Information Lifecycle วัฏจักรสารสนเทศ

Slides:



Advertisements
Similar presentations
Organise Workplace Information
Advertisements

Presentation by Priyanka Sawarkar
Chapter 23 Database Security and Authorization Copyright © 2004 Pearson Education, Inc.
Review Questions Business 205
Records and Information Management: An Overview. What are Records? Records - Any recorded information regardless of physical form/characteristics or storage.
Records Management for UW-Madison Employees – An Introduction UW-Madison Records Management UW-Archives & Records Management 2012 Photo courtesy of University.
 Management has become a multi-faceted complex task involving:  Storage Management  Content Management  Document Management  Quota Management.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
Database Management System
…your guide through terrain
Developing a Records & Information Retention & Disposition Program:
Configuration Management
1 From Filing Cabinet to Desktop and Network: Records Management in N.C. State Government Ed Southern Government Records Branch N.C. Office of Archives.
RECORDS MANAGEMENT City of Oregon City “ That was then… this is now!”
Agenda  Overview  Configuring the database for basic Backup and Recovery  Backing up your database  Restore and Recovery Operations  Managing your.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Chapter 1 Database Systems. Good decisions require good information derived from raw facts Data is managed most efficiently when stored in a database.
Records Management Overview. Why? It’s the Law It’s the Law It’s University Policy It’s University Policy Fiscal and Legal Compliance Fiscal and Legal.
Records Liaison Training City of Oregon City. The Role of Records Liaisons As Records Liaison you will:  Be your department’s “point person” for records.
Archiving Where did I put that mail?. Business criticity Importance to manage : –Authenticity –Integrity –Perennity –Compliance High TCO of mail.
Module 9 Configuring Messaging Policy and Compliance.
RECORDS MANAGEMENT Office of Compliance. OBJECTIVES Four main objectives of a Records Management Program: –Increase efficiency of record keeping. –Protection.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
To review information useful in deciding what to do with records that are no longer active. UTA RIMUTA RIM.
File System Management File system management encompasses the provision of a way to store your data in a computer, as well as a way for you to find and.
Module 9 Configuring Messaging Policy and Compliance.
An introduction to records management at Clemson University Records Management Office 139 Anderson Hwy, Suite 100 Clemson, S.C
Advantage of File-oriented system: it provides useful historical information about how data are managed earlier. File-oriented systems create many problems.
DATABASE MANAGEMENT SYSTEMS CMAM301. Introduction to database management systems  What is Database?  What is Database Systems?  Types of Database.
ITGS Databases.
ISO/IEC 27001:2013 Annex A.8 Asset management
An introduction to records management at Clemson University Records Center is located at the Library Depot 103 Clemson Research Blvd Anderson, S.C
03/08/1999UT Austin: GSLIS LIS Information Management LIS /8/99 Martha Richardson.
11 Researcher practice in data management Margaret Henty.
RECORDS MANAGEMENT Office of Business Affairs. OBJECTIVES Four main objectives of a Records Management Program: –Increase efficiency of record keeping.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
Records Management with MOSS, K2, & PsiGen Deepa Patadia
Database Principles: Fundamentals of Design, Implementation, and Management Chapter 1 The Database Approach.
Retention Breakout Session
Defining Electronic Systems
Leveraging the Data Map – A Case Study November 15, 2016
Software Project Configuration Management
Electronic Records Management
Headline Records Retention Policy Information December 2016.
Archiving and Document Transfer Utilities
Application Software Chapter 6.
Database Security and Authorization
Chapter 11: Software Configuration Management
Electronic Records Management Program
Developing Information Systems
Methodology – Physical Database Design for Relational Databases
Section 15.1 Section 15.2 Identify Webmastering tasks
Retain Data Commensurate with Value
Module P6 Principle 6: Establish and Maintain a Management Process for Intellectual Property, Proprietary Information, and Competition-Sensitive Data Learning.
Change Control Module P5 LEARNING OBJECTIVES: LEARNING OUTCOMES
Information System and Management
LO2: Understand Computer Software
Storage & Digital Asset Management CIO Council Update
Database Management System (DBMS)
Chapter 11: Software Configuration Management
Chapter 2: Operating-System Structures
Records Management Level One.
H2.9b Maintain Information
Good Spirit School Division
SDLC Phases Systems Design.
Threats to Privacy in the Forensic Analysis of Database Systems
Outlook and Shared Drives
Chapter 2: Operating-System Structures
Protect data in core business applications
Contract Management Software from ContraxAware Simplify Your Contract Management Process.
Presentation transcript:

Information Lifecycle วัฏจักรสารสนเทศ 9/20/2018

Online transaction processing system Information today comes in wide variety of type, for example it could be: Email message A photograph or Online transaction processing system 9/20/2018

