This website uses cookies to ensure you have the best experience. Learn more

Data Management Policy Essay

2611 words - 11 pages

UC Policy Library

Data Management Policy
University of Canterbury

Last Modified:
Review Date:
Approved By:
Contact Person:

University Management
August 2009
May 2012
Deputy Vice-Chancellor
Director, Planning, Information and Reporting Unit (PIRU), Extn 6187

The University of Canterbury is currently in a data-oriented environment which promises to become
more complex in the future and place greater demands on those who are responsible for collecting,
managing and disseminating the data. In order to manage our operations and progress in this
challenging environment, this University Data Management Policy has been adopted.
The data generated and ...view middle of the document...

e., excludes departmental
specific and research data etc).
Custodian - a senior position within the University responsible for the collection and
dissemination of data in an information system.
Data - a general term meaning facts, numbers, letters and symbols collected by various means and
processed to produce information.
Data Categories:

Public data - Available to public. No access control or identification is required.
General administrative data (proprietary data) - data for general administration.
Primarily internal usage, not for external distribution e.g., student names, addresses etc.
Protected data - data to be used only by individuals who require it for their jobs EFTS, FTEs, grades, salary bands.
Restricted data - data containing sensitive personal or confidential information,
commercially sensitive information or other information that would usually be regarded
as sensitive information e.g., disabilities, aegrotats, disciplinary proceedings etc.

Data management framework - the organisational structure in place to manage the University’s
data resource.
Data Quality - the accuracy, completeness, validity and currency of data.
Expert - technical expert.
Information - data that have been processed into a meaningful form.
Information System - a system that gathers, condenses and filters data until they become
information, then makes that information available on time and in a useful form for use in decision
making at various levels of management within an organisation.
Steward - the person who has oversight of the use made of data and, as such, the intermediary
between users and experts.
Users - staff who use administrative data as part of their day-to-day work.

Policy Statement:
Those responsible for the University operations must also be responsible for the administrative data
that concerns the University. Maintaining the quality of this data is crucial to maximise the value of
investments that the University has made in data collection and maintenance.
The University of Canterbury is committed to the following principles of data management and
expects adherence to them.

Data Management Policy – University of Canterbury


Principles of Data Management
The following principles of Data Management outline best practices at a high level within the
University which every Data Custodian (below) must be aware of and adhere to in order to ensure
contributions to data quality are being made at all levels within the University.
These principles must guide all data management procedures.

The University, rather than any individual or business unit, owns all data.


Every data source (e.g., Finance, Human Resources Student Administration and Course
Information) must have a defined custodian (a business role) responsible for the accuracy,
integrity, and security of those data.


Wherever possible, data must be simple to enter and must accurately reflect the situation;...

Other Papers Like Data Management Policy

Title Is Awesome Essay

1179 words - 5 pages      Access Control Policy Definition      Business Continuity—Business Impact Analysis (BIA) Policy Definition      Business Continuity & Disaster Recovery Policy Definition      Data Classification Standard & Encryption Policy Definition      Internet Ingress/Egress Traffic Policy Definition      Mandated Security Awareness Training Policy Definition      Production Data Backup Policy Definition      Remote Access Policy Definition

Data Security Essay

1110 words - 5 pages Lara Ramey Southern New Hampshire University OL 442 – Professor David Miller April 25, 2015 Final Paper: Data Security With technology taking over businesses and costs rising higher by the year, having a solid data security policy in place is an extremely beneficial and important part of protecting an organization. Sinrod (2010) discusses how financially damaging data breaches can be for an organization, with an average cost of $6.75

Automation of Risk Management to Reduce Cost and Improve Accuracy

1006 words - 5 pages trusted data on demand that’s immediately digestible. Why the rush to real-time data warehousing? Some of these practices are purely a matter of timely decision making, such as operational business intelligence and frequently refreshed management dashboards. The Hidden PxQ Cost of Risk Management by Spreadsheet Currently, NTEC-IT is utilizing spreadsheets to manage clearance, access and SOX compliance. While spreadsheets are easy to

