SlideShare une entreprise Scribd logo
1  sur  31
Télécharger pour lire hors ligne
Proprietary & Confidential
The First Step in EIM
Enterprise Data Management Enables
Unique Device Identification (UDI)
pg 2Proprietary and Confidential
Agenda
Purpose:
Create Understanding of how Enterprise Data
Management can assist in the requirement to
comply with UDI Regulation
An understanding of:
  Data components of UDI
  Enterprise Data Management’s role in UDI
  How to get started
  How to ensuring success
Outcome:
pg 3Proprietary and Confidential
Current Data Challenges
• Analysis of adverse event reports is limited by the fact that the specific devices
involved in an incident are often not known with the required degree of specificity
Lack of a common vocabulary for reporting and enhanced electronic tracking
abilities
• An UDI will enable the FDA and manufacturers to better identify potential problems
or device defects, and improve patient care
Lack of a reliable and consistent identification of medical devices limits
safety surveillance
• Sometimes it is difficult to identify these products.
Issue with counterfeit products in the market
pg 4Proprietary and Confidential
UDI Requirements
•  In the most basic format, the UDI would be a coded
number registered with standards organizations, and
would incorporate a variety of information, including
(but not limited to):
— Manufacturer of the device
— Model of the device
— Expiry dates
— The make
— Any special attributes that the device may possess
Compliance with the UDI Regulation will be mandatory. All
manufacturers of medical devices will be required to comply with
the new UDI methodology
pg 5Proprietary and Confidential
UDI Benefits
•  Reducing medical errors
•  Reporting and assessing device-related
adverse events and product problems
•  Improve product recall, tracking and tracing
•  Standardized identifier defined
•  Efficient traceability
•  Efficient product authentication
•  Less documentation
•  Supply chain efficiency
•  Improve order and invoice process
•  Optimized receiving
•  Increase productivity
•  Improve shelf management
Benefits
pg 6Proprietary and Confidential
[ ENTERPRISE DATA MANAGEMENT ]
pg 7Proprietary and Confidential
Enterprise Information
Management Framework
Provides a holistic view of data in order to manage data as a corporate asset
Enterprise Information Management
Information Strategy
Architecture and Technology Enablement
Content Delivery
Business Intelligence
and Performance
Management
Data Management
Information Asset
Management
GOVERNANCE
ORGANIZATIONAL ALIGNMENT
Content Management
pg 8Proprietary and Confidential
Develop and execute architectures, policies and procedures to manage the full data lifecycle
Enterprise Data Management
Enterprise Data Management
Ensure data is available, accurate, complete and secure
Traditional
& Big Data
Governance
Data Quality
Management
Data Architecture
Data
Retention/Archiving
Master Data
Management
Big Data
Management
Metadata
Management
Reference Data
Management
Privacy/Security
Enterprise Data Management is the foundation to UDI compliance. EDM
ensures data that underlies an organization is available, accurate, complete,
and secure. Architectures, policies, practices, and procedures that manage the
full data lifecycle are developed and executed
pg 9Proprietary and Confidential
[ DATA GOVERNANCE ]
pg 10Proprietary and Confidential
Why Data Governance?
•  Data Governance can play a supportive role in UDI
compliance. Having a unique, consistent, and
persistent entity identification is one of the first
steps in managing data assets.
•  Data Governance can drive the adoption of data
standards e.g. GS1 within your organization.
•  By setting up a data governance organization,
Healthcare value chain stakeholders, including
device manufacturers, distributors and healthcare
providers will benefit immensely
pg 11Proprietary and Confidential
Data Governance Definition
Data Governance is the organizing
framework for establishing strategy,
objectives and policy for effectively
managing corporate data.
It consists of the processes, policies,
organization and technologies required
to manage and ensure the availability,
usability, integrity, consistency, audit
ability and security of your data.
Communication
Data
Strategy
Data Policies
and Processes
Data
Standards
and
Modeling
A Data Governance Program consists of the
inter-workings of strategy, standards,
policies and communication.
pg 12Proprietary and Confidential
Data Governance Framework
•  Vision & Mission
•  Objectives & Goals
•  Alignment with Corporate
Objectives
•  Alignment with Business
Strategy
•  Guiding Principles
•  Statistics and Analysis
•  Tracking of progress
•  Monitoring of issues
•  Continuous Improvement
•  Score-carding
•  Policies & Rules
•  Processes
•  Controls
•  Data Standards & Definitions
•  Metadata, Taxonomy,
Cataloging, and Classification
•  Operating Model
•  Arbiters & Escalation points
•  Data Governance
Organization Members
•  Roles and Responsibilities
•  Data Ownership &
Accountability
•  Collaboration & Information
Life Cycle Tools
•  Data Mastering & Sharing
•  Data Architecture & Security
•  Data Quality & Stewardship
Workflow
•  Metadata Repository
•  Communication Plan
•  Mass Communication
•  Individual Updates
•  Mechanisms
•  Training Strategy
•  Business Impact & Readiness
•  IT Operations & Readiness
•  Training & Awareness
•  Stakeholder Management & Communication
•  Defining Ownership & Accountability
Change
Management
pg 13Proprietary and Confidential
Data Governance Benefits
•  Governing and managing product data changes
•  Managing item attributes and relationships and product
catalogs
•  Defining and approving new items
•  Establishing a repeatable data quality management program
that ensures data accuracy, completeness & auditability
•  Use history and audit trails for security and proof of
compliance
•  Fully documenting data flow processes and their
transformations allows changes and transformations on the
data to be audited and traced back to the original source and
format
•  Fully documenting business and IT processes provides an
integrated view of data assets
•  Increasing efficiencies and effectiveness to enable better
decision-making throughout the health care value chain
•  Developing a common understanding of data management, data
classification data security, and access to and appropriate
usage of data
Benefits
pg 14Proprietary and Confidential
[ DATA QUALITY ]
pg 15Proprietary and Confidential
Why Data Quality?
•  Data quality management provides reliable data that
satisfies the business functions and technical
requirements of the enterprise to meet UDI
compliance
•  A data quality management program that ensures
accuracy, completeness, auditability and traceability
of UDI data. This ensures that UDI data has high
quality stays clean
•  Having a DQ process will ensure that the UDI
standards that have been implemented can be
monitored and reported on
pg 16Proprietary and Confidential
Data Quality Definition and
Dimensions
Dimension Key Questions Impact
Completeness   Is all appropriate information readily available?
  Are data values missing or in an unusable state?
  Incomplete data can cause major gaps in data analysis which
results in increased manual manipulation and reconciliation
Conformity   Are there expectations that data values need to
reside in specified formats?
  If so, do all values conform to those formats?
  By not maintaining conformance to specific data formats, there is
an increased chance for data misrepresentation, conflicting
presentation results, discrepancies when creating aggregated
reporting, as well as difficulty in establishing key relationships
Consistency   Is there conflicting information about the same
underlying data object in multiple data
environments?
  Are values consistent across all data sources?
  Data inconsistencies represent the number one root cause in data
reconciliation between different systems and applications. A
significant amount of time by business groups is being consumed
with manual manipulation and reconciliation efforts
Accuracy   Do data objects accurately represent the “real-
world” business values they are expected to
model?
  Incorrect or stale data, such as customer address, product
information, or policy information, can impact downstream
operational and analytical processes
Duplication   Are there multiple, unnecessary representations
of the same data objects within a given data set?
  The inability to maintain a single representation for each entity,
such as agent name or contact information (across all component
business systems), leads to data redundancy and inconsistency, as
well as increased complexity in terms of reconciliation
Integrity   Which data elements are missing important
relationship linkages that would result in a
disconnect between two data sources?
  The inability to link related records together can increase both
the complexity and accuracy of any corresponding business
intelligence derived from those sources. It directly correlates to
the level of trust the business has in the data
Timeliness   Is data available for use as specified and in the
time frame in which it was expected?
  The timeliness of data is extremely important. Data delayed in
data denied. Could lead to reporting delays, providing slate
information to customers and making decisions based stale data
pg 17Proprietary and Confidential
Why is Data Quality Important?
•  Organizations of all sizes and in all industries are
recognizing the importance of high-quality data and
the critical role of data quality in information
governance and stewardship driven by broader
enterprise information management initiatives –
Gartner
•  The Rule of Ten: If it costs $1 to complete a simple
operation when all the data is perfect, then it costs
$10 when it is not Achieving Business Success Through a Commitment to High –
Quality Data (TDWI Report Series), Wayne Eckerson
Data is a valuable Corporate Asset
pg 18Proprietary and Confidential
Data Quality Value Proposition
Business Value
• Trusted version data for adverse reporting and
decision making
• Enabling data integrity and integration for UDI
compliance
• Operational efficiencies and on-time delivery, by
elimination of manually-intensive activities, and
reducing error-prone data integration processes
• Collaboration with internal and external data
sources by synchronization and consistency of
enterprise data across various business functions
and business channels
• Maximizing product and services revenue by
offering integrated solutions across business
units, as well as intelligent offerings of services
• Driving costs of bad data out of the system
• Responsiveness to new business opportunities
• Providing “plug and play” capabilities to
consolidate as well as extend IT architecture
• Ability to rapidly assimilate new data elements
into enterprise processes
Technology Enablement
• Integration of data across siloed IT solutions
• Ensuring the quality of the data being delivered
enhances the value of data integration
investments
• Capability of integrating to a single architecture
and solution
• Recognized as part of the driven force for master
data management and information governance
initiatives
• Support for service oriented architecture (SOA)
ensures the data quality capabilities can be
deployed and consumed as services and provides
a flexible, scalable environment for data to move
through the enterprise
• Ability to quickly produce high quality data that
is easily understood by functional users and
management and can generate cost savings in
both time dedicated to reacting and diagnosing
data quality problems and re-entering incorrect
data
pg 19Proprietary and Confidential
[ MASTER DATA MANAGEMENT ]
pg 20Proprietary and Confidential
What is Product Information
Management (PIM) ?
Ventana Research
Product Information Management (PIM) is the practice of using information and
technology to effectively support people and product related processes across the
enterprise supply chain throughout the life of a company’s products.
A PIM Data Hub is an enterprise data management solution that enables
centralization of all product information from various systems, creating a single
view of product information that can be leveraged across all Lines of Businesses,
Business Units and functional areas.
A PIM Data Hub can also be refereed as the MDM for Product data
pg 21Proprietary and Confidential
PIM Information Supply Chain
Source: Riversand
pg 22Proprietary and Confidential
Why PIM ?
•  A PIM Data Hub enables centralization of all UDI
product information from various systems, creating a
single view of product information that can be
leveraged across all Lines of business, trading
partners and UDI compliance
•  Having a centralized place to manage and govern UDI
data ensures you can manage continually changing
data and is of importance to UDI compliance
•  Ensure that your organization has the capabilities to
create and manage the required product information
data to comply with UDI
pg 23Proprietary and Confidential
Data Governance, MDM, DQ
Work Together
Provide Guidance
Track Progress
Create & Enforce Policies
Provide Feedback
DQ
Discovery & Profiling
Cleansing, Duplicate Detection
Workflow, Data Sharing,
Maintenance, Synchronization
Measurements & Monitoring
PIM
Product Data Creation
Hierarchy Management/
Relationships
Media Asset Management
Integration & aggregation
Auto Generation (Description
Generation)
History & Audit Trail
Data Governance
Standardized Methods Data
Definition and Business Rules
Roles and Responsibilities
Decision Rights
Arbiters and Escalation
Statistics / Analysis /
Monitoring
pg 24Proprietary and Confidential
[ GETTING STARTED ]
pg 25Proprietary and Confidential
Getting Started
  Start with Data
Governance
•  Establish a council
•  Identify and train Data
Stewards
•  Engage stakeholders from
the different business units
e.g. compliance, IT, legal,
supply chain, product
management,
manufacturing, etc. to plan
and prepare for compliance
readiness
•  Data quality and
stewardship plays a
critical role in the
management of
product data
•  Create a data quality
process to ensure that
the device data has
the highest data
quality
•  Leverage an existing device project or
start a new project to test the
requirements
•  Select a device or a set of devices to test
the process from start to finish. Identify
data sources
•  Test the device from manufacturing to
distribution using the UDI requirements
•  Address data issues & refine the strategy
•  Perform data profiling to clean the data
•  Identify processes that are producing
inconsistent device data and refine them
•  Clarify data definitions and business rules
•  Define data standards
•  Integrate data standards into IT processes
•  Measure and monitor quality over time
•  If the test is successful add more devices
based on the prioritized strategy
Ensure Organizational
Readiness
Set up a Data Quality
Program
Conduct a Pilot
pg 26Proprietary and Confidential
[ ENSURING SUCCESS ]
pg 27Proprietary and Confidential
Clean
Govern
Consolidate
Share
Product Information Lifecycle
Management
PIM
•  Capture all product attributes and
relationships in a single data model
•  Create a universal ID for each product and
build a cross reference to each connected
system
•  Provide the golden product record and
selected attributes to all applications and
analytical systems
•  Enable product data availability as web
services to support service-oriented
architectures (SOAs)
•  Search product data via an integration
repository
•  Report using template-based XML to publish
information in multiple formats
•  Standardize key product data attributes
•  Match and de-dupe to create a single "blended"
record
•  Validate data thru description-generation rules
•  Auto-generate item numbers and descriptions
•  Govern and control product data changes
•  Manage item attributes and relationships
•  Manage product catalogs
•  Apply changes to groups of items meeting
specific criteria
•  Leverage full history and audit trails for
security and proof of compliance
•  Create configurable workflow-driven
product change processes
•  Define and approve new items
•  Import data from spreadsheets for data maintenance
•  Leverage bulk imports through staging tables
•  Integrate using standards-compliant business services and adapters
•  Create a blended product record from multiple sources
pg 28Proprietary and Confidential
Ensuring Success
•  The following factors are usually evident in a successful
program:
  First create a strategy and then follow it (agreed on starting point and
steps necessary)
  Ensure solid alignment between Business and IT
  Identify and assess the importance of key people and/or groups
  Clearly defined and measureable success criteria
  Small iterations versus all or nothing
  Executive sponsorship is critical
  Really know your data
  Leverage prior experience/work…don’t re-invent the wheel
  Plan for time and resources required for manual reconciliation
  Communicate, Communicate, Communicate
pg 29Proprietary and Confidential
Keys to Success
Successful
Implementation!
Technology
Process
People
Failed
Implementation!
Technology
Process
People
pg 30Proprietary and Confidential
First San Francisco Partners
•  Data Governance Assessments and
Strategies
•  Business Case and ROI Development
•  Alignment Workshops
•  Training and Education programs
•  On-going Business support
•  Data Governance Performance
Management
•  Program Management
•  Data Architecture Assessments
and Strategies
•  Data Quality Assessments and
Strategies
•  Technology Vendor Analysis
and Evaluation
•  MDM and DQ Implementation
First San Francisco Partners is entirely focused on helping our
Customers leverage data as value-producing asset through improved
Data Governance and technology. We are a group of experts from the
industry who can help you create a strategy, align your organization
and deliver business value in both the short and the longer terms. We
do this via:
Facilitation, Enablement, Empowerment
pg 31Proprietary and Confidential
[ SECTION TITLE ]
Proprietary & Confidential
[ QUESTIONS? ]

