apply governance
– Data Definition
– Data Production
– Data Usage
• Data privacy
• Data regulations
• Data understanding
• Data sharing
Using Data Governance to Protect Sensitive Data
Data Classification
12
12
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Explicit Access Required
– Highly Sensitive
– Sensitive
– Internal Use Only
– Public
• The examples listed on the next few pages are only intended as rough guides.
Specific assets may require a higher or lower classification if they involve
particularly high-risk or low-risk matters.
Using Data Governance to Protect Sensitive Data
Data Classification
13
13
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Explicit Access Required
• This category is reserved for information requiring the highest level of
security. Primarily this is information for which the Company has
contractually agreed to protect from exposure. Information in this
category if exposed would almost certainly lead to significant monetary
and/or reputational loss.
– Examples include:
• Combined sales figures or key metrics such as sales percentages
• Legal actions or pending litigation material
Using Data Governance to Protect Sensitive Data
Data Classification
14
14
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Highly Sensitive
• Information that provides the organization with a very significant
competitive edge or is of such a nature that unauthorized disclosure
would expose the Company to the highest level of risk.
– Examples include:
• Nonpublic customer identifiable information
• Nonpublic personally identifiable employee information such as medical
or bank account information
• Nonpublic information regarding key strategic initiatives and business
plans
• Information including notations, documentation and pricing structure
• Nonpublic financial information about the company
Using Data Governance to Protect Sensitive Data
Data Classification
15
15
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Sensitive
• Nonpublic Company information that if disclosed would pose moderate
risk to the Company.
– Examples include:
• Aggregate customer information or financial information that could be
used to reach conclusions pertaining to company performance.
• Key technical information (diagrams) of systems such as POS, store
systems, etc.
• Product or marketing plans, forecasts
• Intellectual property or internal business practices
• Confidential information received from third parties
• Contracts and contract terms
Using Data Governance to Protect Sensitive Data
Data Classification
16
16
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Internal Use Only
• Information that is not intended to be published externally, but could
cause minor risk to the Company if released to unauthorized people or
entities. Access is limited to employees or other authorized individuals.
– Examples include:
• Corporate policies
• Organization charts
• Access content
• Meeting minutes and agenda
Using Data Governance to Protect Sensitive Data
Data Classification
17
17
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Data Classification Categories – Samples
– Public
• Information that is safe for external posting and is meant for general
information.
– Examples include:
• Public web site information
• Published reports such as corporate earnings
• Annual reports
• Regulatory required communications
Using Data Governance to Protect Sensitive Data
Data Classification
18
18
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
– Clearly state when they can handle the data
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
19
19
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
• Rules associated with how the data can be printed
• Rules associated with how the data can be displayed
• Rules associated with how the data can be transmitted / transferred
• Rules associated with how the data can be discussed
– Clearly state who can handle the data
– Clearly state when they can handle the data
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
20
20
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
• Rules associated with granting permission to receive data
• Rules associated with access to data
• Rules associated with sharing handling rules with receiver
– Clearly state when they can handle the data
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
21
21
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
– Clearly state when they can handle the data
• Rules associated with when the data will be made available
• Rules associated with when the access to the data will be given
• Rules associated with when the access will be taken away
– Clearly state what data can be shared
Using Data Governance to Protect Sensitive Data
Data Handling
22
22
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Benefits of Data Handling Rules
– Clearly state how data must be handled
– Clearly state who can handle the data
– Clearly state when they can handle the data
– Clearly state what data can be shared
• Rules associated with how the data is classified
• Rules associated with who will classify the data
• Rules associated with how the rules will be communicated
Using Data Governance to Protect Sensitive Data
Data Handling
23
23
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules for data classified as:
– Highly Sensitive
– Sensitive
– Internal Use
– Public
Using Data Governance to Protect Sensitive Data
Data Handling
• Handling Rules should include:
– Printing
– Electronic Distribution
– Physical Distribution
– Displaying
– Discussing
24
24
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Highly Sensitive data
• The data should be marked as “HIGHLY SENSITIVE”.
• Access is given based on need-to-know and requires an ID, with quarterly
validation by Data Owners.
• Copying and printing should be minimized. Data must be encrypted when being
stored or transmitted (i.e. emailed, mailed, etc.).
• Data should not be stored or transmitted outside internal facilities/networks
without documented Executive approval.
• Physical copies should be printed only when necessary and stored at internal
locations in locked facilities at all times when not in use.
• VP approval is required for redistribution. Printed copies should be transported by
authorized employees only, and receipt must be confirmed and logged.
• Discussion should occur only on company premises with authorized personnel. This
data should not be discussed over the phone.
Using Data Governance to Protect Sensitive Data
Data Handling
25
25
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Sensitive data
• The data should be marked as “SENSITIVE”.
• Access is given on a need-to-know and requires an ID along with biannual
validation by Data Owners.
• Data must be encrypted when stored or transmitted.
• Physical copies should be printed only when necessary at internal facilities, stored
only at internal locations in locked containers, and shared in private on a need-to-
know basis.
• Physical media should be sent through an accountable commercial delivery service
and the receipt must be confirmed and logged.
• Discussion of the data should be limited to employees, customers, or partners on a
need-to-know basis, only in private outside public hearing.
Using Data Governance to Protect Sensitive Data
Data Handling
26
26
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Internal Use data
• The data should be marked as “INTERNAL USE”.
• System access is granted based on need-to-know and requires an ID.
• The data should be stored only on internal networks/systems or sanctioned cloud
systems.
• Physical copies of the data should be printed only when necessary, stored securely,
and shared on a need-to-know basis.
• Physical media should be sent through an accountable commercial delivery service.
• Discussion of the data should be limited to employees, customers, or partners on a
need-to-know basis.
Using Data Governance to Protect Sensitive Data
Data Handling
27
27
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Handling Rules – example:
– For Public data
• When handling public data, mark it as “PUBLIC”.
• There are no other data handling requirements.
Using Data Governance to Protect Sensitive Data
Data Handling
28
28
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Don’t forget to govern the …
… Definition of Data Classification and Data Handling Rules
… Production of Data Classification and Data Handling Rules
… Usage of Data Classification and Data Handling Rules
Using Data Governance to Protect Sensitive Data
