0% found this document useful (1 vote)
630 views7 pages

07 Data Governance Policy

This data governance policy establishes standards for classifying, owning, and retaining organizational data at a company. It provides direction on data governance roles and responsibilities. The policy applies to all employee, contractor, user, and third party access and use of company systems, equipment, and data. It aims to protect data confidentiality, integrity, availability, security, and privacy.

Uploaded by

andini eldananty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (1 vote)
630 views7 pages

07 Data Governance Policy

This data governance policy establishes standards for classifying, owning, and retaining organizational data at a company. It provides direction on data governance roles and responsibilities. The policy applies to all employee, contractor, user, and third party access and use of company systems, equipment, and data. It aims to protect data confidentiality, integrity, availability, security, and privacy.

Uploaded by

andini eldananty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Data Governance Policy

To use this template, simply replace the text in dark grey with information customized to your organization. When
complete, delete all introductory or example text and convert all remaining text to black prior to distribution.

Policy Owner Name the person/group responsible for this policy’s management.
Policy Approver(s) Name the person/group responsible for implementation approval of this policy.
Related Policies Name other related enterprise policies both within and external to this manual.
Related Procedures Name other related enterprise procedures both within and external to this manual.
Storage Location Describe physical or digital location of copies of this policy.
Effective Date List the date that this policy went into effect.
Next Review Date List the date that this policy must undergo review and update.

Purpose
Describe the factors or circumstances that mandate the existence of the policy. Also state the policy’s basic
objectives and what the policy is meant to achieve.

This policy establishes uniform data governance standards and identifies the shared responsibilities for assuring
the integrity of the data and that it efficiently and effectively serves the needs of [Company Name]. [Company
Name] values access to timely, accurate, and consistent information while fully appreciating the basic security
and privacy requirements involved. Controlled access by employees to administrative information is necessary
to support business functions.
This policy provides direction on the classification, ownership, and retention of data and information for [Company
Name] as well as clarifying accountability for data and information. Data and information as pertaining to this
policy includes both electronic and non‐electronic data.

[Company Name] is reliant upon the confidentiality, integrity, availability, security, and privacy of its data and
information to successfully conduct its operations, meet internal and external stakeholders expectations, and
provide services. Therefore, all staff, contractors, users, and external parties of [Company Name] have a
responsibility to protect organizational data and information from unauthorized generation, access, modification,
disclosure, transmission, or destruction and are expected to be familiar with and comply with this policy.

Scope
Define to whom and to what systems this policy applies. List the employees required to comply or simply indicate
“all” if all must comply. Also indicate any exclusions or exceptions, i.e. those people, elements, or situations that
are not covered by this policy or where special consideration may be made.

 This policy applies to all critical data and information in [Company Name], including data and information
hosted outside of [Company Name] stored in a cloud service. “Critical data,” in this context, includes
email, personal and shared files, specific application system records, website contents, and operating
system–level information and data. The definition of critical data and scope of this policy will be reviewed
annually. The policy covers the Summary of Information Collected or Produced as listed in Appendix A.

1
Info-Tech Research Group
 This policy applies to [staff] who may be creators and/or users of such data. The policy also applies to
third parties who access and use [Company Name] systems and IT equipment or who create, process, or
store data owned by [Company Name].

Definitions
Define any key terms, acronyms, or concepts that will be used in the policy. A standard glossary approach is
sufficient. Refer to Appendix B for Glossary of Terms.

Governing Laws & Regulations


If applicable, list any laws or regulations that govern the policy or with which the policy must comply. Confirm with
the legal department that the list is full and accurate. If there are no pertinent governing laws or regulations, delete
this section.

Data Governance Roles


The following table provides the roles and responsibilities in relation to this policy at [Company Name]:

Related Data
Role Accountabilities and Responsibilities
Asset(s)
Governance Enterprise  Review and approve the policy on regular basis
Body: [] data
Executive Enterprise  Retain records used in the decision-making process for key decisions to
Board (EB): [] data demonstrate best practice and risk assessment
 Review and approval of this policy and any updates to it as
recommended by the Governance Body
 Ensure ongoing compliance with the [GDPR] in their respective areas of
responsibility
 Ensure oversight of data protection issues either through their own work
or a Data Protection Oversight Committee or other governance
arrangement
 Ensure the Policy mandate to the entire organization
Data Owners Information of  Final approval for protected [Company Name] information
(also known as [Company  Final approval for protected [Company Name] data assets
Trustees): Name] and its  Final approval for [Company Name] data classification schemes
[CFO, CRO, business data  Data governance policy, processes, and procedures
CHR] assets  Ensure the proper usage of data assets within compliance/legal
requirements and [Company Name] internal objectives
 Approve user roles/profiles/classes
 Review access including application data held in network directory
locations
 Responsible for data classification, data retention, and master data
changes
 Ensure availability of information
 Promote the use of data as a strategic asset
 Play a critical sponsorship role in those projects that create or improve
data services pertinent to the data for which the data owner is
accountable
 Provide final decision-making authority to data escalations