Management Information System

1038 words - 5 pages involves review, summarization and analysis of data to help plan and control operations and implement policy that has been formulated by upper management. * Information is usually given to middle managers as summarized reports. * Deals with semi structured decisions. (Tactical decisions) * Semi structured decisions that must be made without a base of clearly defined informational procedures. In most cases a semi structured decision is

Itt It255 Unit 4 Aup

1345 words - 6 pages Richman Investments assets. This Acceptable Use Policy in conjunction with the corresponding standards is established to achieve the following: 1. To establish appropriate and acceptable practices regarding the use of information resources. 2. To ensure compliance with applicable State law and other rules and regulations regarding the management of information resources. 3. To educate individuals who may use information resources

It-255 Study Guide Flash Cards

635 words - 3 pages Security Policy A security framework addresses these directives through policies and their supporting elements, such as standards, procedures, baselines, and guidelines.  Data classification standards Helps to determine the appropriate access to classify data.  Configuration control The management of the baseline settings for a system device.  SDLC Design is a primary step  Security

Authorize User Policy

1495 words - 6 pages Example Acceptable Use Policy for IT Systems Using this policy One of the challenges facing organizations today is enabling employees to work productively while also ensuring the security of the IT network and, crucially, the data on it. Given that technology is continually changing, employees play a significant role in IT security. This policy provides a framework for users to follow when accessing IT systems and the data on them. It is

Data Warehousing

2565 words - 11 pages decision makers from middle management upward with information at the correct level of detail to support decision-making. Data warehousing, online analytical processing (OLAP) and data mining provide this functionality. Here, we are to discuss what is all about data warehouse, how it helps to gain a competitive edge for an organization. Data Warehouse - An Introduction A data warehouse is defined as a subject-oriented, integrated

Individual Assignment

2508 words - 11 pages within the policy process is assessed to check what implications it had. It is vital to collect information in this process and give the necessary feedback to the various departments in charge of implementing the policy. (Ile, et al., 2012,) The Department of Human Settlements (DHS) has various systems in place to monitor and evaluate the progress of the housing policy. The DHS has a Project Management Unit which oversees and monitors all projects

Cmgt400 Week 4 Individual

1359 words - 6 pages , implementation, and management requirements are specified by a security policy. It provides targeted guidance by introducing the organization’s fundamental technological and technical philosophies. While not used to establish administrative enforcement, security policies are used to provide a common understanding of the purposes for which employees can utilize technology at the workplace. Security policies provide readily available standards for

Creative Problem Solving

653 words - 3 pages Creative Problem Solving When a company has a problem there are several steps that the management can take to solve these situations. Step one: The company’s management team will identify the problem that the company is currently facing. * Identify the true cause of the problem * Gather all relevant information and data * Analyze the data * Compile a list of essential components Step two: The management team will

Related Essays

Data Retention Policy Essay

2966 words - 12 pages | | |DATA RETENTION POLICY | |Revision 2.0

Is4550 Week 5 Lab Essay

1642 words - 7 pages policy | User destroys data in application and deletes all files | Backup Recovery Policy | Hacker penetrates your IT infrastructure and gains access to your internal network | Threat Assessment & Management Policy | Intra-office employee romance gone bad | Acceptable use Policy | Fire destroys primary data center | Disaster Recovery Policy | Communication circuit outages | Asset management Policy | Workstation OS has a known

Kudler Service Request Essay

1262 words - 6 pages program is to not only provide discounts in-store for customers but through third party incentives. Kudler Fine Foods must use the utmost discretion in choosing what third party services it chooses to affiliate with. It is the responsibility to ensure third party companies have a privacy policy outlined detailing how the company will use the information from Kudler Fine Foods customers. The ethical decisions on data management provide an

Linux Security Essay

448 words - 2 pages Data Security Standard (PCI DSS), Federal Information Security Management Act of 2002, Control Objectives for Information and Related Technology (COBIT). Many or part of these and more must be taken into consideration while putting this project in play. There are a couple of documents: ISO\IEC 17799 and ISO\IEC 27001. The ISO\IEC 17799 IT security technique is the policy for information security management, guidelines, principles for implementing