Data Classification and Data Handling
29
29
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Role Levels for Data Governance
– Executive – Steering Committee
– Strategic – Data Governance Council
– Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators
– Operational – Operational Data Stewards (Definers, Producers, Users)
– Support – Data Governance Office (Team), IT, PMO, Legal, Communications …
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
30
30
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK
Endorse
Processes
Resolution
Processes
EXECUTIVE
STRATEGIC
TACTICAL
OPERATIONAL
SUPPORT
Domain
Processes
Daily
Processes
Enforce
Processes
Metric
Approval
Act
Metric
Acceptance
Domain
Metrics
Daily
Measurements
Collect
Report
Metrics
Policy
Directive
Best Practice
Guidelines
Standards
Requirements
Workflow
Glossary
Dictionary
Metadata
KIK Artifacts
(Common Data
Activity Matrices)
Support
Sponsor
Understand
Meetings
Status
Subject
Project
Orientation
On Boarding
Ongoing
Plan
Develop
Deliver
Steering
Committee
(Delegate)
Council
(Decision)
Domain
Stewards
Owners
(Subject)
Data
Stewards
(Daily)
DG Lead
Work Groups
Partners
(Function)
Copyright © 2017 – Robert S. Seiner and KIK Consulting & Educational Services, LLC
LEVEL
EXECUTIVE – SENIOR LEADERSHIP TEAM
STRATEGIC – BUSINESS & TECHNOLOGY
TACTICAL – SUBJECT MATTER EXPERTISE
OPERATIONAL – DAILY JOB FUNCTION
SUPPORT – FUNCTIONAL MANAGEMENT
LEVELS
EXECUTIVE – SENIOR LEADERSHIP TEAM
STRATEGIC – BUSINESS & TECHNOLOGY MGMT
TACTICAL – SUBJECT MATTER EXPERTISE
OPERATIONAL – DAILY JOB FUNCTION
SUPPORT – FUNCTIONAL MANAGEMENT
COMPONENTS
ROLES (AUTHORITY) – FORMAL RESPONSIBILITY
PROCESSES – APPLICATION and ENFORCEMENT
COMMUNICATIONS – EDUC, TRN, AWARENESS
METRICS – MEASUREMENTS and KPIs
TOOLS – ARTIFACTS PURCHASED & DEVELOPED
Levels
Components
ROLES(AUTHORITY)
COMMUNICATIONS
TOOLS
METRICS
PROCESSES
31
31
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
32
32
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
33
33
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Executive – Steering Committee
– Mandate at a high level
– View Data Governance as playing an integral role
– Oversee enforcement of the rules associated with classification and handling
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
34
34
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Strategic – Data Governance Council
– Oversee the protection of sensitive data
– Approve the classification and handling rules
– Support ample communications about protecting sensitive data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
35
35
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators
– Define the rules associated with protecting data
– Communicate the rules associated with protecting data
– Enforce the rules associated with protecting data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
36
36
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Operational – Operational Data Stewards (Definers, Producers, Users)
– Learn the rules associated with protecting sensitive data
– Follow the rules associated with protecting sensitive data
– Share the rules associated with protecting sensitive data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
37
37
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Support – Data Governance Office (Team), IT, PMO, Legal, Communications …
– Guide the efforts to protect sensitive data
– Define the rules associated with protecting sensitive data
– Enforce the rules associated with protecting sensitive data
Using Data Governance to Protect Sensitive Data
Delivering Roles Appropriate for Protecting Sensitive Data
38
38
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• When does Data Sharing take place?
– Hard-copy Reports
– Electronic Reports
– Ad-Hoc Queries
– File Transmissions
– Inter-Office Mail
– Files Acquired
– Data Display
– Conversation
Using Data Governance to Protect Sensitive Data
Selecting Appropriate Data Sharing Processes to Govern
39
39
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• What are Data Sharing processes?
– Defining, validating and approving (D-V-A) rules associated with data sharing
– D-V-A rules for determining who the data can be shared with
– D-V-A rules for determining when the data can be shared
– D-V-A rules for how the data can be physically sharing the data
– D-V-A rules for sharing the rules associated with sharing data
Using Data Governance to Protect Sensitive Data
Selecting Appropriate Data Sharing Processes to Govern
40
40
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
– Learn from your experience
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
41
41
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
• Start with a focused group
• Expand across business function
• Expand across locations and markets
– Identify an appropriate place to start
– Learn from your experience
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
42
42
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
• Depends on the data you are protecting (PII, PHI, IP, …)
• Depends on the level of support for the protecting sensitive data
• Depends on who is sponsoring the effort
– Learn from your experience
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
43
43
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
– Learn from your experience
• Audit your processes and learn from experience
• Measure the time-per-step to see inefficiencies and ineffectiveness
• Recognize people for their participation
• Relate governance efforts to calls for Continuous Improvement
– Over communicate whenever possible
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
44
44
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Rules for Incremental Implementation
– Do not boil the ocean when implementing data governance to protect data
– Identify an appropriate place to start
– Learn from your experience
– Over-communicate whenever possible
• Place reminders of appropriate behavior in appropriate places
• Communicate through existing means
• Create new ways to communicate
– Newsletters
– Bulletin Boards
– Lunch and Learns
– Town Halls
Using Data Governance to Protect Sensitive Data
Incremental Implementation to Protect the Entire Organization
45
45
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
– Education by Group, Function, Location, People
– Data Protection Communication Outlets
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
46
46
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
• Classification Rules Defined, Validated and Approved
• Data Handling Rules Defined, Validated and Approved
• Data Protection Communications Plan
• Data Protection Enforcement Plan
– Education by Group, Function, Location, People
– Data Protection Communication Outlets
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
47
47
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
– Education by Group, Function, Location, People
• Number of Groups, Functions, Locations, People Onboarded
• Percentage of the Organization Onboarded
• Updates to Data Protection Education Materials
– Data Protection Communication Outlets
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
48
48
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• How can Data Governance measure data protection
– Completed Steps of Data Protection
– Education by Group, Function, Location, People
– Data Protection Communication Outlets
• Count of Available Outlets
• Number of Outlets Utilized
• Data Protection Communication Effectiveness
Using Data Governance to Protect Sensitive Data
Measuring Protection to Demonstrate Governance Performance
49
49
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• In this webinar we discussed:
– Tips and techniques for classifying data and defining data handling rules
– Delivering roles appropriate for protecting sensitive data
– Selecting appropriate data sharing processes to govern
– Incremental implementation to protect the entire organization
– Measuring protection to demonstrate governance performance
Using Data Governance to Protect Sensitive Data
Today’s Webinar
50
50
Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com
Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting
#RWDG @RSeiner
• Robert S. Seiner
KIK Consulting & Educational Services – KIKconsulting.com
The Data Administration Newsletter – TDAN.com
Post Office Box 112571, Upper St. Clair, Pennsylvania 15241
412.220.9643,
rseiner@tdan.com
@RSeiner @TDAN_com
Using Data Governance to Protect Sensitive Data
Contact Information

More Related Content

What's hot

Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...
DATAVERSITY
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!
DATAVERSITY
 
Human Factors in Data Governance
Human Factors in Data GovernanceHuman Factors in Data Governance
Human Factors in Data Governance
DATAVERSITY
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
DATAVERSITY
 
DI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics LeaderDI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics Leader
DATAVERSITY
 
Successful Data Governance Models and Frameworks
Successful Data Governance Models and FrameworksSuccessful Data Governance Models and Frameworks
Successful Data Governance Models and Frameworks
DATAVERSITY
 
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management PurgatoryData-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
DATAVERSITY
 
Understanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyUnderstanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance Strategy
DATAVERSITY
 
Lessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply ChainLessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply Chain
DATAVERSITY
 
RWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data GovernanceRWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data Governance
DATAVERSITY
 
Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance Strategies
DATAVERSITY
 
Metadata Strategies - Data Squared
Metadata Strategies - Data SquaredMetadata Strategies - Data Squared
Metadata Strategies - Data Squared
DATAVERSITY
 
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful SwanData-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
DATAVERSITY
 
The Value of Metadata
The Value of MetadataThe Value of Metadata
The Value of Metadata
DATAVERSITY
 
RWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance PolicyRWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance Policy
DATAVERSITY
 
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of ThingsGoverning Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
DATAVERSITY
 
Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!
DATAVERSITY
 
Data archiving, Data Management,
Data archiving, Data Management,Data archiving, Data Management,
Data archiving, Data Management,
jobsref
 
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DATAVERSITY
 
Guidance on Data Management Plans
Guidance on Data Management PlansGuidance on Data Management Plans
Guidance on Data Management Plans
ICPSR
 

What's hot (20)

Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...Master Data Management - Practical Strategies for Integrating into Your Data ...
Master Data Management - Practical Strategies for Integrating into Your Data ...
 
Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!Everybody is a Data Steward – Get Over It!
Everybody is a Data Steward – Get Over It!
 
Human Factors in Data Governance
Human Factors in Data GovernanceHuman Factors in Data Governance
Human Factors in Data Governance
 
Data Governance Best Practices
Data Governance Best PracticesData Governance Best Practices
Data Governance Best Practices
 
DI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics LeaderDI&A Webinar: Top 5 Priorities for an Analytics Leader
DI&A Webinar: Top 5 Priorities for an Analytics Leader
 
Successful Data Governance Models and Frameworks
Successful Data Governance Models and FrameworksSuccessful Data Governance Models and Frameworks
Successful Data Governance Models and Frameworks
 
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management PurgatoryData-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
Data-Ed Webinar: The Seven Deadly Data Sins - Emerging from Management Purgatory
 
Understanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyUnderstanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance Strategy
 
Lessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply ChainLessons Learned from Building a Data Supply Chain
Lessons Learned from Building a Data Supply Chain
 
RWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data GovernanceRWDG Slides: The Stewardship Approach to Data Governance
RWDG Slides: The Stewardship Approach to Data Governance
 
Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance Strategies
 
Metadata Strategies - Data Squared
Metadata Strategies - Data SquaredMetadata Strategies - Data Squared
Metadata Strategies - Data Squared
 
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful SwanData-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
Data-Ed Webinar: Data Quality Strategies - From Data Duckling to Successful Swan
 
The Value of Metadata
The Value of MetadataThe Value of Metadata
The Value of Metadata
 
RWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance PolicyRWDG Webinar: How to Construct a Data Governance Policy
RWDG Webinar: How to Construct a Data Governance Policy
 
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of ThingsGoverning Big Data, Smart Data, Data Lakes, and the Internet of Things
Governing Big Data, Smart Data, Data Lakes, and the Internet of Things
 
Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!Data Leadership - Stop Talking About Data and Start Making an Impact!
Data Leadership - Stop Talking About Data and Start Making an Impact!
 
Data archiving, Data Management,
Data archiving, Data Management,Data archiving, Data Management,
Data archiving, Data Management,
 
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
DAS Slides: Building a Future-State Data Architecture Plan - Where to Begin?
 