2
Info-Tech Research Group
 Product ownership of data services pertinent to the data for which the
data owner is accountable including but not limited to MDM services,
reference data management services, and data quality services
 Maintain data ownership throughout the data or information lifecycle,
from operational system to data lake to analytics
 Approve data standards
 Approve business rule models
Data Stewards: Various  Authorize access to their data assets as per data governance principles
[Dir of specific data and instructions
Marketing, assets  Develop documentation, business rules, data standards, and data
SMEs] pertaining to quality rules for the use and development of their data assets with the
their area of assistance of the subject matter experts and the architects
responsibility  Act as first point of contact for all data governance issues and change
such as HR, control processes for their data assets
payroll,  Assess impact of any high-risk data governance issues and escalate to
reporting, etc. relevant Data Owners with supporting recommendations
 Assist in creating data standards and data operational procedures
 Assist in creating data rules
 Assist in creating data classification schemes
 Define master data and reference data sets and mappings
 Accountable for data glossary and data catalog maintenance and
publication and communication of those artifacts
 Contribute to the creation of data policy and data standards operating
procedures
 Be a data literacy champion within [Company Name]
 Approve data visualizations containing data for which the Data Steward
is responsible
Data Enterprise  Maintain and administer technical security and audit trails of the data
Custodians: data  Responsible for data availability, capacity, accuracy, and consistency
[E.g. maintained by  Oversee and implement data operations and database backup and
Application IT teams, e.g. restore
Developers, data  Responsible for technical standards and policies
ETL Engineers, warehouse
DBA]
Data Protection Enterprise  Lead the data protection compliance and risk management function,
Officer: [E.g. data with responsibility for advising how to comply with applicable privacy
CISO, legislation and regulations, including the [BCB, GDPR]
Compliance  Advise on all aspects of data protection and privacy obligations
Officer]  Monitor and review all aspects of compliance with data protection and
privacy obligations
 Act as a representative of data subjects in relation to the processing of
their personal data
 Report directly on data protection risk and compliance to executive
management

Policy Statements
Describe the rules that compose the policy. This typically takes the form of a series of short prescriptive and
proscriptive statements. Dividing this section into subsections may be required depending on the length or
complexity of the policy.

3
Info-Tech Research Group
1. All corporate data is owned by [Company Name] and, as such, all staff of [Company Name] are
responsible for appropriately respecting and protecting the asset.

2. In order for [Company Name] to effectively manage and safeguard the data assets, procedures must be
in place to guide appropriate data access, ensure the security of the data, and provide a means to
address procedural exceptions.

3. Roles, including both those of individuals with data responsibilities like data ownerships, stewardships,
and custodianships and those of eligible users, are necessary to support data integrity and security.

4. Sharing information across organizational boundaries should be facilitated, where appropriate, in


compliance with the data-sharing policy, where applicable.

5. A sustained data administration function should reinforce a set of definitions for commonly consumed
data, with the understanding that there may be multiple valid definitions.

6. Data integration across [Company Name] should be encouraged to foster data accuracy and uniformity
and to demonstrate an understanding of [Company Name’s] institutional complexity, various data
systems, and differing data formats.

7. Data should be safeguarded to maintain the confidentiality and privacy of personally identifiable
information; such safeguards should be balanced and reflect the necessity for [Company Name] to
conduct its business. Data should be classified based on an agreed-upon data classification scheme and
approved by Data Owners.

8. Access to [Company Name] data should be based on the business needs of the organization and should
enhance the ability of [Company Name] to achieve its mission. Employees should have access to the
data needed to perform their responsibilities, without regard to arbitrary barriers. In many cases, that data
need not be individually identifiable. Follow the data sharing policy guidelines for data usage and sharing
purposes.

9. Before individuals will be allowed to access [Company Name] data, training in the use and attributes of
the data, functional area data policies, and [Company Name] policies regarding data is mandatory.

