Information Management Standard GEIA-0014 Denise Duncan, LMI March 23, 2010.

Slides:



Advertisements
Similar presentations
Armand Racine Consultant Chemicals Branch
Advertisements

Presented to: By: Date: Federal Aviation Administration Registry/Repository in a SOA Environment SOA Brown Bag #5 SWIM Team March 9, 2011.
Privacy Impact Assessment Future Directions TRICARE Management Activity HEALTH AFFAIRS 2009 Data Protection Seminar TMA Privacy Office.
EMS Checklist (ISO model)
The Impact of Auditing on Records Management Risk and Compliance Susan B. Whitmire, CRM, FAI Manager, Enterprise Records and Information Management BlueCross.
Project Scope Management
What is an M and E Plan?. Organizing the Work of M and E An M and E System -- the 12 components as a whole – Sets out broad vision at national level An.
Data Quality Considerations
OWASP Secure Coding Practices Quick Reference Guide
IS-700.A: National Incident Management System, An Introduction
Presentation by Priyanka Sawarkar
LMI Enterprise Architecture and Information Assurance Integration Approach A Case Study.
© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice HP TRIM HP Information Management.
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Module 12 WSP quality assurance tool 1. Module 12 WSP quality assurance tool Session structure Introduction About the tool Using the tool Supporting materials.
What is GARP®? GARP® is an Acronym for Generally Accepted Recordkeeping Principles ARMA understands that records must be.
Scope of TOGAF ADM The scope of the four architecture domains of TOGAF align very well with the first four rows of the Zachman Framework, as shown in the.
EIM Framework EIM Vision & Strategy EIM Governance EIM Core Processes
Database Development Cycle Track 3: Managing Information Using Database.
1 Archive Access Audit Keys to Effective Compliance Lifecycle Management.
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
Chapter 10: Analyzing Systems Using Data Dictionaries Instructor: Paul K Chen.
Quality evaluation and improvement for Internal Audit
Lecture Nine Database Planning, Design, and Administration
December 3, 2010 SAIF Governance Framework A Brief Update on work to date.
Digitization at the National Archives and Records Administration Doris Hamburg Director, Preservation Programs James Hastings Director, Access Programs.
Enterprise Architecture
SharePoint at SRP Perry Bellaire Content Management Salt River Project 2/9/2010.
Developing Enterprise Architecture
Auditing Logical Access in a Network Environment Presented By, Eric Booker and Mark Ren New York State Comptroller’s Office Network Security Unit.
Sai-innovations.com. Why we care about IA Review of Information Management statistics published by Gartner shows  Information is doubling every 2 years.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Database System Development Lifecycle © Pearson Education Limited 1995, 2005.
Overview of the Database Development Process
Evolving IT Framework Standards (Compliance and IT)
ITEC224 Database Programming
The Challenge of IT-Business Alignment
Roles and Responsibilities
9/14/2012ISC329 Isabelle Bichindaritz1 Database System Life Cycle.
1 Minggu 9, Pertemuan 17 Database Planning, Design, and Administration Matakuliah: T0206-Sistem Basisdata Tahun: 2005 Versi: 1.0/0.0.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter Two ( Data Model) Objectives Introduction to Data Models What are the Data Models Why they are important Learn how to design a DBMS.
FEA DRM Management Strategy Presented by : Mary McCaffery, US EPA.
Categorization Recommendations for Implementing the E-Gov Act of 2002 Richard Huffine U.S. Environmental Protection Agency Co-chair, Categorization Working.
EPA Enterprise Data Architecture Metadata Framework Assessment Kevin J. Kirby, Enterprise Data Architect EPA Enterprise Architecture Team
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
© 2010 Health Information Management: Concepts, Principles, and Practice Chapter 5: Data and Information Management.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
United Nations Oslo City Group on Energy Statistics OG7, Helsinki, Finland October 2012 ESCM Chapter 8: Data Quality and Meta Data 1.
National Public Health Performance Standards Local Assessment Instrument Essential Service:6 Enforce Laws and Regulations that Protect Health and Ensure.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Achieving Semantic Interoperability at the World Bank Designing the Information Architecture and Programmatically Processing Information Denise Bedford.
State of Georgia Release Management Training
Selling Your Service – Creating and promoting your Records Management Policy James Sparrock Tuesday 19 th March 2013.
Session 6: Data Flow, Data Management, and Data Quality.
Accurate  Consistent  Compliant Contact: i4i the structured content company the structured content company.
Enterprise Architectures Course Code : CPIS-352 King Abdul Aziz University, Jeddah Saudi Arabia.
Data Stewardship Lifecycle A framework for data service professionals Protectors of data.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Introduction to DBMS Purpose of Database Systems View of Data
Data Architecture World Class Operations - Impact Workshop.
GEA CoP DRM Briefing for July 13 Meeting with Andy Hoskinson
Data The lowest level of abstraction from which information and knowledge are derived. Any collection of recorded facts, numbers, or datum of any nature.
Health Ingenuity Exchange - HingX
Introduction to DBMS Purpose of Database Systems View of Data
Database Development Cycle
Module P4 Identify Data Products and Views So Their Requirements and Attributes Can Be Controlled Learning Objectives: Understand the value of data. Understand.
Data collection and validation support for the management of the ESF
Fundamental Science Practices (FSP) of the U.S. Geological Survey
Presentation transcript:

Information Management Standard GEIA-0014 Denise Duncan, LMI March 23, 2010

2 Information Management Standard Background Work to data Schedule Your participation

3 IM Standard Background In development by TechAmericas Enterprise Information Management and Interoperability committee –Origins in the group that developed ANSI-GEIA 859, Data Management Standard Need for guidance -- IM is defined differently because of different perspectives –Enterprise Architecture –Data Administration –Content Management –Public Affairs/Corporate Communications –Etc.

4 Developed definitions to scope each activity: Information: A combination of data and the application of rules which is managed and then recorded, classified, organized, related, or interpreted within a certain context. Information Management: The exercise of control over the collection, analysis, organization, storage, security, retrieval, and dissemination of the information assets of an enterprise. It includes the definition, value, and utility of those information assets

5 Definitions to scope each activity Information Architecture: The analysis, design, and application of business processes to data assets within information systems, concentrating on entities, their attributes, and their interrelationships. It enables proper information management. Data Architecture Defines data assets and how they are formatted, organized, moved, used, and stored in an enterprise. It establishes common guidelines for data operations that make it possible to predict, model, measure, and control the flow of data within a system

6 Table of Contents for IM Standard Introductory material –Purpose, Scope of standard –Definition of terms –Other standards referenced Principle1 - Manage information as an Enterprise artifact –Enabler Establish that information belongs to the legal entity that invested in its creation –Enabler Assess Value and Future Value to determine RoI of info

7 Table of Contents for IM Standard Principle 2 - Implement Information Governance appropriate to the value of the information holdings –Enabler Governance should ensure the enterprises information is optimal within its legal and regulatory framework –Enabler Establish IM Policies that enable enterprise organizations to develop processes and systems that comply with policy while enabling efficient operations Sub-Enabler Be aware of policy impacts throughout the information lifecycle (perhaps different policies in different phases) –Enabler Enterprise Architecture

8 Table of Contents for IM Standard Principle 3 - Manage information throughout its Life Cycle –Enabler 3.1 – Information is generated based on valid requirements –Enabler 3.2 – Use of Document and Content Management –Enabler 3.3 – Information processing based on Only Handle Information Once (OHIO)

9 Principle 3, continued –Enabler 3.4 – Design information for retrieval and reuse Sub-Enabler – Metadata Sub-Enabler – Information interoperability Sub-Enabler – Semantically meaningful AND Relevant Sub-Enabler – Bill Of Information Management Sub-Enabler address Information obsolescence – Information loss – information not current

10 Table of Contents for IM Standard Principle 4 - Identify and Manage Authoritative Information Products –Enabler Ensure that information is of a Quality suitable to its use –Sub-Enabler Know the provenance of information products –Sub-Enabler Implement QA/QC on key information artifacts –Sub-Enabler – Design in error management

11 Table of Contents for IM Standard Enabler Make Information Products Trustable Enabler Protect information –Sub-Enabler Introduction to information protection –Sub-Enabler Requirements for protection Enabler Reconcile System life cycle and Information Life cycle relationship –Sub-Enabler – Reconciliation at the System/Tool level and in policy and guidance

12 The Writing Team (in no particular order) –Cynthia Hauer –Joe Roman –Jeannie Sage –Denise Duncan –Jan Lundy –Jim Van Dyke –Sue Kilgore –Bonnie Johnson –Mark Browning –Rachel Verdugo

13 We need more help To write, or to work in partnership with an author, to assist them and keep them on track –Its hard to brainstorm, if you are the only person assigned to an enabler or other section Contact me, or any one of the authors listed on the previous slide Denise Duncan Cell