Guidance on Data Management Plans
Guidance on Data Management PlansGuidance on Data Management Plans
Guidance on Data Management Plans
 

Similar to Using Data Governance to Protect Sensitive Data

RWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data UnderstandingRWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data Understanding
DATAVERSITY
 
RWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data StewardsRWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data Stewards
DATAVERSITY
 
How to Govern Your Master Data
How to Govern Your Master Data How to Govern Your Master Data
How to Govern Your Master Data
DATAVERSITY
 
Formalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and ProceduresFormalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and Procedures
DATAVERSITY
 
RWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance PerformanceRWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance Performance
DATAVERSITY
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and Compliance
DATAVERSITY
 
RWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data StewardRWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data Steward
DATAVERSITY
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance Tools
DATAVERSITY
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance Policy
DATAVERSITY
 
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data QualityRWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
DATAVERSITY
 
RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata 
DATAVERSITY
 
RWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data GovernanceRWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data Governance
DATAVERSITY
 
RWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information GovernanceRWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information Governance
DATAVERSITY
 
RWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business ProcessesRWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business Processes
DATAVERSITY
 
RWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data GovernanceRWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data Governance
DATAVERSITY
 
Real-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsReal-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework Components
DATAVERSITY
 
Data Governance & Data Steward Certification
Data Governance & Data Steward CertificationData Governance & Data Steward Certification
Data Governance & Data Steward Certification
DATAVERSITY
 
RWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data GovernanceRWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data Governance
DATAVERSITY
 
RWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & ProceduresRWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & Procedures
DATAVERSITY
 
RWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart DataRWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart Data
DATAVERSITY
 

Similar to Using Data Governance to Protect Sensitive Data (20)

RWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data UnderstandingRWDG Webinar: Using Data Governance to Improve Data Understanding
RWDG Webinar: Using Data Governance to Improve Data Understanding
 
RWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data StewardsRWDG Slides: Three Ways to Manage Your Data Stewards
RWDG Slides: Three Ways to Manage Your Data Stewards
 
How to Govern Your Master Data
How to Govern Your Master Data How to Govern Your Master Data
How to Govern Your Master Data
 
Formalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and ProceduresFormalize Data Governance with Policies and Procedures
Formalize Data Governance with Policies and Procedures
 
RWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance PerformanceRWDG: Measuring Data Governance Performance
RWDG: Measuring Data Governance Performance
 
Real-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and ComplianceReal-World Data Governance: Governance Risk and Compliance
Real-World Data Governance: Governance Risk and Compliance
 
RWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data StewardRWDG Webinar Everybody is a Data Steward
RWDG Webinar Everybody is a Data Steward
 
Real-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance ToolsReal-World Data Governance: Build Your Own Data Governance Tools
Real-World Data Governance: Build Your Own Data Governance Tools
 
RWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance PolicyRWDG Slides: Activate Your Data Governance Policy
RWDG Slides: Activate Your Data Governance Policy
 
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data QualityRWDG Slides: Utilize Governance Working Teams to Improve Data Quality
RWDG Slides: Utilize Governance Working Teams to Improve Data Quality
 
RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata RWDG: Data Governance and Three Levels of Metadata 
RWDG: Data Governance and Three Levels of Metadata 
 
RWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data GovernanceRWDG Webinar: Mastering and Master Data Governance
RWDG Webinar: Mastering and Master Data Governance
 
RWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information GovernanceRWDG Slides: Data Governance versus Information Governance
RWDG Slides: Data Governance versus Information Governance
 
RWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business ProcessesRWDG Slides: Applying Governance to Business Processes
RWDG Slides: Applying Governance to Business Processes
 
RWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data GovernanceRWDG Webinar: Align Data Modeling with Data Governance
RWDG Webinar: Align Data Modeling with Data Governance
 
Real-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework ComponentsReal-World Data Governance Webinar: Data Governance Framework Components
Real-World Data Governance Webinar: Data Governance Framework Components
 
Data Governance & Data Steward Certification
Data Governance & Data Steward CertificationData Governance & Data Steward Certification
Data Governance & Data Steward Certification
 
RWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data GovernanceRWDG Webinar: Metadata to Support Data Governance
RWDG Webinar: Metadata to Support Data Governance
 
RWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & ProceduresRWDG Webinar: Writing Data Governance Policies & Procedures
RWDG Webinar: Writing Data Governance Policies & Procedures
 
RWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart DataRWDG Webinar: A Data Governance Framework for Smart Data
RWDG Webinar: A Data Governance Framework for Smart Data
 

More from DATAVERSITY

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
DATAVERSITY
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
DATAVERSITY
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
DATAVERSITY
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
DATAVERSITY
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
DATAVERSITY
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
DATAVERSITY
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
DATAVERSITY
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
DATAVERSITY
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
DATAVERSITY
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
DATAVERSITY
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
DATAVERSITY
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
DATAVERSITY
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
DATAVERSITY
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
DATAVERSITY
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
DATAVERSITY
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
DATAVERSITY
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
DATAVERSITY
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
DATAVERSITY
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
DATAVERSITY
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
DATAVERSITY
 

More from DATAVERSITY (20)

Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
Architecture, Products, and Total Cost of Ownership of the Leading Machine Le...
 
Data at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and GovernanceData at the Speed of Business with Data Mastering and Governance
Data at the Speed of Business with Data Mastering and Governance
 
Exploring Levels of Data Literacy
Exploring Levels of Data LiteracyExploring Levels of Data Literacy
Exploring Levels of Data Literacy
 
Building a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business GoalsBuilding a Data Strategy – Practical Steps for Aligning with Business Goals
Building a Data Strategy – Practical Steps for Aligning with Business Goals
 
Make Data Work for You
Make Data Work for YouMake Data Work for You
Make Data Work for You
 
Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?Data Catalogs Are the Answer – What is the Question?
Data Catalogs Are the Answer – What is the Question?
 
Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?Data Catalogs Are the Answer – What Is the Question?
Data Catalogs Are the Answer – What Is the Question?
 
Data Modeling Fundamentals
Data Modeling FundamentalsData Modeling Fundamentals
Data Modeling Fundamentals
 
Showing ROI for Your Analytic Project
Showing ROI for Your Analytic ProjectShowing ROI for Your Analytic Project
Showing ROI for Your Analytic Project
 
How a Semantic Layer Makes Data Mesh Work at Scale
How a Semantic Layer Makes  Data Mesh Work at ScaleHow a Semantic Layer Makes  Data Mesh Work at Scale
How a Semantic Layer Makes Data Mesh Work at Scale
 
Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?Is Enterprise Data Literacy Possible?
Is Enterprise Data Literacy Possible?
 
