Technology Policies: Section 1: Technology Policy 6: Data Management
Technology Policies: Section 1: Technology Policy 6: Data Management
TECHNOLOGY POLICIES
SECTION 1: TECHNOLOGY
POLICY 6: DATA MANAGEMENT
This policy sets expectations, obligations and acceptable use practices for when creating,
Policy Rationale consuming, managing or deleting [organisation] information.
Information is a key asset that must be managed, maintained and protected to ensure its
accessibility, reliability and timeliness to support [organisation] business functions.
Data Custodian
Information Technology fulfils the role of data custodians and are responsible for
the security and availability of [organisation] data. They oversee systems used to
collect, manage and provide access to data. Their responsibilities are:
- Maintain physical and system security including server physical security
and user access security as determined by the data steward.
- Ensure adequate system backups are completed and disaster
preparedness and recovery plans exist.
- Ensure adequate system availability and performance
Data Steward
Data stewards are subject matter experts in the related functional area who has
knowledge of the business and the data processes within it. Their responsibilities
include:
- Working with system designers, data/information management experts
and technical experts on data system design that cover data creation,
migration, access management and retention and disposal.
- Implementing and maintain data quality requirements and business rules
for assigned data sets.
- Identifying, managing, mitigating and resolving (where applicable) data
issues, risks and errors.
- Championing and educating their functional area on the use and
application for the data management framework and supporting
documents.
Related Documents
- Data classification Model
- Master Metadata Register
- IT Policy
- Privacy Policy
- Data Management Procedure
(not all related documents will be applicable in all organisations, this list is just an
example of possible documents that could exist)
Policy Owner:
Review Protocol Policy Reviewed By:
Date Reviewed:
Next Review Date: