SlideShare une entreprise Scribd logo
1  sur  49
Télécharger pour lire hors ligne
Harald Smith
Davinity Powis
How to Strengthen Enterprise Data
Governance with Data Quality
Agenda
Introduction
Why Data Quality & Data Governance are top of mind
Data Quality & Data Governance: a symbiotic relationship
How Data Quality strengthens Enterprise Data Governance
Summary
Syncsort Confidential and Proprietary - do not copy or distribute
Speakers
Harald Smith
Director of Product Management, Trillium Software
20 years in Information Management incl. data quality, integration, and governance
Co-author of Patterns of Information Management
Author of two Redbooks on Information Governance and Data Integration
Davinity Powis
Pre-Sales Consultant for Syncsort
Founded UK-based data-marketing agency until its acquisition in 2012
Specialises in Data Quality, Data Governance, Data Integration and Big Data.
Particular interest in data quality and enrichment
Passionate about making data understandable and exciting!
Syncsort Confidential and Proprietary - do not copy or distribute
Data: the fuel of the future
Data is to this century, what oil was to the last one: a driver of
growth and change.
The Economist: Fuel of the future - Data is giving rise to a new economy: 6th May 2017
Flows of data have created new infrastructures, new businesses,
new monopolies, new politics and crucially new economics.
Digital information is unlike any previous resource: it is extracted,
refined, valued, bought and sold in different ways.
It changes the rules for markets and it demands new approaches
from regulators.
Many a battle will be fought over who should own, and benefit
from, data.
Syncsort Confidential and Proprietary - do not copy or distribute
Many sources are predicting exponential data growth toward 2020
and beyond. In almost a repeat of Moore’s Law, they are all in
broad agreement that the size of the digital universe will double
every two years at least.
Human-generated data is experiencing an overall 10x faster growth
rate than traditional business data, and machine data is increasing
even more rapidly at 50x the growth rate!
Acceleration due to: IoT, AI, ML, Big Data, Block Chain
Data Governance & Quality are top of mind
Volume and complexity
of data is growing
new tools allowing more
granular data dissection
Broader and deeper
compliance & regulation
expectations
trust & confidence
Syncsort Confidential and Proprietary - do not copy or distribute
A CDO’s nightmare!
Can I even trust this
data?
Is duplication causing
‘permission clash’
Where is all my data?
How many places store
the same data?
Are we compliant with all
necessary regulations? Can
we prove it?
Do we know what &
how much customer
data we even hold?
Do we have right internal
training & policies to
manage this much data?
Syncsort Confidential and Proprietary - do not copy or distribute
Is my customer data
safe & secure?
Could we survive the
bad publicity & financial
impact of a GDPR fine?
Why is Data Quality
so important?
Data impacts all areas of the business
sales marketing financelegal IT logistics management
Analysis
Sales reports
Dashboards
Performance metrics
Territory management
Segmentation
SCV / 360
Understanding & CRM
Content
Campaign management
ROI
UX
All reports!
Aggregations
Forecasting & modelling
Cash flow
Contingency planning
Data compliance
Data regulation
Governance
Risk
Access
Security
Disaster recovery
Scheduling
Workloads
Performance planning
Route planning
Capacity management
Environmental
Competitor analysis
HR / recruitment
Overall business strategy!Overall business strategy!
Syncsort Confidential and Proprietary - do not copy or distribute
Data Governance is the set of policies, processes, rules,
roles and responsibilities that help organisations
manage data as a corporate asset.
It ensures the availability, usability, integrity,
accuracy, compliance and security of data.
Terminology
Data Quality refers to ensuring that data is “fit for use” in its intended
operational, decision-making and other roles.
It covers the accuracy, completeness, consistency,
relevance, timeliness and validity of data.
Data Quality
ACCURACY
COMPLETENESS
CONSISTENCY
RELEVANCE
TIMELINESS
VALIDITY
Data Governance
PEOPLE
PROCESSES
POLICIES
RULES
STANDARDS
DOCUMENTATION
SECURITY
Data Availability
Data Compliance
Defining Key Data
Elements
Assigning Data Stewards
& Council
Glossaries &
Dictionaries
Data Consistency
& Standardisation
Monitoring
Analytics
Policies & Rules
Metrics
Data Lineage
Reporting
In practiceAreas of common interest
Cleansing
Enrichment
Parsing
Discovery & Profiling
Matching, Suppression &
Deduplication
Syncsort Confidential and Proprietary - do not copy or distribute
Symbiosis
“a relationship between two entities
for mutual benefit, often without
competing with each other”
Data Quality & Data Governance
share a ‘symbiotic relationship’
Syncsort Confidential and Proprietary - do not copy or distribute
Relevant
Rules &
Policies
DQ needs appropriate DG tools to ensure the data is
cleaned and maintained within an appropriate data framework
which is relevant and pertinent to the business needs
Symbiotic relationship between DQ & DG
High
Quality
Data
DG needs appropriate DQ tools to not-only clean the raw data, but to
illustrate data errors, peculiarities and issues, in order to help compile
the best standards and monitor the data quality over time
Syncsort Confidential and Proprietary - do not copy or distribute
DQDG
But they are only useful if they are accurate!We all use information, intelligence & insight
Essex
Kent
Surrey
Shrops
surrey
London
Cornwall
Merseyside
Surry
W. Sussex
PRE-DQ POST-DQ
Syncsort Confidential and Proprietary - do not copy or distribute
But they are only useful if they are accurate!
Essex
Kent
Surrey
Shrops
surrey
London
Cornwall
Merseyside
Surry
W. Sussex
PRE-DQ POST-DQ
Syncsort Confidential and Proprietary - do not copy or distribute
Essex
Kent
Surrey
Shrops
surrey
London
Cornwall
Merseyside
Surry
W. Sussex
PRE-DQ POST-DQ
What you don’t know CAN hurt you!
Other changes to data quality quickly undermine trust
Signal loss
Noise
Differing aggregations
Invalid correlations
Unexpressed assumptions
Incorrect defaults
Lack of context
Missing inputs
More than simply ‘understanding’ your data!What you don’t know CAN hurt you!
Essex
Kent
Surrey
Shrops
surrey
London
Cornwall
Merseyside
Surry
W. Sussex
POST-DQPRE-DQ
Syncsort Confidential and Proprietary - do not copy or distribute
Signal loss
Noise
Differing aggregations
Invalid correlations
Unexpressed assumptions
Incorrect defaults
Lack of context
Missing inputs
Other changes to data quality quickly undermine trustNecessary to actively Record, Monitor & Measure
Enumerate
Establish the criteria defining goals,
relevance, and fitness for purpose
Acquire
Capture the metadata for data
sources being considered and used
Discover
Profile the data sources which are
required for the desired analysis
Validate
Evaluate the data sources for the identified
and required qualities
Document
Document and store the findings about data
sources and processes
Catalog
Provide and communicate findings about data
sources and processes for others to utilize
The role of DQ in DG
It is challenging for organisations to respond to regulatory mandates in a timely
manner.
Data typically comes from multiple disparate systems & sources
The number of touchpoints has grown dramatically.
There is a higher demand and expectation for real-time data.
Regardless of the compliance mandate, the simple fact is that they all require
accurate source data.
Rubbish-in: rubbish-out is more pertinent than ever before!
Syncsort Confidential and Proprietary - do not copy or distribute
What are the regulations there for?
Regulations are there to protect and regulate:
privacy
disclosure
risk management
fraud prevention
anti-money laundering
anti-terrorism
anti-usury lending, and the promotion of lending to lower-income populations.
Syncsort Confidential and Proprietary - do not copy or distribute
Types of regulations
Risk & Compliance
GDPR
CCPA
FSCS
FATCA
Customer Data
Management & KYC
Regulatory Reporting
& Data Assurance
Operational
Governance
BCBS 239
Data Stewardship
ANACREDIT
HIPPA
BASEL II/III
CCAR / Stress Testing
DQ Assurance
AML
Syncsort Confidential and Proprietary - do not copy or distribute
GDPR
What personal & sensitive data
you hold – and is it up-to-date?
What you are doing with it &
how you are processing it?
That you have
permission to use it
Where it is stored?
Is it duplicated?
Who has access to it? How are you keeping it SAFE?
GDPR is essentially about knowing:
Syncsort Confidential and Proprietary - do not copy or distribute
What do you know about me?
Right to access data plus receive a copy of data
Customers are now recognising their new power
Data about me is wrong - fix it!
Right to inaccurate data correction
Erase all my data for good!
Right to be forgotten
Has my data been breached?
Right to be informed within 72 hours
How do you use my data?
Right to limit processing of personal data
and object to how it is processed
Demand human interaction
Right to not participate in fully-automated
decisions based on customer profile
Syncsort Confidential and Proprietary - do not copy or distribute
Source: Oliver Wyman, Global Management Consultancy (May 2017)
Suddenly it’s serious!
Google hit with £44m GDPR fine over ads
Syncsort Confidential and Proprietary - do not copy or distribute
ID Title Forename Surname Full Name Address 1 City Postcode email Phone
SMI20033 XXX XXX Dr B. Smith 3 Davy Dr Maltby S66 7EN bob.smith@hotmail.comXXX XXX
bob.smith
@hotmail.com
Bob Smith bob.smith@hotmail.com
2000138604 Dr Smith xxx xxxBob bob.smith@hotmail.com
134567542 Smith 3 Davey Drive Rotherham S667EN 01189407600Bob
SMI16975 Dr B. Smith 3 Davy Dryve MALtby S66 7EN 07123 5579421bob.smith@hotmail.com
Dr Smith 3 Davy Drive Rotherham S66 7EN
01189407600
07123 5579421
Bob bob.smith@hotmail.com
Multiple touchpoints/databases - which is ‘right’?
Permission
xxxxxxxxxxxxx
Syncsort Confidential and Proprietary - do not copy or distribute
Single View enables accuracy and excellence in…
Analytics
Analysis of clean data will be accurate
Segmentation & Targeting
Marketers will place consumers into the correct
segments. Campaigns are more relevant
Reporting & Visualisation
Reports will be reliable. Dashboards show
correct findings - giving a true representation.
Customer Experience
Customers will receive consistent
messaging and communications.
Accurate understanding leads to appropriate
communications and dialogue.
Customer Understanding Strategy
All these lead to accurate, sensible
business decisions.
Syncsort Confidential and Proprietary - do not copy or distribute
Regulation demands evidence & documentation
ARTICLE
5
ARTICLE
30
ARTICLE
32
ARTICLE
35
Provide evidence that your company’s personal data processing adheres to GDPR principles:
Processed lawfully, transparently
Collected for specific purposes
Limited to data relevant for specific purposes
Kept accurate and current
Processed securely and protected
Provide documentation on your company’s Record Processing Activities
Provide documentation on your company’s Security of Processing
Provide documentation on your company’s Data Protection Impact Assessment
Syncsort Confidential and Proprietary - do not copy or distribute
GDPR is about more than just data quality though
Data Quality tools are
no longer a “nice to have”
Syncsort Confidential and Proprietary - do not copy or distribute
GDPR – where DQ helps deliver compliance
3. Data Integration
Integration with Data
Governance tools. Triggers
issue management and
controls.
Integration with analytical
& dashboarding tools so
that GDPR rules and reports
(and overall compliance) can
be easily understood and
monitored.
2. Data Quality Processing
Real-time & batch data cleansing & matching
across multiple data sources generating SCV;
enabling businesses to locate records by a
single record quickly
SCV also means customer permissions are
respected, records can be amended or
suppressed / deleted, plus businesses can react
to SAR requests quickly
Full traceability of original data source
Documented DQ routines for transparency &
auditing (e.g. user & process control, security)
1. Data Discovery
Highlights bad data, typos, mis-
fielded data, outlying data not
conforming to policy, formatting,
structure, syntax etc
Exposes text fields with buried,
unexpected personal & sensitive
data
Build Technical business rules to
mirror DG rules and identify and
monitor ongoing data issues
Syncsort Confidential and Proprietary - do not copy or distribute
GDPR mandates tight control of customer data!
Without DQ, duplication and poor data will propagate,
resulting in mis-understanding and mis-respecting
the customers’ wishes and demands. Over time, this will
inevitably escalate to non-compliance of GDPR!
DQ helps ensure DG compliance
GDPR Summary
Syncsort Confidential and Proprietary - do not copy or distribute
FATCA
FATCA
FATCA is an abbreviation for: Foreign Account Tax Compliance Act.
2010 US federal law to enforce the requirement for US citizens (including those
living outside the US) to file yearly reports on their non-US financial accounts to
the Financial Crimes Enforcement Network (FinCEN).
Introduced April 2015, it requires all non-US financial institutions to search their
records for customers with indicia (flags) of ‘US citizen' status, such as a US
place of birth, and to flag & identify such records for further inspection.
Syncsort Confidential and Proprietary - do not copy or distribute
FATCA – where DQ helps deliver compliance
DQ processing is typically used as precursor to a bank’s internal FATCA process
it uses all key steps such as parsing, standardisation, cleansing, matching, commonisation and merging to
deliver Single Customer View (SCV).
SCV ensures all duplicate records are linked, often highlighting conflicting
information and indicia, such as:
Country of Origin of address (US vs. Non-US)
US Birthplace
US Telephone numbers
De-minimis (aggregated account balances with currency conversion)
Once data is remediated and harmonised, the right decisions can be made,
ensuring the organisation is FATCA compliant.
PO Box/Care of addresses
US Social Security Numbers
US Citizenship
Syncsort Confidential and Proprietary - do not copy or distribute
Identifies the real country of origin - irrespective of data captured.
DQ: highlights address indicia errors
Non-US country codes which would
otherwise have been incorrectly prevented
them from FATCA processing
Erroneous US country codes which
would have incorrectly included them in
FATCA processing, unnecessarily wasting
time and resource.
Syncsort Confidential and Proprietary - do not copy or distribute
Identifies where duplicate records contain conflicting Nationality indicia.
Different records have/not been have implicated for FATCA, leading to fuzzy decisions.
DQ harmonises the cluster so that each record has the same indicia.
DQ: highlights Nationality indicia conflicts
Syncsort Confidential and Proprietary - do not copy or distribute
No Data Quality = inaccurate decisionsDQ: results
Implicated
Records which
clearly contain
implicated indicia
Not Implicated
Records which do
not contain
implicated indicia
Suspect
Records which
may contain
implicated indicia.
= sensible decisions
Syncsort Confidential and Proprietary - do not copy or distribute
Not performing DQ processing before FATCA
procedures could easily lead to missing
implicated records from selection.
Thus failing FATCA regulation!
DQ helps ensure DG compliance
FATCA Summary
Syncsort Confidential and Proprietary - do not copy or distribute
AML
AML
Money laundering refers to the exchange of money or assets that were obtained
criminally for money. It also includes money that is used to fund terrorism,
however it’s obtained.
Introduced in May 2018, FS organisations must put in place controls to prevent
their business from being used for money laundering:
checking the identity of your customers
checking the identity of ‘beneficial owners’ of corporate bodies and partnerships
monitoring your customers’ business activities and reporting anything suspicious to the National Crime
Agency (NCA)
making sure you have the necessary management control systems in place
keeping all documents that relate to financial transactions, the identity of your customers, risk
assessment and management procedures and processes
Syncsort Confidential and Proprietary - do not copy or distribute
AML – where DQ helps deliver compliance
DQ processing is typically used as prerequisite to a bank’s internal AML process
It uses key steps such as parsing, standardisation and cleansing to ensure the
bank’s own data is of the highest standard possible.
It also allows the organisation to link all monetary activities to specific
individuals, giving the firm the best chance of identifying and combatting
potential money-laundering and other financial crimes, and take appropriate
actions.
Syncsort Confidential and Proprietary - do not copy or distribute
DQ: enabling accurate matching & suppression
Syncsort Confidential and Proprietary - do not copy or distribute
PRE-DQPOST-DQ
Once standardised and cleansed, the bank’s data then has the optimum chance of
matching data on sanctions lists of known money launderers, criminals or terrorists.
When banks transfer money and data
SWIFT messages are the format or schema used by financial institutions
to exchange data
SWIFT messages are complex data structures consisting of five blocks of data
including three headers, message content and a trailer.
Data Quality is paramount for operational, reporting, governance, and
AML requirements.
DQ ensures SWIFT message quality
Syncsort Confidential and Proprietary - do not copy or distribute
50K|/809615 01178139~MR BOB WONG~53 NEEDLESS RD~LINCOLN
LINCOLNSHIRE~LN21 |52A|BEASHKHHXXX|59|/1995 8242
207458~WONG MEI LING AND WONG BOB|57A| 5 | CANADA SQU
LONDON|SENDER|LOYDGB2XXX| RECEIVER|BKCHHKHH
Title
Forename
Recoded Forename
Surname
HouseNo
StreetName
StreetType
City
County
Postcode
Country
Clean / Correct / Validation
Cleanses, corrects, validates and enriches
customer information on SWIFT message to
enable accurate AML checks
DQ: highlights & remediates data in-flight
<OrderingCustomer>
…
<Name>MR BOB WONG</Name>
<Address>
<Line1>53 NEEDLESS RD</Line1>
<Line2>LINCOLN LINCOLNSHIRE</Line2>
<Line3>LN21 </Line3>
</Address>
…
</OrderingCustomer>
<BeneficiaryInstitution>
…
<BIC></BIC>
<Address>
<Line1> </Line1>
<Line2>5 CANADA SQU </Line2>
<Line3>LONDON</Line3>
</Address>
<Account/>
…
</BeneficiaryInstitution>
Parse
Syncsort Confidential and Proprietary - do not copy or distribute
MR BOB WONG
53 NEEDLESS RD
LINCOLN LINCOLNSHIRE
LN21
ROBERT
ROAD
LN21 1RW
GBR
Match / Link / Deduplication
Cleanses, corrects, validates and enriches Beneficiary Institution by matching BIC
codes on SWIFT message to enable accurate AML checks
DQ: highlights & remediates data in-flight
Bank of America NA
BOFAGB22SCP
E14 5AQ
Syncsort Confidential and Proprietary - do not copy or distribute
If there was no DQ processing, it would directly
increase the chances of unknowingly processing illegal
transactions, and/or trading with known criminals.
They would have failed AML regulation!
DQ helps ensure DG compliance
AML Summary
Syncsort Confidential and Proprietary - do not copy or distribute
Execution Strategy
1. Start small: challenges & best practices
Information overload
Multiple versions of the truth
Data challenges
Lack of agility
Identify Business Objectives
• Increase revenue
• Minimize risk
• Decrease costs
Secure Executive Sponsorship
• Identify pain
• Understand policies
• Determine metrics
Initiate Small Projects
• Align to objectives
• Adopt what you need
• Adapt how you see fit
• Gain quick wins
Evaluate Progress
• Understand successes/failures
• Shift as needed
• Establish a ‘way of thinking’
Syncsort Confidential and Proprietary - do not copy or distribute
2. Collaborate: challenges & best practices
Lack of Common Terminology
Organizational Barriers & Silos
Isolated or Unknown Work
Lack of Engagement
Establish a Common Language
• Define terminology – a ‘stake in the ground’
• Map information
• Support with policies/standards
Gain Broader Buy In
• Bring stakeholders together
• Build the structure, culture,
ownership, steering groups,
stewardship over time
Enrich Information
• Discover what you don’t know
• Resolve differences
• Enhance/annotate to increase insight
Share Insights Regularly
• Produce and share tangible outcomes
• Highlight ‘wins’
• Demonstrate efficiencies & savings
Syncsort Confidential and Proprietary - do not copy or distribute
3. Quantify: challenges & best practices
Hidden Activities
Money, Time and Resource
Waste
Lack of Transparency and Trust
Disconnect Between Process
and Measures
Identify Baseline Measures
• Keep a focus on lean and agile
• Define value accurately for the business
Link to Business Performance
• Create and refine streams of value
• Transform culture through action
and empowerment
Monitor, Report and Remediate Issues
• Continuously review
• Ensure issues are visible and understood
• Understand root causes
• Address/resolve issues
Quantify Impact of Changes
• Demonstrate through clearly understood measures
• Establish value continuously
• Finish early, finish often
Syncsort Confidential and Proprietary - do not copy or distribute
Summary
The accuracy of data directly impinges on any activity
downstream – from analytics, reporting & dashboards,
segmentation & targeting, customer care through to risk &
compliance… in fact ANY business decision!
DQ not only strengthens DG compliance;
it also means you make SENSIBLE BUSINESS DECISIONS
Summary
Syncsort Confidential and Proprietary - do not copy or distribute
harald.smith@syncsort.com
davinity.powis@syncsort.com

Contenu connexe

Tendances

Importance of Data Governance
Importance of Data GovernanceImportance of Data Governance
Importance of Data GovernanceHTS Hosting
 
Understanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyUnderstanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyDATAVERSITY
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...IT Support Engineer
 
LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016Anjan Roy, PMP
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionCIO Look Magazine
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017Ray Bugg
 
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit DublinThe Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit DublinKen O'Connor
 
Corporate Information Management: Core Concepts & Best Practices
Corporate Information Management: Core Concepts & Best PracticesCorporate Information Management: Core Concepts & Best Practices
Corporate Information Management: Core Concepts & Best PracticesSIMAdmin
 
Bridging the Data Governance Chasm
Bridging the Data Governance ChasmBridging the Data Governance Chasm
Bridging the Data Governance ChasmJay Zaidi
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionCapgemini
 
NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?DATAVERSITY
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Delphix
 
Delivering data you can trust for data privacy
Delivering data you can trust for data privacy Delivering data you can trust for data privacy
Delivering data you can trust for data privacy Jean-Michel Franco
 
The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management LexisNexis Software Division
 
GDPR Compliance: The challenge for HR and how Cezanne HR helps
GDPR Compliance: The challenge for HR and how Cezanne HR helpsGDPR Compliance: The challenge for HR and how Cezanne HR helps
GDPR Compliance: The challenge for HR and how Cezanne HR helpsCezanne HR
 
Webinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionWebinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionStorage Switzerland
 

Tendances (19)

A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Importance of Data Governance
Importance of Data GovernanceImportance of Data Governance
Importance of Data Governance
 
Understanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance StrategyUnderstanding the Data You Have Before Applying a Governance Strategy
Understanding the Data You Have Before Applying a Governance Strategy
 
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...Nuestar "Big Data Cloud" Major Data Center Technology  nuestarmobilemarketing...
Nuestar "Big Data Cloud" Major Data Center Technology nuestarmobilemarketing...
 
LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016LS_WhitePaper_NextGenAnalyticsMay2016
LS_WhitePaper_NextGenAnalyticsMay2016
 
Clearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat ProtectionClearswift | Leading Provider of Advanced Content Threat Protection
Clearswift | Leading Provider of Advanced Content Threat Protection
 
Can you trust your Data? 3 ways to be sure.
Can you trust your Data? 3 ways to be sure.Can you trust your Data? 3 ways to be sure.
Can you trust your Data? 3 ways to be sure.
 
GDPR Scotland 2017
GDPR Scotland 2017GDPR Scotland 2017
GDPR Scotland 2017
 
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit DublinThe Data Value Map for GDPR - May 2018 - GDPR summit Dublin
The Data Value Map for GDPR - May 2018 - GDPR summit Dublin
 
ZEDventures-highres
ZEDventures-highresZEDventures-highres
ZEDventures-highres
 
Corporate Information Management: Core Concepts & Best Practices
Corporate Information Management: Core Concepts & Best PracticesCorporate Information Management: Core Concepts & Best Practices
Corporate Information Management: Core Concepts & Best Practices
 
Bridging the Data Governance Chasm
Bridging the Data Governance ChasmBridging the Data Governance Chasm
Bridging the Data Governance Chasm
 
Information Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer SatisfactionInformation Governance: Reducing Costs and Increasing Customer Satisfaction
Information Governance: Reducing Costs and Increasing Customer Satisfaction
 
NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?NoSQL? How about "NoDBMS"?
NoSQL? How about "NoDBMS"?
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
 
Delivering data you can trust for data privacy
Delivering data you can trust for data privacy Delivering data you can trust for data privacy
Delivering data you can trust for data privacy
 
The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management The Winning Case for (Law Firm) Online Document Management
The Winning Case for (Law Firm) Online Document Management
 
GDPR Compliance: The challenge for HR and how Cezanne HR helps
GDPR Compliance: The challenge for HR and how Cezanne HR helpsGDPR Compliance: The challenge for HR and how Cezanne HR helps
GDPR Compliance: The challenge for HR and how Cezanne HR helps
 
Webinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data ProtectionWebinar: The Three New Requirements of Unstructured Data Protection
Webinar: The Three New Requirements of Unstructured Data Protection
 

Similaire à How Data Quality Strengthens Enterprise Data Governance

How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityDATAVERSITY
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsNeo4j
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA CompliancePrecisely
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEryk Budi Pratama
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadlineaccenture
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Successful stewardship Presentation
Successful stewardship PresentationSuccessful stewardship Presentation
Successful stewardship PresentationCertus Solutions
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxAdarsh748147
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guideChristopher Bradley
 
3 formas de saber como confiar en tus datos
3 formas de saber como confiar en tus datos3 formas de saber como confiar en tus datos
3 formas de saber como confiar en tus datosData IQ Argentina
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfCIOWomenMagazine
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernanceCloudera, Inc.
 
Oceans of big data: Take the plunge or wade in slowly?
Oceans of big data: Take the plunge or wade in slowly?Oceans of big data: Take the plunge or wade in slowly?
Oceans of big data: Take the plunge or wade in slowly?Deloitte Canada
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Programsecratic
 
big data.pptx
big data.pptxbig data.pptx
big data.pptxVirajSaud
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analyticsMarc Vael
 

Similaire à How Data Quality Strengthens Enterprise Data Governance (20)

How to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data QualityHow to Strengthen Enterprise Data Governance with Data Quality
How to Strengthen Enterprise Data Governance with Data Quality
 
GDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of GraphsGDPR: Leverage the Power of Graphs
GDPR: Leverage the Power of Graphs
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data QualityEnabling Data Governance - Data Trust, Data Ethics, Data Quality
Enabling Data Governance - Data Trust, Data Ethics, Data Quality
 
Looking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance DeadlineLooking Beyond GDPR Compliance Deadline
Looking Beyond GDPR Compliance Deadline
 
Closing the Governance Gap - Enabling Governed Self-Service Analytics
Closing the Governance Gap  - Enabling Governed Self-Service AnalyticsClosing the Governance Gap  - Enabling Governed Self-Service Analytics
Closing the Governance Gap - Enabling Governed Self-Service Analytics
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Successful stewardship Presentation
Successful stewardship PresentationSuccessful stewardship Presentation
Successful stewardship Presentation
 
Big data baddata-gooddata
Big data baddata-gooddataBig data baddata-gooddata
Big data baddata-gooddata
 
GDPR Seminar Slides
GDPR Seminar SlidesGDPR Seminar Slides
GDPR Seminar Slides
 
Data Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptxData Privacy and Security in UAE.pptx
Data Privacy and Security in UAE.pptx
 
Bad customer data?
Bad customer data?Bad customer data?
Bad customer data?
 
Information Management best_practice_guide
Information Management best_practice_guideInformation Management best_practice_guide
Information Management best_practice_guide
 
3 formas de saber como confiar en tus datos
3 formas de saber como confiar en tus datos3 formas de saber como confiar en tus datos
3 formas de saber como confiar en tus datos
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
Perspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data GovernancePerspectives on Ethical Big Data Governance
Perspectives on Ethical Big Data Governance
 
Oceans of big data: Take the plunge or wade in slowly?
Oceans of big data: Take the plunge or wade in slowly?Oceans of big data: Take the plunge or wade in slowly?
Oceans of big data: Take the plunge or wade in slowly?
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
big data.pptx
big data.pptxbig data.pptx
big data.pptx
 
The value of big data analytics
The value of big data analyticsThe value of big data analytics
The value of big data analytics
 

Plus de Precisely

Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfPrecisely
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Precisely
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Precisely
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Precisely
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fPrecisely
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsPrecisely
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarPrecisely
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPPrecisely
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenPrecisely
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsPrecisely
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyPrecisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellencePrecisely
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation ManagementPrecisely
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowPrecisely
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformancePrecisely
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPrecisely
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsPrecisely
 

Plus de Precisely (20)

Crucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdfCrucial Considerations for AI-ready Data.pdf
Crucial Considerations for AI-ready Data.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10Justifying Capacity Managment Webinar 4/10
Justifying Capacity Managment Webinar 4/10
 
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
Automate Studio Training: Materials Maintenance Tips for Efficiency and Ease ...
 
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
Leveraging Mainframe Data in Near Real Time to Unleash Innovation With Cloud:...
 
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3fTestjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
Testjrjnejrvnorno4rno3nrfnfjnrfnournfou3nfou3f
 
Data Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity TrendsData Innovation Summit: Data Integrity Trends
Data Innovation Summit: Data Integrity Trends
 
AI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity WebinarAI You Can Trust - Ensuring Success with Data Integrity Webinar
AI You Can Trust - Ensuring Success with Data Integrity Webinar
 
Optimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAPOptimisez la fonction financière en automatisant vos processus SAP
Optimisez la fonction financière en automatisant vos processus SAP
 
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige InvestitionenSAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
SAPS/4HANA Migration - Transformation-Management + nachhaltige Investitionen
 
Automatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIsAutomatisierte SAP Prozesse mit Hilfe von APIs
Automatisierte SAP Prozesse mit Hilfe von APIs
 
Moving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and PreciselyMoving IBM i Applications to the Cloud with AWS and Precisely
Moving IBM i Applications to the Cloud with AWS and Precisely
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Automate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center ExcellenceAutomate Your Master Data Processes for Shared Service Center Excellence
Automate Your Master Data Processes for Shared Service Center Excellence
 
5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management5 Keys to Improved IT Operation Management
5 Keys to Improved IT Operation Management
 
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter TomorrowUnlock Efficiency With Your Address Data Today For a Smarter Tomorrow
Unlock Efficiency With Your Address Data Today For a Smarter Tomorrow
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak PerformanceMainframe Sort Operations: Gaining the Insights You Need for Peak Performance
Mainframe Sort Operations: Gaining the Insights You Need for Peak Performance
 
Preventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations ManagementPreventing Downtime with Better IT Operations Management
Preventing Downtime with Better IT Operations Management
 
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and ConsMigrating IBM i Systems to the Cloud: Exploring the Pros and Cons
Migrating IBM i Systems to the Cloud: Exploring the Pros and Cons
 

Dernier

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

How Data Quality Strengthens Enterprise Data Governance

  • 1. Harald Smith Davinity Powis How to Strengthen Enterprise Data Governance with Data Quality
  • 2. Agenda Introduction Why Data Quality & Data Governance are top of mind Data Quality & Data Governance: a symbiotic relationship How Data Quality strengthens Enterprise Data Governance Summary Syncsort Confidential and Proprietary - do not copy or distribute
  • 3. Speakers Harald Smith Director of Product Management, Trillium Software 20 years in Information Management incl. data quality, integration, and governance Co-author of Patterns of Information Management Author of two Redbooks on Information Governance and Data Integration Davinity Powis Pre-Sales Consultant for Syncsort Founded UK-based data-marketing agency until its acquisition in 2012 Specialises in Data Quality, Data Governance, Data Integration and Big Data. Particular interest in data quality and enrichment Passionate about making data understandable and exciting! Syncsort Confidential and Proprietary - do not copy or distribute
  • 4. Data: the fuel of the future Data is to this century, what oil was to the last one: a driver of growth and change. The Economist: Fuel of the future - Data is giving rise to a new economy: 6th May 2017 Flows of data have created new infrastructures, new businesses, new monopolies, new politics and crucially new economics. Digital information is unlike any previous resource: it is extracted, refined, valued, bought and sold in different ways. It changes the rules for markets and it demands new approaches from regulators. Many a battle will be fought over who should own, and benefit from, data. Syncsort Confidential and Proprietary - do not copy or distribute
  • 5. Many sources are predicting exponential data growth toward 2020 and beyond. In almost a repeat of Moore’s Law, they are all in broad agreement that the size of the digital universe will double every two years at least. Human-generated data is experiencing an overall 10x faster growth rate than traditional business data, and machine data is increasing even more rapidly at 50x the growth rate! Acceleration due to: IoT, AI, ML, Big Data, Block Chain Data Governance & Quality are top of mind Volume and complexity of data is growing new tools allowing more granular data dissection Broader and deeper compliance & regulation expectations trust & confidence Syncsort Confidential and Proprietary - do not copy or distribute
  • 6. A CDO’s nightmare! Can I even trust this data? Is duplication causing ‘permission clash’ Where is all my data? How many places store the same data? Are we compliant with all necessary regulations? Can we prove it? Do we know what & how much customer data we even hold? Do we have right internal training & policies to manage this much data? Syncsort Confidential and Proprietary - do not copy or distribute Is my customer data safe & secure? Could we survive the bad publicity & financial impact of a GDPR fine?
  • 7. Why is Data Quality so important?
  • 8. Data impacts all areas of the business sales marketing financelegal IT logistics management Analysis Sales reports Dashboards Performance metrics Territory management Segmentation SCV / 360 Understanding & CRM Content Campaign management ROI UX All reports! Aggregations Forecasting & modelling Cash flow Contingency planning Data compliance Data regulation Governance Risk Access Security Disaster recovery Scheduling Workloads Performance planning Route planning Capacity management Environmental Competitor analysis HR / recruitment Overall business strategy!Overall business strategy! Syncsort Confidential and Proprietary - do not copy or distribute
  • 9. Data Governance is the set of policies, processes, rules, roles and responsibilities that help organisations manage data as a corporate asset. It ensures the availability, usability, integrity, accuracy, compliance and security of data. Terminology Data Quality refers to ensuring that data is “fit for use” in its intended operational, decision-making and other roles. It covers the accuracy, completeness, consistency, relevance, timeliness and validity of data. Data Quality ACCURACY COMPLETENESS CONSISTENCY RELEVANCE TIMELINESS VALIDITY Data Governance PEOPLE PROCESSES POLICIES RULES STANDARDS DOCUMENTATION SECURITY Data Availability Data Compliance Defining Key Data Elements Assigning Data Stewards & Council Glossaries & Dictionaries Data Consistency & Standardisation Monitoring Analytics Policies & Rules Metrics Data Lineage Reporting In practiceAreas of common interest Cleansing Enrichment Parsing Discovery & Profiling Matching, Suppression & Deduplication Syncsort Confidential and Proprietary - do not copy or distribute
  • 10. Symbiosis “a relationship between two entities for mutual benefit, often without competing with each other” Data Quality & Data Governance share a ‘symbiotic relationship’ Syncsort Confidential and Proprietary - do not copy or distribute
  • 11. Relevant Rules & Policies DQ needs appropriate DG tools to ensure the data is cleaned and maintained within an appropriate data framework which is relevant and pertinent to the business needs Symbiotic relationship between DQ & DG High Quality Data DG needs appropriate DQ tools to not-only clean the raw data, but to illustrate data errors, peculiarities and issues, in order to help compile the best standards and monitor the data quality over time Syncsort Confidential and Proprietary - do not copy or distribute DQDG
  • 12. But they are only useful if they are accurate!We all use information, intelligence & insight Essex Kent Surrey Shrops surrey London Cornwall Merseyside Surry W. Sussex PRE-DQ POST-DQ Syncsort Confidential and Proprietary - do not copy or distribute
  • 13. But they are only useful if they are accurate! Essex Kent Surrey Shrops surrey London Cornwall Merseyside Surry W. Sussex PRE-DQ POST-DQ Syncsort Confidential and Proprietary - do not copy or distribute Essex Kent Surrey Shrops surrey London Cornwall Merseyside Surry W. Sussex PRE-DQ POST-DQ What you don’t know CAN hurt you! Other changes to data quality quickly undermine trust Signal loss Noise Differing aggregations Invalid correlations Unexpressed assumptions Incorrect defaults Lack of context Missing inputs
  • 14. More than simply ‘understanding’ your data!What you don’t know CAN hurt you! Essex Kent Surrey Shrops surrey London Cornwall Merseyside Surry W. Sussex POST-DQPRE-DQ Syncsort Confidential and Proprietary - do not copy or distribute Signal loss Noise Differing aggregations Invalid correlations Unexpressed assumptions Incorrect defaults Lack of context Missing inputs Other changes to data quality quickly undermine trustNecessary to actively Record, Monitor & Measure Enumerate Establish the criteria defining goals, relevance, and fitness for purpose Acquire Capture the metadata for data sources being considered and used Discover Profile the data sources which are required for the desired analysis Validate Evaluate the data sources for the identified and required qualities Document Document and store the findings about data sources and processes Catalog Provide and communicate findings about data sources and processes for others to utilize
  • 15. The role of DQ in DG It is challenging for organisations to respond to regulatory mandates in a timely manner. Data typically comes from multiple disparate systems & sources The number of touchpoints has grown dramatically. There is a higher demand and expectation for real-time data. Regardless of the compliance mandate, the simple fact is that they all require accurate source data. Rubbish-in: rubbish-out is more pertinent than ever before! Syncsort Confidential and Proprietary - do not copy or distribute
  • 16. What are the regulations there for? Regulations are there to protect and regulate: privacy disclosure risk management fraud prevention anti-money laundering anti-terrorism anti-usury lending, and the promotion of lending to lower-income populations. Syncsort Confidential and Proprietary - do not copy or distribute
  • 17. Types of regulations Risk & Compliance GDPR CCPA FSCS FATCA Customer Data Management & KYC Regulatory Reporting & Data Assurance Operational Governance BCBS 239 Data Stewardship ANACREDIT HIPPA BASEL II/III CCAR / Stress Testing DQ Assurance AML Syncsort Confidential and Proprietary - do not copy or distribute
  • 18. GDPR
  • 19. What personal & sensitive data you hold – and is it up-to-date? What you are doing with it & how you are processing it? That you have permission to use it Where it is stored? Is it duplicated? Who has access to it? How are you keeping it SAFE? GDPR is essentially about knowing: Syncsort Confidential and Proprietary - do not copy or distribute
  • 20. What do you know about me? Right to access data plus receive a copy of data Customers are now recognising their new power Data about me is wrong - fix it! Right to inaccurate data correction Erase all my data for good! Right to be forgotten Has my data been breached? Right to be informed within 72 hours How do you use my data? Right to limit processing of personal data and object to how it is processed Demand human interaction Right to not participate in fully-automated decisions based on customer profile Syncsort Confidential and Proprietary - do not copy or distribute
  • 21. Source: Oliver Wyman, Global Management Consultancy (May 2017) Suddenly it’s serious! Google hit with £44m GDPR fine over ads Syncsort Confidential and Proprietary - do not copy or distribute
  • 22. ID Title Forename Surname Full Name Address 1 City Postcode email Phone SMI20033 XXX XXX Dr B. Smith 3 Davy Dr Maltby S66 7EN bob.smith@hotmail.comXXX XXX bob.smith @hotmail.com Bob Smith bob.smith@hotmail.com 2000138604 Dr Smith xxx xxxBob bob.smith@hotmail.com 134567542 Smith 3 Davey Drive Rotherham S667EN 01189407600Bob SMI16975 Dr B. Smith 3 Davy Dryve MALtby S66 7EN 07123 5579421bob.smith@hotmail.com Dr Smith 3 Davy Drive Rotherham S66 7EN 01189407600 07123 5579421 Bob bob.smith@hotmail.com Multiple touchpoints/databases - which is ‘right’? Permission xxxxxxxxxxxxx Syncsort Confidential and Proprietary - do not copy or distribute
  • 23. Single View enables accuracy and excellence in… Analytics Analysis of clean data will be accurate Segmentation & Targeting Marketers will place consumers into the correct segments. Campaigns are more relevant Reporting & Visualisation Reports will be reliable. Dashboards show correct findings - giving a true representation. Customer Experience Customers will receive consistent messaging and communications. Accurate understanding leads to appropriate communications and dialogue. Customer Understanding Strategy All these lead to accurate, sensible business decisions. Syncsort Confidential and Proprietary - do not copy or distribute
  • 24. Regulation demands evidence & documentation ARTICLE 5 ARTICLE 30 ARTICLE 32 ARTICLE 35 Provide evidence that your company’s personal data processing adheres to GDPR principles: Processed lawfully, transparently Collected for specific purposes Limited to data relevant for specific purposes Kept accurate and current Processed securely and protected Provide documentation on your company’s Record Processing Activities Provide documentation on your company’s Security of Processing Provide documentation on your company’s Data Protection Impact Assessment Syncsort Confidential and Proprietary - do not copy or distribute GDPR is about more than just data quality though
  • 25. Data Quality tools are no longer a “nice to have” Syncsort Confidential and Proprietary - do not copy or distribute
  • 26. GDPR – where DQ helps deliver compliance 3. Data Integration Integration with Data Governance tools. Triggers issue management and controls. Integration with analytical & dashboarding tools so that GDPR rules and reports (and overall compliance) can be easily understood and monitored. 2. Data Quality Processing Real-time & batch data cleansing & matching across multiple data sources generating SCV; enabling businesses to locate records by a single record quickly SCV also means customer permissions are respected, records can be amended or suppressed / deleted, plus businesses can react to SAR requests quickly Full traceability of original data source Documented DQ routines for transparency & auditing (e.g. user & process control, security) 1. Data Discovery Highlights bad data, typos, mis- fielded data, outlying data not conforming to policy, formatting, structure, syntax etc Exposes text fields with buried, unexpected personal & sensitive data Build Technical business rules to mirror DG rules and identify and monitor ongoing data issues Syncsort Confidential and Proprietary - do not copy or distribute
  • 27. GDPR mandates tight control of customer data! Without DQ, duplication and poor data will propagate, resulting in mis-understanding and mis-respecting the customers’ wishes and demands. Over time, this will inevitably escalate to non-compliance of GDPR! DQ helps ensure DG compliance GDPR Summary Syncsort Confidential and Proprietary - do not copy or distribute
  • 28. FATCA
  • 29. FATCA FATCA is an abbreviation for: Foreign Account Tax Compliance Act. 2010 US federal law to enforce the requirement for US citizens (including those living outside the US) to file yearly reports on their non-US financial accounts to the Financial Crimes Enforcement Network (FinCEN). Introduced April 2015, it requires all non-US financial institutions to search their records for customers with indicia (flags) of ‘US citizen' status, such as a US place of birth, and to flag & identify such records for further inspection. Syncsort Confidential and Proprietary - do not copy or distribute
  • 30. FATCA – where DQ helps deliver compliance DQ processing is typically used as precursor to a bank’s internal FATCA process it uses all key steps such as parsing, standardisation, cleansing, matching, commonisation and merging to deliver Single Customer View (SCV). SCV ensures all duplicate records are linked, often highlighting conflicting information and indicia, such as: Country of Origin of address (US vs. Non-US) US Birthplace US Telephone numbers De-minimis (aggregated account balances with currency conversion) Once data is remediated and harmonised, the right decisions can be made, ensuring the organisation is FATCA compliant. PO Box/Care of addresses US Social Security Numbers US Citizenship Syncsort Confidential and Proprietary - do not copy or distribute
  • 31. Identifies the real country of origin - irrespective of data captured. DQ: highlights address indicia errors Non-US country codes which would otherwise have been incorrectly prevented them from FATCA processing Erroneous US country codes which would have incorrectly included them in FATCA processing, unnecessarily wasting time and resource. Syncsort Confidential and Proprietary - do not copy or distribute
  • 32. Identifies where duplicate records contain conflicting Nationality indicia. Different records have/not been have implicated for FATCA, leading to fuzzy decisions. DQ harmonises the cluster so that each record has the same indicia. DQ: highlights Nationality indicia conflicts Syncsort Confidential and Proprietary - do not copy or distribute
  • 33. No Data Quality = inaccurate decisionsDQ: results Implicated Records which clearly contain implicated indicia Not Implicated Records which do not contain implicated indicia Suspect Records which may contain implicated indicia. = sensible decisions Syncsort Confidential and Proprietary - do not copy or distribute
  • 34. Not performing DQ processing before FATCA procedures could easily lead to missing implicated records from selection. Thus failing FATCA regulation! DQ helps ensure DG compliance FATCA Summary Syncsort Confidential and Proprietary - do not copy or distribute
  • 35. AML
  • 36. AML Money laundering refers to the exchange of money or assets that were obtained criminally for money. It also includes money that is used to fund terrorism, however it’s obtained. Introduced in May 2018, FS organisations must put in place controls to prevent their business from being used for money laundering: checking the identity of your customers checking the identity of ‘beneficial owners’ of corporate bodies and partnerships monitoring your customers’ business activities and reporting anything suspicious to the National Crime Agency (NCA) making sure you have the necessary management control systems in place keeping all documents that relate to financial transactions, the identity of your customers, risk assessment and management procedures and processes Syncsort Confidential and Proprietary - do not copy or distribute
  • 37. AML – where DQ helps deliver compliance DQ processing is typically used as prerequisite to a bank’s internal AML process It uses key steps such as parsing, standardisation and cleansing to ensure the bank’s own data is of the highest standard possible. It also allows the organisation to link all monetary activities to specific individuals, giving the firm the best chance of identifying and combatting potential money-laundering and other financial crimes, and take appropriate actions. Syncsort Confidential and Proprietary - do not copy or distribute
  • 38. DQ: enabling accurate matching & suppression Syncsort Confidential and Proprietary - do not copy or distribute PRE-DQPOST-DQ Once standardised and cleansed, the bank’s data then has the optimum chance of matching data on sanctions lists of known money launderers, criminals or terrorists.
  • 39. When banks transfer money and data SWIFT messages are the format or schema used by financial institutions to exchange data SWIFT messages are complex data structures consisting of five blocks of data including three headers, message content and a trailer. Data Quality is paramount for operational, reporting, governance, and AML requirements. DQ ensures SWIFT message quality Syncsort Confidential and Proprietary - do not copy or distribute
  • 40. 50K|/809615 01178139~MR BOB WONG~53 NEEDLESS RD~LINCOLN LINCOLNSHIRE~LN21 |52A|BEASHKHHXXX|59|/1995 8242 207458~WONG MEI LING AND WONG BOB|57A| 5 | CANADA SQU LONDON|SENDER|LOYDGB2XXX| RECEIVER|BKCHHKHH Title Forename Recoded Forename Surname HouseNo StreetName StreetType City County Postcode Country Clean / Correct / Validation Cleanses, corrects, validates and enriches customer information on SWIFT message to enable accurate AML checks DQ: highlights & remediates data in-flight <OrderingCustomer> … <Name>MR BOB WONG</Name> <Address> <Line1>53 NEEDLESS RD</Line1> <Line2>LINCOLN LINCOLNSHIRE</Line2> <Line3>LN21 </Line3> </Address> … </OrderingCustomer> <BeneficiaryInstitution> … <BIC></BIC> <Address> <Line1> </Line1> <Line2>5 CANADA SQU </Line2> <Line3>LONDON</Line3> </Address> <Account/> … </BeneficiaryInstitution> Parse Syncsort Confidential and Proprietary - do not copy or distribute MR BOB WONG 53 NEEDLESS RD LINCOLN LINCOLNSHIRE LN21 ROBERT ROAD LN21 1RW GBR
  • 41. Match / Link / Deduplication Cleanses, corrects, validates and enriches Beneficiary Institution by matching BIC codes on SWIFT message to enable accurate AML checks DQ: highlights & remediates data in-flight Bank of America NA BOFAGB22SCP E14 5AQ Syncsort Confidential and Proprietary - do not copy or distribute
  • 42. If there was no DQ processing, it would directly increase the chances of unknowingly processing illegal transactions, and/or trading with known criminals. They would have failed AML regulation! DQ helps ensure DG compliance AML Summary Syncsort Confidential and Proprietary - do not copy or distribute
  • 44. 1. Start small: challenges & best practices Information overload Multiple versions of the truth Data challenges Lack of agility Identify Business Objectives • Increase revenue • Minimize risk • Decrease costs Secure Executive Sponsorship • Identify pain • Understand policies • Determine metrics Initiate Small Projects • Align to objectives • Adopt what you need • Adapt how you see fit • Gain quick wins Evaluate Progress • Understand successes/failures • Shift as needed • Establish a ‘way of thinking’ Syncsort Confidential and Proprietary - do not copy or distribute
  • 45. 2. Collaborate: challenges & best practices Lack of Common Terminology Organizational Barriers & Silos Isolated or Unknown Work Lack of Engagement Establish a Common Language • Define terminology – a ‘stake in the ground’ • Map information • Support with policies/standards Gain Broader Buy In • Bring stakeholders together • Build the structure, culture, ownership, steering groups, stewardship over time Enrich Information • Discover what you don’t know • Resolve differences • Enhance/annotate to increase insight Share Insights Regularly • Produce and share tangible outcomes • Highlight ‘wins’ • Demonstrate efficiencies & savings Syncsort Confidential and Proprietary - do not copy or distribute
  • 46. 3. Quantify: challenges & best practices Hidden Activities Money, Time and Resource Waste Lack of Transparency and Trust Disconnect Between Process and Measures Identify Baseline Measures • Keep a focus on lean and agile • Define value accurately for the business Link to Business Performance • Create and refine streams of value • Transform culture through action and empowerment Monitor, Report and Remediate Issues • Continuously review • Ensure issues are visible and understood • Understand root causes • Address/resolve issues Quantify Impact of Changes • Demonstrate through clearly understood measures • Establish value continuously • Finish early, finish often Syncsort Confidential and Proprietary - do not copy or distribute
  • 48. The accuracy of data directly impinges on any activity downstream – from analytics, reporting & dashboards, segmentation & targeting, customer care through to risk & compliance… in fact ANY business decision! DQ not only strengthens DG compliance; it also means you make SENSIBLE BUSINESS DECISIONS Summary Syncsort Confidential and Proprietary - do not copy or distribute