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
The Data Trifecta – Privacy, Security & Governance Race from Reactivity to Re...
 
Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?Emerging Trends in Data Architecture – What’s the Next Big Thing?
Emerging Trends in Data Architecture – What’s the Next Big Thing?
 
Data Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and ForwardsData Governance Trends - A Look Backwards and Forwards
Data Governance Trends - A Look Backwards and Forwards
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics2023 Trends in Enterprise Analytics
2023 Trends in Enterprise Analytics
 
Data Strategy Best Practices
Data Strategy Best PracticesData Strategy Best Practices
Data Strategy Best Practices
 
Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?Who Should Own Data Governance – IT or Business?
Who Should Own Data Governance – IT or Business?
 
Data Management Best Practices
Data Management Best PracticesData Management Best Practices
Data Management Best Practices
 
MLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive AdvantageMLOps – Applying DevOps to Competitive Advantage
MLOps – Applying DevOps to Competitive Advantage
 

Recently uploaded

一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理
eaqmokn
 
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani case
 
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
一比一原版(UU毕业证)犹他大学毕业证如何办理
一比一原版(UU毕业证)犹他大学毕业证如何办理一比一原版(UU毕业证)犹他大学毕业证如何办理
一比一原版(UU毕业证)犹他大学毕业证如何办理
taqyea
 
一比一原版(毕业证)一桥大学毕业证如何办理
一比一原版(毕业证)一桥大学毕业证如何办理一比一原版(毕业证)一桥大学毕业证如何办理
一比一原版(毕业证)一桥大学毕业证如何办理
taqyea
 
Kirill Klip GEM Royalty TNR Gold Presentation
Kirill Klip GEM Royalty TNR Gold PresentationKirill Klip GEM Royalty TNR Gold Presentation
Kirill Klip GEM Royalty TNR Gold Presentation
Kirill Klip
 
MECE (Mutually Exclusive, Collectively Exhaustive) Principle
MECE (Mutually Exclusive, Collectively Exhaustive) PrincipleMECE (Mutually Exclusive, Collectively Exhaustive) Principle
MECE (Mutually Exclusive, Collectively Exhaustive) Principle
Operational Excellence Consulting
 
Revolutionizing Surface Protection Xlcoatings Nano Based Solutions
Revolutionizing Surface Protection Xlcoatings Nano Based SolutionsRevolutionizing Surface Protection Xlcoatings Nano Based Solutions
Revolutionizing Surface Protection Xlcoatings Nano Based Solutions
Excel coatings
 
➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐Dpboss Matka Guessing Satta Matka Kalyan Chart Indian Matka
 
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptxEasy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
Fx Lotus
 
Kanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR ReportKanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR Report
Helen Meek
 
Enhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: IntroductionEnhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: Introduction
Cor Verdouw
 
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...
Adani case
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results
 
The Key Summaries of Forum Gas 2024.pptx
The Key Summaries of Forum Gas 2024.pptxThe Key Summaries of Forum Gas 2024.pptx
The Key Summaries of Forum Gas 2024.pptx
Sampe Purba
 
一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理
一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理
一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理
taqyea
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
hello960827
 
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdfNewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
Khaled Al Awadi
 
Call Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl Kolkata
Call Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl KolkataCall Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl Kolkata
Call Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl Kolkata
Yukti Singh
 
japanese language course in delhi near me
japanese language course in delhi near mejapanese language course in delhi near me
japanese language course in delhi near me
heyfairies7
 

Recently uploaded (20)

一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理
一比一原版(lbs毕业证书)英国伦敦商学院毕业证如何办理
 
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
Adani Group's Active Interest In Increasing Its Presence in the Cement Manufa...
 
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Indian Matka Dpboss Matka Guessing Kalyan panel Chart
 
一比一原版(UU毕业证)犹他大学毕业证如何办理
一比一原版(UU毕业证)犹他大学毕业证如何办理一比一原版(UU毕业证)犹他大学毕业证如何办理
一比一原版(UU毕业证)犹他大学毕业证如何办理
 
一比一原版(毕业证)一桥大学毕业证如何办理
一比一原版(毕业证)一桥大学毕业证如何办理一比一原版(毕业证)一桥大学毕业证如何办理
一比一原版(毕业证)一桥大学毕业证如何办理
 
Kirill Klip GEM Royalty TNR Gold Presentation
Kirill Klip GEM Royalty TNR Gold PresentationKirill Klip GEM Royalty TNR Gold Presentation
Kirill Klip GEM Royalty TNR Gold Presentation
 
MECE (Mutually Exclusive, Collectively Exhaustive) Principle
MECE (Mutually Exclusive, Collectively Exhaustive) PrincipleMECE (Mutually Exclusive, Collectively Exhaustive) Principle
MECE (Mutually Exclusive, Collectively Exhaustive) Principle
 
Revolutionizing Surface Protection Xlcoatings Nano Based Solutions
Revolutionizing Surface Protection Xlcoatings Nano Based SolutionsRevolutionizing Surface Protection Xlcoatings Nano Based Solutions
Revolutionizing Surface Protection Xlcoatings Nano Based Solutions
 
➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart
➒➌➎➏➑➐➋➑➐➐ Satta Matta Matka Dpboss Matka Guessing Kalyan panel Chart
 
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptxEasy Earnings Through Refer and Earn Apps Without KYC.pptx
Easy Earnings Through Refer and Earn Apps Without KYC.pptx
 
Kanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR ReportKanban Coaching Exchange with Dave White - Example SDR Report
Kanban Coaching Exchange with Dave White - Example SDR Report
 
Enhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: IntroductionEnhancing Adoption of AI in Agri-food: Introduction
Enhancing Adoption of AI in Agri-food: Introduction
 
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...
Adani Group Requests For Additional Land For Its Dharavi Redevelopment Projec...
 