Organization have to know the type of data and how it will be used Understanding of what its evolution and final destiny is likely to be 9/20/2018

9/20/2018

Active data Active data are referenced on a regular basis during day-to-day business operations. 9/20/2018

Data becomes active as soon as it is of interest to an organization Data becomes active as soon as it is of interest to an organization. Data life cycle begins with a business need for acquiring data. The ease of access for users to active data is an absolute necessity in order to run an efficient job 9/20/2018

Over time, this data loses its importance and is accessed less often, gradually losing its business value, and ending with its archival or disposal. 9/20/2018

Inactive Data  Data are put out to archived data once they are no longer active. i.e. there are no longer needed for critical business tasks or analysis.  In past, most enterprises archived data  in Microfilms and tape back-ups. 9/20/2018

Information Lifecycle Management ILM is the practice of applying certain policies to the effective management of information throughout its useful life. 9/20/2018

Records and Information Management (RIM) Professionals for over three decades manage information in paper or other physical forms (microfilm, negatives, photographs, audio or video recordings and other assets). 9/20/2018

Data Life Cycle in Enterprises 9/20/2018

With so much data being held, data, during its lifetime, the data will be moved to different physical location. This is because depending on where it is in lifecycle; it need to be located on the most appropriate storage device. 9/20/2018

ILM is comprised of the policies, processes, practices, and tools used to align the business value of information with the most appropriate and cost effective IT infrastructure. 9/20/2018

ILM includes every phase of a "record" from its beginning to its end. During its existence, information can become a record by being identified as documenting a business transaction or as satisfying a business need. 9/20/2018

Much recorded information may not serve a business need of any sort, but still serves to document a critical point in history or to document an event. Examples of these are birth, death, medical/health and educational records. 9/20/2018

9/20/2018

Phases of ILM Planning Creation and Receipt Organization Use & Distribution Maintenance, protection, & preservation Disposition Evaluation 9/20/2018

Creation and Receipt Deals with records created by a member of an organization at varying levels or receipt of information from an external source. It includes correspondence, forms, reports, drawings, computer input/output, or other sources. 9/20/2018

Organization Libraries need a unique record of all of items that are added to the collection For contracted resources and web resources, links might be provided and created for users Classification and cataloguing generate records of documents or items together with subject access keys such as keyword, subject, descriptor 9/20/2018

Distribution The process of managing the information once it has been created or received. This includes both internal and external distribution, as information that leaves an organization becomes a record of a transaction with others. 9/20/2018

Use Takes place after information is distributed internally, and can generate business decisions, document further actions, or serve other purposes. 9/20/2018

This can include processes such as filing, retrieval and transfers. Maintenance This can include processes such as filing, retrieval and transfers. Filing is actually the process of arranging information and creating a system to manage it for its useful existence within an organization. Failure to establish a good method for filing information makes its retrieval and use nearly impossible. 9/20/2018

Transferring information refers to the process of responding to requests, retrieval from files and providing access to users authorized by the organization to have access to the information. While removed from the files, the information is tracked by the use of various processes to ensure it is returned and/or available to others who may need access to it 9/20/2018

Disposition It is the practice of handling information that is less frequently accessed or has met its assigned retention periods. Less frequently accessed records may be considered for relocation to an 'inactive records facility' until they have met their assigned retention period. 9/20/2018

Retention periods are based on: the creation of an organization-specific retention schedule, and legal requirements for management of information for the industry in which the organization operates. 9/20/2018

If the information has met all of these needs and is no longer considered to be valuable, it should be disposed of by means appropriate for the content. This may include ensuring that others cannot obtain access to outdated or obsolete information as well as measures for protection privacy and confidentiality. 9/20/2018

Technology for ILM 9/20/2018

Information lifecycle Management (ILM) includes process, policies, software and hardware so that the appropriate technology can be used for each phase of the lifecycle of the data which makes it very easy to implement an ILM solution: 9/20/2018

Application It allows various changes to be made to the data without any impact on the application that are using that data. Low cost storage It can take advantage of all the different types of storage devices and the maximum amount of data can be held for the lowest possible cost 9/20/2018

ILM is concerned with all data that is held within an organization. This mean not just structured data, such as orders in a daily transaction system or a history of sales in a data warehouse, but it is also concerned with unstructured data such as email, documents and images. 9/20/2018

Software of ILM provides the capability to store unstructured data such as images and documents. It includes role based security to ensure content is only accessed by authorized personnel and policies which describe what happens to the content during its lifetime 9/20/2018

It can manage and move the data as it evolve during its lifetime, without having to worry about managing multiple types of data stores 9/20/2018

Step 1 define the data classes Implementing ILM Building an Information Management Lifecycle solution can be achieved by the following steps: Step 1 define the data classes Step 2 create storage tiers for the data classes Step 3 Create data access and migration policies Step 4 define and enforce compliance policies 9/20/2018

Step 1 define the data classes The first step is to look at all the data in your organization, what type of data is it, where is stored? and determine: Which data is important, where is it and what needs to be retained How this data flows within the organization 9/20/2018

What happens to this data over time and is it still needed The degree of data availability and protection that is needed Data retention for legal and business requirements 9/20/2018

9/20/2018

Step 2 Create storage tiers for data classes Since IT can take advantage of all the different storage options that are available, the next step is to establish the following storage tiers: High performance Low cost Online archive Offline archive (optional) 9/20/2018

9/20/2018

High performance The high performance storage tier is where all the important and frequently accessed data would be stored, such as the partition holding our Q1 orders. This would utilize the smaller, faster disks on high performance storage devices. 9/20/2018

Low cost The low cost storage tier is where the less frequently accessed data is stored, such as the partitions holding the orders for Q2, Q3 and Q4. This tier would be built using large capacity disks, such as those found in modular storage arrays or the low costs ATA disks, which offer the maximum storage inexpensively. 9/20/2018

Online archive The online archive storage tier is where all the data that is never or hardly accessed would be stored. It is likely to be extremely large and to store the maximum quantity of data on the online archive storage tier, various techniques can be used to compress the data. This tier could be located in the database or it could be in another database, which serves as a central archive database for all information within the enterprise. 9/20/2018

Stored on low cost storage devices like the ATA drives, the data would still be online and available, for a cost that is only slightly higher than storing this information on tape, without all the disadvantages that come with archiving data to tape. If the online archive storage tier is identified as read-only, then it would be impossible to change the data and database backups would not be required after it is backed up the first time. 9/20/2018

Offline archive (optional) The offline archive storage tier is optional, because it is only used when there is a requirement to remove data from the database and store it in some other format such as on a tape 9/20/2018

Step 3 Create data access and migration policies Specify who can access the data and the operations they may perform and how to move the data during its lifetime Managing access to data Migrate data between class Regulatory compliance 9/20/2018

Managing access to data Regulatory requirement are beginning to place exacting demands on how data can be accessed. Effective methods for controlling what authorized users of the database 9/20/2018

Migrate data between classes During the lifecycle of the data it will be necessary to move it at various times and this occurs for variety of reason, such as: For performance, only a limited number of orders are held on the high performance disks 9/20/2018

Data is no longer frequently accessed and is using valuable high performance storage and needs to be moved to a low-cost storage device Legal requirements demand that the information is always available for a given period of time, and it needs to be held safely at the lowest possible cost 9/20/2018

Sometimes individual data items must be moved rather than a group of data. Example, suppose data was classified according to a level of privacy, and a report, which was once secret, is now to be made available to the public. 9/20/2018

If the classification changed from secret to public, and the data was partition on its privacy classification, the row would automatically move to the partition containing public data 9/20/2018

Whenever data is moved from its original source, then it is very important to ensure that the process selected to any regulatory requirement, such as the data cannot be altered, it secure from unauthorized access, easily readable and stored in an approved location 9/20/2018

Regulatory compliance The new regulatory requirement are playing a key role in the long term retention data because they are imposing strict rules on how data is held. Now organizations have to protect against unauthorized changes and possibly show details of very change ever made to a record 9/20/2018

Step 4 Define and enforce compliance policies The fourth step is the creation of compliance policies, which when data is decentralized and fragmented, have to be defined and enforced in every data location, which could easily result in a compliance policy. When defining compliance policies there are five areas to consider: 9/20/2018

Retention Immutability Privacy Auditing Expiration 9/20/2018

Retention policy How the data is to be retained, for how long it must be kept and what happens at life end such as: Record must be stored in its original form, no modification are allowed, it must be kept for 7 years and then may be deleted. 9/20/2018

Immutability ความคงที่ Concerning with proving to an external party that data is complete and has not been modified. Cryptographic signatures can be created and held either inside or outside of the database, to show that data has not been altered or tampered in any way 9/20/2018

Privacy Access to data can be strictly controlled using security policies defined, which define exactly which information a user may see 9/20/2018

Auditing Which specifies the criteria for when audit record should be generated, such as, someone tried to change a salary or attempted to alter a processed order. 9/20/2018

Expire Ultimately, data may expire for business or regulatory reasons and its need to be removed from the database. Since that can involve removing vast quantities, such as all the orders for 1999, the database can remove data very quickly and efficiently by simply dropping the partition, which contains the information identified for removed 9/20/2018

Information lifecycle management for business data, An oracle white paper, June 2007 9/20/2018