Contenu connexe

Tendances

Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data ManagementBhavendra Chavan
 
Data Governance Maturity Model
Data Governance Maturity ModelData Governance Maturity Model
Data Governance Maturity ModelBasuki Rahmad
 
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...DATAVERSITY
 
Revolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experienceRevolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experiencePaul Dyksterhouse
 
Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...
Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...
Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...DATAVERSITY
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?Precisely
 
Data-Ed Online: Unlock Business Value through Reference & MDM
Data-Ed Online: Unlock Business Value through Reference & MDMData-Ed Online: Unlock Business Value through Reference & MDM
Data-Ed Online: Unlock Business Value through Reference & MDMDATAVERSITY
 
Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesDATAVERSITY
 
How to Implement Data Governance Best Practice
How to Implement Data Governance Best PracticeHow to Implement Data Governance Best Practice
How to Implement Data Governance Best PracticeDATAVERSITY
 
Data-Ed Online: Data Management Maturity Model
Data-Ed Online: Data Management Maturity ModelData-Ed Online: Data Management Maturity Model
Data-Ed Online: Data Management Maturity ModelDATAVERSITY
 
Enterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsEnterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsSheldon McCarthy
 
Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...
Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...
Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...DATAVERSITY
 
The Business Value of Metadata for Data Governance
The Business Value of Metadata for Data GovernanceThe Business Value of Metadata for Data Governance
The Business Value of Metadata for Data GovernanceRoland Bullivant
 
The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...Pieter De Leenheer
 
3 Keys To Successful Master Data Management - Final Presentation
3 Keys To Successful Master Data Management - Final Presentation3 Keys To Successful Master Data Management - Final Presentation
3 Keys To Successful Master Data Management - Final PresentationJames Chi
 
EIM Presentation 2016
EIM Presentation 2016EIM Presentation 2016
EIM Presentation 2016John Bao Vuu
 
Data-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success StoriesData-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success StoriesDATAVERSITY
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkPrecisely
 

Tendances (20)

Enterprise Data Management
Enterprise Data ManagementEnterprise Data Management
Enterprise Data Management
 
Data Governance Maturity Model
Data Governance Maturity ModelData Governance Maturity Model
Data Governance Maturity Model
 
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
How Ally Financial Achieved Regulatory Compliance with the Data Management Ma...
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Revolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experienceRevolution In Data Governance - Transforming the customer experience
Revolution In Data Governance - Transforming the customer experience
 
Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...
Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...
Data-Ed Webinar: Implementing the Data Management Maturity Model (DMM) - With...
 
You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 
Data-Ed Online: Unlock Business Value through Reference & MDM
Data-Ed Online: Unlock Business Value through Reference & MDMData-Ed Online: Unlock Business Value through Reference & MDM
Data-Ed Online: Unlock Business Value through Reference & MDM
 
Data-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance StrategiesData-Ed Webinar: Data Governance Strategies
Data-Ed Webinar: Data Governance Strategies
 
How to Implement Data Governance Best Practice
How to Implement Data Governance Best PracticeHow to Implement Data Governance Best Practice
How to Implement Data Governance Best Practice
 
Data-Ed Online: Data Management Maturity Model
Data-Ed Online: Data Management Maturity ModelData-Ed Online: Data Management Maturity Model
Data-Ed Online: Data Management Maturity Model
 
Enterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial InstitutionsEnterprise Data Governance for Financial Institutions
Enterprise Data Governance for Financial Institutions
 
Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...
Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...
Enterprise Data World Webinars: Master Data Management: Ensuring Value is Del...
 
The Business Value of Metadata for Data Governance
The Business Value of Metadata for Data GovernanceThe Business Value of Metadata for Data Governance
The Business Value of Metadata for Data Governance
 
The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...The Data Driven University - Automating Data Governance and Stewardship in Au...
The Data Driven University - Automating Data Governance and Stewardship in Au...
 
3 Keys To Successful Master Data Management - Final Presentation
3 Keys To Successful Master Data Management - Final Presentation3 Keys To Successful Master Data Management - Final Presentation
3 Keys To Successful Master Data Management - Final Presentation
 
Data Governance for Enterprises
Data Governance for EnterprisesData Governance for Enterprises
Data Governance for Enterprises
 
EIM Presentation 2016
EIM Presentation 2016EIM Presentation 2016
EIM Presentation 2016
 
Data-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success StoriesData-Ed Webinar: Data Quality Success Stories
Data-Ed Webinar: Data Quality Success Stories
 
Improve IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in SplunkImprove IT Security and Compliance with Mainframe Data in Splunk
Improve IT Security and Compliance with Mainframe Data in Splunk
 

Similaire à Enterprise Data Management Enables Unique Device Identification (UDI)

Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 
Data Governance: From speed dating to lifelong partnership
Data Governance: From speed dating to lifelong partnershipData Governance: From speed dating to lifelong partnership
Data Governance: From speed dating to lifelong partnershipPrecisely
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkKannan Subbiah
 
Introduction to Data Governance
Introduction to Data GovernanceIntroduction to Data Governance
Introduction to Data GovernanceJohn Bao Vuu
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Vishal Bamba
 
Building Rules for Data Governance
Building Rules for Data GovernanceBuilding Rules for Data Governance
Building Rules for Data GovernancePrecisely
 
Data Virtualization for Business Consumption (Australia)
Data Virtualization for Business Consumption (Australia)Data Virtualization for Business Consumption (Australia)
Data Virtualization for Business Consumption (Australia)Denodo
 
DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts Angela Boyd
 
Using information management to support data driven actions
Using information management to support data driven actionsUsing information management to support data driven actions
Using information management to support data driven actionsManoj Vig
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data GovernanceBhavendra Chavan
 
You Need a Data Catalog. Do You Know Why?
 You Need a Data Catalog. Do You Know Why? You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?Precisely
 
DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...
DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...
DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...DATAVERSITY
 
Akili Oil & Gas Data Practice - PPDM
Akili Oil & Gas Data Practice - PPDMAkili Oil & Gas Data Practice - PPDM
Akili Oil & Gas Data Practice - PPDMrnaramore
 
Data Governance Strategies for Public Sector
Data Governance Strategies for Public SectorData Governance Strategies for Public Sector
Data Governance Strategies for Public SectorPrecisely
 
The New Age Data Quality
The New Age Data QualityThe New Age Data Quality
The New Age Data QualityRanjeet202050
 
Data Quality: The Cornerstone Of High-Yield Technology Investments
Data Quality: The Cornerstone Of High-Yield Technology InvestmentsData Quality: The Cornerstone Of High-Yield Technology Investments
Data Quality: The Cornerstone Of High-Yield Technology InvestmentsshaileshShetty34
 
TekMindz Master Data Management Capabilities
TekMindz Master Data Management CapabilitiesTekMindz Master Data Management Capabilities
TekMindz Master Data Management CapabilitiesAkshay Pandita
 
Data Democratization and AI Drive the Scope for Data Governance
Data Democratization and AI Drive the Scope for Data GovernanceData Democratization and AI Drive the Scope for Data Governance
Data Democratization and AI Drive the Scope for Data GovernancePrecisely
 

Similaire à Enterprise Data Management Enables Unique Device Identification (UDI) (20)

Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 
Data Governance: From speed dating to lifelong partnership
Data Governance: From speed dating to lifelong partnershipData Governance: From speed dating to lifelong partnership
Data Governance: From speed dating to lifelong partnership
 
Developing & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance FrameworkDeveloping & Deploying Effective Data Governance Framework
Developing & Deploying Effective Data Governance Framework
 
RungananW-DA&DG 201701 V2.0
RungananW-DA&DG 201701 V2.0RungananW-DA&DG 201701 V2.0
RungananW-DA&DG 201701 V2.0
 
Introduction to Data Governance
Introduction to Data GovernanceIntroduction to Data Governance
Introduction to Data Governance
 
Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1Strata NYC 2015 - Transamerica and INFA v1
Strata NYC 2015 - Transamerica and INFA v1
 
Building Rules for Data Governance
Building Rules for Data GovernanceBuilding Rules for Data Governance
Building Rules for Data Governance
 
Data Virtualization for Business Consumption (Australia)
Data Virtualization for Business Consumption (Australia)Data Virtualization for Business Consumption (Australia)
Data Virtualization for Business Consumption (Australia)
 
DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts DGIQ 2013 Learned and Applied Concepts
DGIQ 2013 Learned and Applied Concepts
 
Using information management to support data driven actions
Using information management to support data driven actionsUsing information management to support data driven actions
Using information management to support data driven actions
 
Workable Enteprise Data Governance
Workable Enteprise Data GovernanceWorkable Enteprise Data Governance
Workable Enteprise Data Governance
 
You Need a Data Catalog. Do You Know Why?
 You Need a Data Catalog. Do You Know Why? You Need a Data Catalog. Do You Know Why?
You Need a Data Catalog. Do You Know Why?
 
Why data governance is the new buzz?
Why data governance is the new buzz?Why data governance is the new buzz?
Why data governance is the new buzz?
 
DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...
DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...
DataEd Slides: Unlock Business Value Using Reference and Master Data Manageme...
 
Akili Oil & Gas Data Practice - PPDM
Akili Oil & Gas Data Practice - PPDMAkili Oil & Gas Data Practice - PPDM
Akili Oil & Gas Data Practice - PPDM
 
Data Governance Strategies for Public Sector
Data Governance Strategies for Public SectorData Governance Strategies for Public Sector
Data Governance Strategies for Public Sector
 
The New Age Data Quality
The New Age Data QualityThe New Age Data Quality
The New Age Data Quality
 
Data Quality: The Cornerstone Of High-Yield Technology Investments
Data Quality: The Cornerstone Of High-Yield Technology InvestmentsData Quality: The Cornerstone Of High-Yield Technology Investments
Data Quality: The Cornerstone Of High-Yield Technology Investments
 
TekMindz Master Data Management Capabilities
TekMindz Master Data Management CapabilitiesTekMindz Master Data Management Capabilities
TekMindz Master Data Management Capabilities
 
Data Democratization and AI Drive the Scope for Data Governance
Data Democratization and AI Drive the Scope for Data GovernanceData Democratization and AI Drive the Scope for Data Governance
Data Democratization and AI Drive the Scope for Data Governance
 

Dernier

Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramMoniSankarHazra
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Callshivangimorya083
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...shivangimorya083
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysismanisha194592
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightDelhi Call girls
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Delhi Call girls
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 

Dernier (20)

Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Capstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics ProgramCapstone Project on IBM Data Analytics Program
Capstone Project on IBM Data Analytics Program
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
꧁❤ Greater Noida Call Girls Delhi ❤꧂ 9711199171 ☎️ Hard And Sexy Vip Call
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...Vip Model  Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
Vip Model Call Girls (Delhi) Karol Bagh 9711199171✔️Body to body massage wit...
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 nightCheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
Cheap Rate Call girls Sarita Vihar Delhi 9205541914 shot 1500 night
 
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
Best VIP Call Girls Noida Sector 22 Call Me: 8448380779
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 

Enterprise Data Management Enables Unique Device Identification (UDI)

  • 1. Proprietary & Confidential The First Step in EIM Enterprise Data Management Enables Unique Device Identification (UDI)
  • 2. pg 2Proprietary and Confidential Agenda Purpose: Create Understanding of how Enterprise Data Management can assist in the requirement to comply with UDI Regulation An understanding of:   Data components of UDI   Enterprise Data Management’s role in UDI   How to get started   How to ensuring success Outcome:
  • 3. pg 3Proprietary and Confidential Current Data Challenges • Analysis of adverse event reports is limited by the fact that the specific devices involved in an incident are often not known with the required degree of specificity Lack of a common vocabulary for reporting and enhanced electronic tracking abilities • An UDI will enable the FDA and manufacturers to better identify potential problems or device defects, and improve patient care Lack of a reliable and consistent identification of medical devices limits safety surveillance • Sometimes it is difficult to identify these products. Issue with counterfeit products in the market
  • 4. pg 4Proprietary and Confidential UDI Requirements •  In the most basic format, the UDI would be a coded number registered with standards organizations, and would incorporate a variety of information, including (but not limited to): — Manufacturer of the device — Model of the device — Expiry dates — The make — Any special attributes that the device may possess Compliance with the UDI Regulation will be mandatory. All manufacturers of medical devices will be required to comply with the new UDI methodology
  • 5. pg 5Proprietary and Confidential UDI Benefits •  Reducing medical errors •  Reporting and assessing device-related adverse events and product problems •  Improve product recall, tracking and tracing •  Standardized identifier defined •  Efficient traceability •  Efficient product authentication •  Less documentation •  Supply chain efficiency •  Improve order and invoice process •  Optimized receiving •  Increase productivity •  Improve shelf management Benefits
  • 6. pg 6Proprietary and Confidential [ ENTERPRISE DATA MANAGEMENT ]
  • 7. pg 7Proprietary and Confidential Enterprise Information Management Framework Provides a holistic view of data in order to manage data as a corporate asset Enterprise Information Management Information Strategy Architecture and Technology Enablement Content Delivery Business Intelligence and Performance Management Data Management Information Asset Management GOVERNANCE ORGANIZATIONAL ALIGNMENT Content Management
  • 8. pg 8Proprietary and Confidential Develop and execute architectures, policies and procedures to manage the full data lifecycle Enterprise Data Management Enterprise Data Management Ensure data is available, accurate, complete and secure Traditional & Big Data Governance Data Quality Management Data Architecture Data Retention/Archiving Master Data Management Big Data Management Metadata Management Reference Data Management Privacy/Security Enterprise Data Management is the foundation to UDI compliance. EDM ensures data that underlies an organization is available, accurate, complete, and secure. Architectures, policies, practices, and procedures that manage the full data lifecycle are developed and executed
  • 9. pg 9Proprietary and Confidential [ DATA GOVERNANCE ]
  • 10. pg 10Proprietary and Confidential Why Data Governance? •  Data Governance can play a supportive role in UDI compliance. Having a unique, consistent, and persistent entity identification is one of the first steps in managing data assets. •  Data Governance can drive the adoption of data standards e.g. GS1 within your organization. •  By setting up a data governance organization, Healthcare value chain stakeholders, including device manufacturers, distributors and healthcare providers will benefit immensely
  • 11. pg 11Proprietary and Confidential Data Governance Definition Data Governance is the organizing framework for establishing strategy, objectives and policy for effectively managing corporate data. It consists of the processes, policies, organization and technologies required to manage and ensure the availability, usability, integrity, consistency, audit ability and security of your data. Communication Data Strategy Data Policies and Processes Data Standards and Modeling A Data Governance Program consists of the inter-workings of strategy, standards, policies and communication.
  • 12. pg 12Proprietary and Confidential Data Governance Framework •  Vision & Mission •  Objectives & Goals •  Alignment with Corporate Objectives •  Alignment with Business Strategy •  Guiding Principles •  Statistics and Analysis •  Tracking of progress •  Monitoring of issues •  Continuous Improvement •  Score-carding •  Policies & Rules •  Processes •  Controls •  Data Standards & Definitions •  Metadata, Taxonomy, Cataloging, and Classification •  Operating Model •  Arbiters & Escalation points •  Data Governance Organization Members •  Roles and Responsibilities •  Data Ownership & Accountability •  Collaboration & Information Life Cycle Tools •  Data Mastering & Sharing •  Data Architecture & Security •  Data Quality & Stewardship Workflow •  Metadata Repository •  Communication Plan •  Mass Communication •  Individual Updates •  Mechanisms •  Training Strategy •  Business Impact & Readiness •  IT Operations & Readiness •  Training & Awareness •  Stakeholder Management & Communication •  Defining Ownership & Accountability Change Management
  • 13. pg 13Proprietary and Confidential Data Governance Benefits •  Governing and managing product data changes •  Managing item attributes and relationships and product catalogs •  Defining and approving new items •  Establishing a repeatable data quality management program that ensures data accuracy, completeness & auditability •  Use history and audit trails for security and proof of compliance •  Fully documenting data flow processes and their transformations allows changes and transformations on the data to be audited and traced back to the original source and format •  Fully documenting business and IT processes provides an integrated view of data assets •  Increasing efficiencies and effectiveness to enable better decision-making throughout the health care value chain •  Developing a common understanding of data management, data classification data security, and access to and appropriate usage of data Benefits
  • 14. pg 14Proprietary and Confidential [ DATA QUALITY ]
  • 15. pg 15Proprietary and Confidential Why Data Quality? •  Data quality management provides reliable data that satisfies the business functions and technical requirements of the enterprise to meet UDI compliance •  A data quality management program that ensures accuracy, completeness, auditability and traceability of UDI data. This ensures that UDI data has high quality stays clean •  Having a DQ process will ensure that the UDI standards that have been implemented can be monitored and reported on
  • 16. pg 16Proprietary and Confidential Data Quality Definition and Dimensions Dimension Key Questions Impact Completeness   Is all appropriate information readily available?   Are data values missing or in an unusable state?   Incomplete data can cause major gaps in data analysis which results in increased manual manipulation and reconciliation Conformity   Are there expectations that data values need to reside in specified formats?   If so, do all values conform to those formats?   By not maintaining conformance to specific data formats, there is an increased chance for data misrepresentation, conflicting presentation results, discrepancies when creating aggregated reporting, as well as difficulty in establishing key relationships Consistency   Is there conflicting information about the same underlying data object in multiple data environments?   Are values consistent across all data sources?   Data inconsistencies represent the number one root cause in data reconciliation between different systems and applications. A significant amount of time by business groups is being consumed with manual manipulation and reconciliation efforts Accuracy   Do data objects accurately represent the “real- world” business values they are expected to model?   Incorrect or stale data, such as customer address, product information, or policy information, can impact downstream operational and analytical processes Duplication   Are there multiple, unnecessary representations of the same data objects within a given data set?   The inability to maintain a single representation for each entity, such as agent name or contact information (across all component business systems), leads to data redundancy and inconsistency, as well as increased complexity in terms of reconciliation Integrity   Which data elements are missing important relationship linkages that would result in a disconnect between two data sources?   The inability to link related records together can increase both the complexity and accuracy of any corresponding business intelligence derived from those sources. It directly correlates to the level of trust the business has in the data Timeliness   Is data available for use as specified and in the time frame in which it was expected?   The timeliness of data is extremely important. Data delayed in data denied. Could lead to reporting delays, providing slate information to customers and making decisions based stale data
  • 17. pg 17Proprietary and Confidential Why is Data Quality Important? •  Organizations of all sizes and in all industries are recognizing the importance of high-quality data and the critical role of data quality in information governance and stewardship driven by broader enterprise information management initiatives – Gartner •  The Rule of Ten: If it costs $1 to complete a simple operation when all the data is perfect, then it costs $10 when it is not Achieving Business Success Through a Commitment to High – Quality Data (TDWI Report Series), Wayne Eckerson Data is a valuable Corporate Asset
  • 18. pg 18Proprietary and Confidential Data Quality Value Proposition Business Value • Trusted version data for adverse reporting and decision making • Enabling data integrity and integration for UDI compliance • Operational efficiencies and on-time delivery, by elimination of manually-intensive activities, and reducing error-prone data integration processes • Collaboration with internal and external data sources by synchronization and consistency of enterprise data across various business functions and business channels • Maximizing product and services revenue by offering integrated solutions across business units, as well as intelligent offerings of services • Driving costs of bad data out of the system • Responsiveness to new business opportunities • Providing “plug and play” capabilities to consolidate as well as extend IT architecture • Ability to rapidly assimilate new data elements into enterprise processes Technology Enablement • Integration of data across siloed IT solutions • Ensuring the quality of the data being delivered enhances the value of data integration investments • Capability of integrating to a single architecture and solution • Recognized as part of the driven force for master data management and information governance initiatives • Support for service oriented architecture (SOA) ensures the data quality capabilities can be deployed and consumed as services and provides a flexible, scalable environment for data to move through the enterprise • Ability to quickly produce high quality data that is easily understood by functional users and management and can generate cost savings in both time dedicated to reacting and diagnosing data quality problems and re-entering incorrect data
  • 19. pg 19Proprietary and Confidential [ MASTER DATA MANAGEMENT ]
  • 20. pg 20Proprietary and Confidential What is Product Information Management (PIM) ? Ventana Research Product Information Management (PIM) is the practice of using information and technology to effectively support people and product related processes across the enterprise supply chain throughout the life of a company’s products. A PIM Data Hub is an enterprise data management solution that enables centralization of all product information from various systems, creating a single view of product information that can be leveraged across all Lines of Businesses, Business Units and functional areas. A PIM Data Hub can also be refereed as the MDM for Product data
  • 21. pg 21Proprietary and Confidential PIM Information Supply Chain Source: Riversand
  • 22. pg 22Proprietary and Confidential Why PIM ? •  A PIM Data Hub enables centralization of all UDI product information from various systems, creating a single view of product information that can be leveraged across all Lines of business, trading partners and UDI compliance •  Having a centralized place to manage and govern UDI data ensures you can manage continually changing data and is of importance to UDI compliance •  Ensure that your organization has the capabilities to create and manage the required product information data to comply with UDI
  • 23. pg 23Proprietary and Confidential Data Governance, MDM, DQ Work Together Provide Guidance Track Progress Create & Enforce Policies Provide Feedback DQ Discovery & Profiling Cleansing, Duplicate Detection Workflow, Data Sharing, Maintenance, Synchronization Measurements & Monitoring PIM Product Data Creation Hierarchy Management/ Relationships Media Asset Management Integration & aggregation Auto Generation (Description Generation) History & Audit Trail Data Governance Standardized Methods Data Definition and Business Rules Roles and Responsibilities Decision Rights Arbiters and Escalation Statistics / Analysis / Monitoring
  • 24. pg 24Proprietary and Confidential [ GETTING STARTED ]
  • 25. pg 25Proprietary and Confidential Getting Started   Start with Data Governance •  Establish a council •  Identify and train Data Stewards •  Engage stakeholders from the different business units e.g. compliance, IT, legal, supply chain, product management, manufacturing, etc. to plan and prepare for compliance readiness •  Data quality and stewardship plays a critical role in the management of product data •  Create a data quality process to ensure that the device data has the highest data quality •  Leverage an existing device project or start a new project to test the requirements •  Select a device or a set of devices to test the process from start to finish. Identify data sources •  Test the device from manufacturing to distribution using the UDI requirements •  Address data issues & refine the strategy •  Perform data profiling to clean the data •  Identify processes that are producing inconsistent device data and refine them •  Clarify data definitions and business rules •  Define data standards •  Integrate data standards into IT processes •  Measure and monitor quality over time •  If the test is successful add more devices based on the prioritized strategy Ensure Organizational Readiness Set up a Data Quality Program Conduct a Pilot
  • 26. pg 26Proprietary and Confidential [ ENSURING SUCCESS ]
  • 27. pg 27Proprietary and Confidential Clean Govern Consolidate Share Product Information Lifecycle Management PIM •  Capture all product attributes and relationships in a single data model •  Create a universal ID for each product and build a cross reference to each connected system •  Provide the golden product record and selected attributes to all applications and analytical systems •  Enable product data availability as web services to support service-oriented architectures (SOAs) •  Search product data via an integration repository •  Report using template-based XML to publish information in multiple formats •  Standardize key product data attributes •  Match and de-dupe to create a single "blended" record •  Validate data thru description-generation rules •  Auto-generate item numbers and descriptions •  Govern and control product data changes •  Manage item attributes and relationships •  Manage product catalogs •  Apply changes to groups of items meeting specific criteria •  Leverage full history and audit trails for security and proof of compliance •  Create configurable workflow-driven product change processes •  Define and approve new items •  Import data from spreadsheets for data maintenance •  Leverage bulk imports through staging tables •  Integrate using standards-compliant business services and adapters •  Create a blended product record from multiple sources
  • 28. pg 28Proprietary and Confidential Ensuring Success •  The following factors are usually evident in a successful program:   First create a strategy and then follow it (agreed on starting point and steps necessary)   Ensure solid alignment between Business and IT   Identify and assess the importance of key people and/or groups   Clearly defined and measureable success criteria   Small iterations versus all or nothing   Executive sponsorship is critical   Really know your data   Leverage prior experience/work…don’t re-invent the wheel   Plan for time and resources required for manual reconciliation   Communicate, Communicate, Communicate
  • 29. pg 29Proprietary and Confidential Keys to Success Successful Implementation! Technology Process People Failed Implementation! Technology Process People
  • 30. pg 30Proprietary and Confidential First San Francisco Partners •  Data Governance Assessments and Strategies •  Business Case and ROI Development •  Alignment Workshops •  Training and Education programs •  On-going Business support •  Data Governance Performance Management •  Program Management •  Data Architecture Assessments and Strategies •  Data Quality Assessments and Strategies •  Technology Vendor Analysis and Evaluation •  MDM and DQ Implementation First San Francisco Partners is entirely focused on helping our Customers leverage data as value-producing asset through improved Data Governance and technology. We are a group of experts from the industry who can help you create a strategy, align your organization and deliver business value in both the short and the longer terms. We do this via: Facilitation, Enablement, Empowerment
  • 31. pg 31Proprietary and Confidential [ SECTION TITLE ] Proprietary & Confidential [ QUESTIONS? ]