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan ChartSatta Matka Dpboss Kalyan Matka Results Kalyan Chart
Satta Matka Dpboss Kalyan Matka Results Kalyan Chart
 
The Key Summaries of Forum Gas 2024.pptx
The Key Summaries of Forum Gas 2024.pptxThe Key Summaries of Forum Gas 2024.pptx
The Key Summaries of Forum Gas 2024.pptx
 
一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理
一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理
一比一原版(UCSC毕业证)加州大学圣克鲁兹分校毕业证如何办理
 
deft. 2024 pricing guide for onboarding
deft.  2024 pricing guide for onboardingdeft.  2024 pricing guide for onboarding
deft. 2024 pricing guide for onboarding
 
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdfNewBase 20 June 2024  Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
NewBase 20 June 2024 Energy News issue - 1731 by Khaled Al Awadi_compressed.pdf
 
Call Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl Kolkata
Call Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl KolkataCall Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl Kolkata
Call Girls In Kolkata 🔥 +91-9079923931🔥High Profile Call Girl Kolkata
 
japanese language course in delhi near me
japanese language course in delhi near mejapanese language course in delhi near me
japanese language course in delhi near me
 

Using Data Governance to Protect Sensitive Data

  • 1. 1 1 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Real World Data Governance Using Data Governance to Protect Sensitive Data Monthly Webinar Series Hosted by DATAVERSITY Robert S. Seiner – KIK Consulting / TDAN.com May 17, 2018 – 11:00 a.m. PT / 2:00 p.m. ET
  • 2. 2 2 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Real-World Data Governance Introduction • Real-World Data Governance – Monthly Webinar Series June 21, 2018 – Using Data Governance to Improve Data Understanding July 18, 2018 – Improving Data Analytics with Data Governance Third Thurs @ 2pm EST – Register at TDAN.com, KIKconsulting.com, DATAVERSITY.net • Non-Invasive Data Governance Book ISBN 9781935504856 / Technics Publishing / Amazon.com • Speaking @ Dataversity Events Data Governance & Information Quality (DGIQ) Conference – San Diego – June 11-15, 2018 Data Architecture Summit – Chicago – October 8-11, 2018 • Online Learning Plan Non-Invasive Data Governance - DATAVERSITY Training Center Seven Online Courses with Evaluations • The Data Administration Newsletter (TDAN.com) Twice Monthly – Data Articles, Columns, Blogs and Features Produced by DATAVERSITY – Subscribe for emails • KIK Consulting & Educational Services KIKConsulting.com Home of Non-Invasive Data Governance™
  • 3. 3 3 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • In this webinar we will discuss: – Tips and techniques for classifying data and defining data handling rules – Delivering roles appropriate for protecting sensitive data – Selecting appropriate data sharing processes to govern – Incremental implementation to protect the entire organization – Measuring protection to demonstrate governance performance Using Data Governance to Protect Sensitive Data Agenda for Today’s Webinar
  • 4. 4 4 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Governance – Data Governance is the Execution and Enforcement of Authority Over the Protection of Sensitive Data and Data-Related Resources. • Data Stewardship – Data Stewardship is the Formalization of Accountability Over the Protection of Sensitive Data and Data-Related Resources. Using Data Governance to Protect Sensitive Data Defining Data Governance
  • 5. 5 5 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Non-Invasive Data Governance™ – The practice of: • applying formal accountability & behavior • through non-invasive roles & responsibilities • to existing and / or new processes • to assure that the definition, production & usage of data • assures regulatory compliance, security, privacy, protection & quality. – Non-Invasive describes how governance is applied to assure non-threatening management of valuable data assets. Using Data Governance to Protect Sensitive Data Defining Data Governance • The goal is to be:  Transparent.  Supportive.  Collaborative.
  • 6. 6 6 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Definition of Data Classification – The act of putting data into a category. • Definition of Data Handling Rules – The way data should be controlled according to it’s classification. Using Data Governance to Protect Sensitive Data Tips / Techniques for Classifying Data, Defining Data Handling Rules
  • 7. 7 7 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Classification Significantly improve Information Lifecycle Management (ILM) processes. Provide ability to systemically apply governance in the form of compliance and risk management. Using Data Governance to Protect Sensitive Data Data Classification
  • 8. 8 8 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition – Data Production – Data Usage Using Data Governance to Protect Sensitive Data Data Classification
  • 9. 9 9 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition • Data requirements gathering • Data definition and associated rules • Data documentation and metadata – Data Production – Data Usage Using Data Governance to Protect Sensitive Data Data Classification
  • 10. 10 10 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition – Data Production • Data sourcing • Data certification • Data retention and elimination – Data Usage Using Data Governance to Protect Sensitive Data Data Classification
  • 11. 11 11 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Improve ILM processes and systemically apply governance – Data Definition – Data Production – Data Usage • Data privacy • Data regulations • Data understanding • Data sharing Using Data Governance to Protect Sensitive Data Data Classification
  • 12. 12 12 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Explicit Access Required – Highly Sensitive – Sensitive – Internal Use Only – Public • The examples listed on the next few pages are only intended as rough guides. Specific assets may require a higher or lower classification if they involve particularly high-risk or low-risk matters. Using Data Governance to Protect Sensitive Data Data Classification
  • 13. 13 13 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Explicit Access Required • This category is reserved for information requiring the highest level of security. Primarily this is information for which the Company has contractually agreed to protect from exposure. Information in this category if exposed would almost certainly lead to significant monetary and/or reputational loss. – Examples include: • Combined sales figures or key metrics such as sales percentages • Legal actions or pending litigation material Using Data Governance to Protect Sensitive Data Data Classification
  • 14. 14 14 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Highly Sensitive • Information that provides the organization with a very significant competitive edge or is of such a nature that unauthorized disclosure would expose the Company to the highest level of risk. – Examples include: • Nonpublic customer identifiable information • Nonpublic personally identifiable employee information such as medical or bank account information • Nonpublic information regarding key strategic initiatives and business plans • Information including notations, documentation and pricing structure • Nonpublic financial information about the company Using Data Governance to Protect Sensitive Data Data Classification
  • 15. 15 15 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Sensitive • Nonpublic Company information that if disclosed would pose moderate risk to the Company. – Examples include: • Aggregate customer information or financial information that could be used to reach conclusions pertaining to company performance. • Key technical information (diagrams) of systems such as POS, store systems, etc. • Product or marketing plans, forecasts • Intellectual property or internal business practices • Confidential information received from third parties • Contracts and contract terms Using Data Governance to Protect Sensitive Data Data Classification
  • 16. 16 16 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Internal Use Only • Information that is not intended to be published externally, but could cause minor risk to the Company if released to unauthorized people or entities. Access is limited to employees or other authorized individuals. – Examples include: • Corporate policies • Organization charts • Access content • Meeting minutes and agenda Using Data Governance to Protect Sensitive Data Data Classification
  • 17. 17 17 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Data Classification Categories – Samples – Public • Information that is safe for external posting and is meant for general information. – Examples include: • Public web site information • Published reports such as corporate earnings • Annual reports • Regulatory required communications Using Data Governance to Protect Sensitive Data Data Classification
  • 18. 18 18 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data – Clearly state when they can handle the data – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 19. 19 19 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled • Rules associated with how the data can be printed • Rules associated with how the data can be displayed • Rules associated with how the data can be transmitted / transferred • Rules associated with how the data can be discussed – Clearly state who can handle the data – Clearly state when they can handle the data – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 20. 20 20 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data • Rules associated with granting permission to receive data • Rules associated with access to data • Rules associated with sharing handling rules with receiver – Clearly state when they can handle the data – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 21. 21 21 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data – Clearly state when they can handle the data • Rules associated with when the data will be made available • Rules associated with when the access to the data will be given • Rules associated with when the access will be taken away – Clearly state what data can be shared Using Data Governance to Protect Sensitive Data Data Handling
  • 22. 22 22 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Benefits of Data Handling Rules – Clearly state how data must be handled – Clearly state who can handle the data – Clearly state when they can handle the data – Clearly state what data can be shared • Rules associated with how the data is classified • Rules associated with who will classify the data • Rules associated with how the rules will be communicated Using Data Governance to Protect Sensitive Data Data Handling
  • 23. 23 23 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules for data classified as: – Highly Sensitive – Sensitive – Internal Use – Public Using Data Governance to Protect Sensitive Data Data Handling • Handling Rules should include: – Printing – Electronic Distribution – Physical Distribution – Displaying – Discussing
  • 24. 24 24 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Highly Sensitive data • The data should be marked as “HIGHLY SENSITIVE”. • Access is given based on need-to-know and requires an ID, with quarterly validation by Data Owners. • Copying and printing should be minimized. Data must be encrypted when being stored or transmitted (i.e. emailed, mailed, etc.). • Data should not be stored or transmitted outside internal facilities/networks without documented Executive approval. • Physical copies should be printed only when necessary and stored at internal locations in locked facilities at all times when not in use. • VP approval is required for redistribution. Printed copies should be transported by authorized employees only, and receipt must be confirmed and logged. • Discussion should occur only on company premises with authorized personnel. This data should not be discussed over the phone. Using Data Governance to Protect Sensitive Data Data Handling
  • 25. 25 25 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Sensitive data • The data should be marked as “SENSITIVE”. • Access is given on a need-to-know and requires an ID along with biannual validation by Data Owners. • Data must be encrypted when stored or transmitted. • Physical copies should be printed only when necessary at internal facilities, stored only at internal locations in locked containers, and shared in private on a need-to- know basis. • Physical media should be sent through an accountable commercial delivery service and the receipt must be confirmed and logged. • Discussion of the data should be limited to employees, customers, or partners on a need-to-know basis, only in private outside public hearing. Using Data Governance to Protect Sensitive Data Data Handling
  • 26. 26 26 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Internal Use data • The data should be marked as “INTERNAL USE”. • System access is granted based on need-to-know and requires an ID. • The data should be stored only on internal networks/systems or sanctioned cloud systems. • Physical copies of the data should be printed only when necessary, stored securely, and shared on a need-to-know basis. • Physical media should be sent through an accountable commercial delivery service. • Discussion of the data should be limited to employees, customers, or partners on a need-to-know basis. Using Data Governance to Protect Sensitive Data Data Handling
  • 27. 27 27 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Handling Rules – example: – For Public data • When handling public data, mark it as “PUBLIC”. • There are no other data handling requirements. Using Data Governance to Protect Sensitive Data Data Handling
  • 28. 28 28 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Don’t forget to govern the … … Definition of Data Classification and Data Handling Rules … Production of Data Classification and Data Handling Rules … Usage of Data Classification and Data Handling Rules Using Data Governance to Protect Sensitive Data Data Classification and Data Handling
  • 29. 29 29 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Role Levels for Data Governance – Executive – Steering Committee – Strategic – Data Governance Council – Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators – Operational – Operational Data Stewards (Definers, Producers, Users) – Support – Data Governance Office (Team), IT, PMO, Legal, Communications … Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 30. 30 30 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data NON-INVASIVE DATA GOVERNANCE™ FRAMEWORK Endorse Processes Resolution Processes EXECUTIVE STRATEGIC TACTICAL OPERATIONAL SUPPORT Domain Processes Daily Processes Enforce Processes Metric Approval Act Metric Acceptance Domain Metrics Daily Measurements Collect Report Metrics Policy Directive Best Practice Guidelines Standards Requirements Workflow Glossary Dictionary Metadata KIK Artifacts (Common Data Activity Matrices) Support Sponsor Understand Meetings Status Subject Project Orientation On Boarding Ongoing Plan Develop Deliver Steering Committee (Delegate) Council (Decision) Domain Stewards Owners (Subject) Data Stewards (Daily) DG Lead Work Groups Partners (Function) Copyright © 2017 – Robert S. Seiner and KIK Consulting & Educational Services, LLC LEVEL EXECUTIVE – SENIOR LEADERSHIP TEAM STRATEGIC – BUSINESS & TECHNOLOGY TACTICAL – SUBJECT MATTER EXPERTISE OPERATIONAL – DAILY JOB FUNCTION SUPPORT – FUNCTIONAL MANAGEMENT LEVELS EXECUTIVE – SENIOR LEADERSHIP TEAM STRATEGIC – BUSINESS & TECHNOLOGY MGMT TACTICAL – SUBJECT MATTER EXPERTISE OPERATIONAL – DAILY JOB FUNCTION SUPPORT – FUNCTIONAL MANAGEMENT COMPONENTS ROLES (AUTHORITY) – FORMAL RESPONSIBILITY PROCESSES – APPLICATION and ENFORCEMENT COMMUNICATIONS – EDUC, TRN, AWARENESS METRICS – MEASUREMENTS and KPIs TOOLS – ARTIFACTS PURCHASED & DEVELOPED Levels Components ROLES(AUTHORITY) COMMUNICATIONS TOOLS METRICS PROCESSES