10. A terminology/taxonomy shall be developed by the [Data Stewardship Advisory Group], or an appropriate
subset, to provide a framework for requesting and producing consistent data across all levels of the
enterprise. The definitions shall be accessible to all [Company Name] data users and shall be included in
training.

11. Data, as a [Company Name] asset, must be safeguarded and managed at all points and across all
systems, from creation to archive, through coordinated efforts and shared responsibilities to ensure its
accuracy. Each functional area will develop and implement processes for identifying and correcting
erroneous or inconsistent data. When and if erroneous or inconsistent data is identified, the [Data
Steward] from the corresponding functional area shall within five business days either correct the data or
escalate the issue to the appropriate Data Owner and [the Data Governance Steering Committee].
Information technology services will develop and implement data auditing processes.

12. Any exceptions to this policy will be fully documented and approved by [the IT Steering Committee].

13. Extraction, manipulation, and reporting of [Company Name] data must be done only for [Company Name]
business purposes:

4
Info-Tech Research Group
 Personal use of [Company Name] data, including derived data, in any format and at any location, is
prohibited.
 Where appropriate, before any information is used outside the Data User's functional unit, verification
with the functional area manager and data owner is recommended.

14. Before decisions are made concerning data retention and data archiving, the appropriate Data Users
must be consulted.

15. Individuals seeking permission to access data outside of the access plan and defined roles must submit a
written request for nonstandard access.

 This request should include a statement indicating the access being sought and the reason for the
request and should be submitted to [the Chair of the Data Governance Steering Committee].
 [The Chair] will send the request to the appropriate Data Steward for review and decision. The Data
Steward will report the decision to the appropriate Data Owner and to the requestor's manager.

Noncompliance
Clearly describe consequences (legal and/or disciplinary) for employee noncompliance with the policy. It may be
pertinent to describe the escalation process for repeated noncompliance.

Violations of this policy will be treated like other allegations of wrongdoing at [Company Name]. Allegations of
misconduct will be adjudicated according to established procedures. Sanctions for noncompliance may include,
but are not limited to, one or more of the following:

1. Disciplinary action according to applicable [Company Name] policies


2. Termination of employment
3. Legal action according to applicable laws and contractual agreements

Agreement
Include a section that confirms understanding and agreement to comply with the policy. Both signatures and
dates are required. A sample statement is provided below.

I have read and understand the [Name of Policy]. I understand that if I violate the rules explained herein, I may
face legal or disciplinary action according to applicable laws or company policy.

___________________________________________
Employee Name

___________________________________________ _______________________________________
Employee Signature Date

5
Info-Tech Research Group
Appendix A: Summary of Data and Information
Rationale/Purpose
Information Category Level of Detail Data Owner
of Data

Appendix B: Standard definitions


Terms Definitions
Content Content is information with relevant metadata that has a specific use or is used for a
particular business purpose.
Metadata Metadata is a set of data that describes and gives information about the data. It is a
description and context of the data. Examples of metadata include:
 Title and description
 Tags and categories
 Who created it and when
 Who last modified and when
 Who can access or update
Data A method or process whereby information/data is classified in accordance with the impact
Classification of data being accessed inappropriately and/or data being lost.

Appendix C: Supporting Documents


The below is a list of policies, procedures, and guidelines that may be used in conjunction with this policy.

 Data Protection Policy


 Data Protection Procedures
 Data Retention Policy
 Asset Disposal Policy
 Data Classification Policy
 Information Security Policy
 Network Security Policy
 Systems Development Life Cycle Policy
 Data Access Management Policy
 Data Handling & Clean Desk Policy
 Data Encryption & Data Anonymization and Pseudonymization Policy
 Privileged User Policy
 IT Architecture Security Management Policy
 Data Protection Incident Response & Breach Notification Policy

6
Info-Tech Research Group
The above list is not exhaustive, and other [Company Name] policies, procedures and standards, and documents
may also be relevant.

Revision History
Date of
Version ID Author Rationale
Change

_____________________________________________________

For acceptable use of this template, refer to Info-Tech's Terms of Use. These documents are intended to supply
general information only, not specific professional or personal advice, and are not intended to be used as a
substitute for any kind of professional advice. Use this document either in whole or in part as a basis and guide for
document creation. To customize this document with corporate marks and titles, simply replace the Info-Tech
information in the Header and Footer fields of this document.

7
Info-Tech Research Group

You might also like