Chapter 8 - Data Governance Flashcards

(89 cards)

1
Q

what umbrella term is a business function that is the set of policies, procedures and controls that an organization develops to safeguard its information while making it useful and accessible

A

Data Governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What two things are vital for any data governance program?

A

1) Strong Executive/Management support
2) All levels of the org must understand the important of well-governed data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what term describes the act of devloping the POLICIES and PROCEDURES for looking after an organizations data quality, security, privacy and regulatory compliance?

A

Data Stewardship

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which role is RESPONSIBLE for data stewardship?

A

Data Stewards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which role forms the link between technical and non-technical divisions within an organization and works with data owners to establish policies?

A

Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A data owner is usually a ____ business _____ with overall ___________ for a specific data _________

A

A data owner is usually a SENIOR business LEADER with overall RESPOSIBILITY for a specific data DOMAIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WHAT contains data about a particular operational division?

A

data domain or data subject area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which two data roles work with each other to establish policies and procedures for their domain?

A

The DATA OWNER works with the DATA STEWARD to establish/define policies and procedures for their domain?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

if the data owner and data steward establish policies and procedures, which two roles work together to implement those data governance policies?

A

The SUBJECT AREA DATA STEWARD works with the DATA CUSTODIAN to IMPLEMENT the data governance policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which role does the actual implementing or operation of the technical controls execute data governance policies?

A

The DATA CUSTODIAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

which tool is used in data governance to define data categories, descriptions and disclosure implications for data?

A

The DATA CLASSIFICATION MATRIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is vital to consider about the data when developing access requirements to ensure proper data stewardship?

A

data classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the broad classifications of data are agreed between who?

A

The Data Steward and the Data Owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

which two roles work to develop the procedures for granting access to information?

A

The Data Steward and the Subject Area Data Steward

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a role-based access approach facilitates maintenance of __________ and improves _________. I

A

a role-based access approach facilitates maintenance of PERMISSIONS and improves CONSISTENCY.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An org chart can help inform how you develop what in regards to data?

A

roles for role-based access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what policy describes the access requirements data subject area and access type, including reading, creating, updating and deleting?

A

Access Control Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

before sharing data with an outside party, what should you establish with them?

A

A Data Use Agreement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Regarding sharing data with another company, what must you implement if sharing information regarding research on human subjects?

A

An Institutional Review Board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

body that reviews and approves sharing of data regarding research using human subjects.

A

institutional review board

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is essential to understand when drafting a Data Use Agreement?

A

The Data Classification for each piece of data to shared

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The Data Usage Agreement provides details governing what 3 things about the data?

A

The Transfer
The Usage
And Disclosure Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

what are the two most common locations for data-at-rest?

A

Databases and flat files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What do Oracle and Microsoft use to encrypt data and LOG FILES?

A

TDE (Transparent Data Encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Johnny is entering data into a web-form, what should he check before he enters it?
Should check for a padlock icon in the browser.
26
What encryption protocols should you use to encrypt the copying of data between transactional and analytical system in an ETL process?
SFTP or SCP (Secure Copy Protocol)
27
Tilly wants load data into a training data base. She doesn't have any test data and only has production data. She needs to ensure she doesn't copy over sensitive information. What could she do to ensure it doesn't get copied across?
She can implement Data Masking Strategy to ensure sensitive data isn't revealed.
28
Fran is sharing data with an external 3rd party. Some of the data is sensitive. She decides she will de-identify the data to prevent identification. Is this enough?
No. She must consider the re-identification possibilities and remove absolutely every variable that is not needed.
29
What considering storage environment requirements and on a shared drive in particular, what's the safest way to manage share drive permissions to control access to data?
Identifying user groups and create roles for those groups and assigning users to them. | as opposed to file based/individual permissions
30
What's the risk around using cloud-based collaboration by design like Google Docs? What should you considered as a mitigation?
The ability to share documents resides with the individual who created the documents that are collaborated on. You need to ensure there is suitable administrative controls to combat this.
31
When storing data in the cloud, how can you minimize the risk that only authorized people have access to your data (and not the cloud provider!)?
By use of a customer-managed encryption key.
32
Regarding data retention. Bob fires Alice for poor performance. How long is he legally obliged to store her employment data for?
1 year from termination date
33
Regarding data retention, how long are US companies legally obliged to store tax data?
7 years
34
What requirements define how to collect, process, use, store, retain and remove data?
Use Requirements
35
Regarding data retention, apart from legal obligations of retaining data, what other reason would you store data?
You'd store data if it had a particular organizational significant and then use that for statistical trending
36
Which policy describes acceptable locations for storing proprietary information, what do to when data loss occurs, and methods of disposal?
Acceptable Use Policy
37
Freya has recently joined a company and needs to understand what her responsibilities are around accessing and using data. Which policy or document should she be familiar with?
The Acceptable Use Policy
38
which other document would you typically need when crafting an acceptable use policy? Why?
The Data Classification Matrix So you can describe what how the data in each classification should be handled
39
You're creating entity relationship diagrams. Thinking about good data governance, what should you ensure?
That foreign keys are used to implement data constraints
40
Clive is conducting a review of data governance. What diagrams should he check in relation to database design? What should he check for?
Entity Relationship Diagrams He should check for (duplicate data) record linkage and create a linking table to associate the duplicate data to a master record
41
Which 3 standards mentioned in the book simplyify, and help guide you on data classification process?
NIST definitions of Personally Identifiable Information Protected Health Information defined under HIPAA Card Holder Data and Sensitive Authentication Data under PCI
42
Associated the following data elements with either linked or linkable PII passport number state gender full name email address login credentials and passwords race
passport number - linked state - linkable gender - linkable full name - linked email address - linked login credentials and passwords - linked race - linkable
43
How many data elements does HIPAA define as PHI?
18
44
Regarding PHI, the first 3 digits of a zip code are not considered PHI, but when would this change?
If the city in which the zip code applies contains fewer than 20,000 people, it becomes PHI
45
Describe the two provisions in HIPAA for when you need to share patient data without their consent
Expert Determination Safe Harbour
46
Regarding PHI, what is the name of the guidance that HIPAA describes on how digital records of patient data should be handled?
The Security Rule
47
The PHI provisions in HIPAA only apply to what? And what are they?
They only apply to COVERED ENTITIES Covered entities are: most medical facilities
48
What are the implications for a health insurance company if any of the below are processed electronically? Payment and remittance Claims Status Enrollment Referrals Premium payment
They are all e-HPI. The company becomes a COVERED ENTITY and need to implement the Security Rule which applies to e-HPI
49
Medical companies that process patient data may need to work with business partners, for instance to store data. What must they ensure and how is this done?
They must ensure that the provisions set out in HIPAA extend to the business partner. This is done by arranging a Business Associate Agreement.
50
What does a Business Associate Agreement do?
It ensures that any business partner of a company that handles PHI also must abide by HIPAA standard.
51
which three data elements about an individual are not considered PHI by HIPAA?
Employment records Student educations covered by FERPA Deidentified data
52
If you're a data analyst working in a healthcare environment, which two rules do you need to be aware of? What do they define?
The Security Rule - defines how e-PHI data should be handled The Privacy Rule - defines how patient privacy (all other PHI data) should be protected
53
Joni is an analysis working for a medical company and is handling PHI. She's unsure about the rules. Who should she work with to ensure she isn't breaking any rules?
the legal department of the company who specialise in privacy
54
What are the two primary categories of data according to PCI DSS?
CHD (Cardholder Data) SAD (Sensitive Authentication Data)
55
Of the below elements of card data, match the element (cardholder data or sensitive authentication data) to the card data category cardholder name PIN complete track data account number expiration CCV service code
cardholder name - cardholder data PIN - sensitive authentication data complete track data - sensitive authentication data account number - cardholder data expiration - cardholder data CCV - sensitive authentication data service code - cardholder data
56
when thinking through regulatory and legal compliance data governance, what 4 categories around this must you consider about the jurisdiction within which your company operates?
Criminal Law Civil Law Administrative Law Regulations
57
1. VERIFY 2. STOP 3. ASSESS (impact) 4. NOTIFY (parties) 5. CORRECT 6. REVIEW What are these steps for?
Steps that need to be taken following a data breach
58
If a breach notification is triggered in the United states for PHI, what's the rule called and who does list notification requirements for?
It's called the Breach Notification Rule.
59
In the European Union, how long is the breach time notification specified by GDPR?
72 hours.
60
What is the name of the discipline who's goal it is to ensure there's only a single source of truth for SHARED data assets in an organization?
Master Data Management
61
which document that contains information about data structures is essential for MDM to work effectively?
Data Dictionary
62
What are all these drivers for? The need to have consistent information Need to streamline data access Reducing compliance costs Reducing complexity in Mergers and acquisitions
MDM adoption
63
What are the two key MDM processes mentioned in the book?
Translation process (to map external data to your internal structure) Maintaining a data dictionary
64
one of the drivers for MDM is streamlining data access. What was one method mentioned in the book?
The implementation of APIs to access single source of data
65
why does a role-based access control approach make auditing of permissions easier?
Auditors can focus on role assignments instead of individial user permissions
66
term used to describe when you duplicate data in multiple systems
Record Linkage
67
TAble maintained by the MDM system that maps records from multiple systems to a master ID?
Record Linkage Table
68
type of data that balances utility and privacy when handling PII and allows aggragation of data without compromising individual privacy
Linkable data
69
One of two provision in HIPAA when you need to share patient data: involves use of statistical/scientific methods to minimize risk of identifying an individual
Expert Determination
70
One of two provision in HIPAA when you need to share patient data: involves de-identifying a data set by removing any PHI data elements.
SAFE HARBOUR
71
Document that defines an individual's responsibilities when accessing, using, sharing and removing data
Acceptable Usage Policy
72
CCV Complete Track Data PIN Types of data in PCI - DSS
Sensitive Authentication Data
73
Which regulatory notification regarding data privacy states requirements for the below people to follow? individuals the media the Secretary of Health and Human Services
HIPPA's Breach Notification Rule
74
75
Storage costs is one aspected of determining what?
What data should be stored ## Footnote certmaster q. I disagree, It should the org value of the data
76
type of object - permissions are specific to users in that group regardless of the role
User Group
77
aggregated data by group, is a technique used to de-identify data.
BANDING
78
79
Agreement - defines the conditions under which an entity (such as a person or supplier) cannot disclose information to outside parties. | cm
Non-disclosure agreement
80
involves hiding that type of field by showing something else in its place, like an asterisk.
MASKING
81
what should a data scientist pay attention to as data passes through the data life cycle? ## Footnote CM
Accountability ## Footnote Accountability means these policies are being followed, and there are accountability measures in place to ensure the policies are followed.
82
KPI percentage target for critical data ## Footnote cm
95%
83
KPI percentage for data that is important but not critical ## Footnote cm
80%
84
KPI percentage for non-critical data ## Footnote cm
70%
85
MDM data management helps ??? data from multiple systems ## Footnote cm
Consolidate
86
Anotehr word for linking data sets together ## Footnote cm
Consolidation
87
Regarding projects, refining business questions is important to avoid what?
Scope Creep
88
defines how to accomplish the desired state through the development of a project
Scoping | scope includes measurable tasks
89
report for Occupational Safety and Health Administration (OSHA) standards. What type of report is this? Select all that apply Compliance Safety Health Finance
Compliance Safety