  • 31. 31 31 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 32. 32 32 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 33. 33 33 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Executive – Steering Committee – Mandate at a high level – View Data Governance as playing an integral role – Oversee enforcement of the rules associated with classification and handling Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 34. 34 34 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Strategic – Data Governance Council – Oversee the protection of sensitive data – Approve the classification and handling rules – Support ample communications about protecting sensitive data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 35. 35 35 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Tactical – Data Domain Stewards, Enterprise Data Stewards, Coordinators – Define the rules associated with protecting data – Communicate the rules associated with protecting data – Enforce the rules associated with protecting data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 36. 36 36 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Operational – Operational Data Stewards (Definers, Producers, Users) – Learn the rules associated with protecting sensitive data – Follow the rules associated with protecting sensitive data – Share the rules associated with protecting sensitive data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 37. 37 37 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Support – Data Governance Office (Team), IT, PMO, Legal, Communications … – Guide the efforts to protect sensitive data – Define the rules associated with protecting sensitive data – Enforce the rules associated with protecting sensitive data Using Data Governance to Protect Sensitive Data Delivering Roles Appropriate for Protecting Sensitive Data
  • 38. 38 38 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • When does Data Sharing take place? – Hard-copy Reports – Electronic Reports – Ad-Hoc Queries – File Transmissions – Inter-Office Mail – Files Acquired – Data Display – Conversation Using Data Governance to Protect Sensitive Data Selecting Appropriate Data Sharing Processes to Govern
  • 39. 39 39 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • What are Data Sharing processes? – Defining, validating and approving (D-V-A) rules associated with data sharing – D-V-A rules for determining who the data can be shared with – D-V-A rules for determining when the data can be shared – D-V-A rules for how the data can be physically sharing the data – D-V-A rules for sharing the rules associated with sharing data Using Data Governance to Protect Sensitive Data Selecting Appropriate Data Sharing Processes to Govern
  • 40. 40 40 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start – Learn from your experience – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 41. 41 41 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data • Start with a focused group • Expand across business function • Expand across locations and markets – Identify an appropriate place to start – Learn from your experience – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 42. 42 42 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start • Depends on the data you are protecting (PII, PHI, IP, …) • Depends on the level of support for the protecting sensitive data • Depends on who is sponsoring the effort – Learn from your experience – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 43. 43 43 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start – Learn from your experience • Audit your processes and learn from experience • Measure the time-per-step to see inefficiencies and ineffectiveness • Recognize people for their participation • Relate governance efforts to calls for Continuous Improvement – Over communicate whenever possible Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 44. 44 44 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Rules for Incremental Implementation – Do not boil the ocean when implementing data governance to protect data – Identify an appropriate place to start – Learn from your experience – Over-communicate whenever possible • Place reminders of appropriate behavior in appropriate places • Communicate through existing means • Create new ways to communicate – Newsletters – Bulletin Boards – Lunch and Learns – Town Halls Using Data Governance to Protect Sensitive Data Incremental Implementation to Protect the Entire Organization
  • 45. 45 45 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection – Education by Group, Function, Location, People – Data Protection Communication Outlets Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 46. 46 46 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection • Classification Rules Defined, Validated and Approved • Data Handling Rules Defined, Validated and Approved • Data Protection Communications Plan • Data Protection Enforcement Plan – Education by Group, Function, Location, People – Data Protection Communication Outlets Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 47. 47 47 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection – Education by Group, Function, Location, People • Number of Groups, Functions, Locations, People Onboarded • Percentage of the Organization Onboarded • Updates to Data Protection Education Materials – Data Protection Communication Outlets Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 48. 48 48 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • How can Data Governance measure data protection – Completed Steps of Data Protection – Education by Group, Function, Location, People – Data Protection Communication Outlets • Count of Available Outlets • Number of Outlets Utilized • Data Protection Communication Effectiveness Using Data Governance to Protect Sensitive Data Measuring Protection to Demonstrate Governance Performance
  • 49. 49 49 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • In this webinar we discussed: – Tips and techniques for classifying data and defining data handling rules – Delivering roles appropriate for protecting sensitive data – Selecting appropriate data sharing processes to govern – Incremental implementation to protect the entire organization – Measuring protection to demonstrate governance performance Using Data Governance to Protect Sensitive Data Today’s Webinar
  • 50. 50 50 Copyright © 2018 Robert S. Seiner – KIK Consulting & Educational Services / TDAN.com Non-Invasive Data Governance™ is a trademark of Robert S. Seiner & KIK Consulting #RWDG @RSeiner • Robert S. Seiner KIK Consulting & Educational Services – KIKconsulting.com The Data Administration Newsletter – TDAN.com Post Office Box 112571, Upper St. Clair, Pennsylvania 15241 412.220.9643, rseiner@tdan.com @RSeiner @TDAN_com Using Data Governance to Protect Sensitive Data Contact Information
  翻译: