139
GEIA Standard Data Management GEIA- 859 This Standard Was Developed under EIA Project PN 4888 1 1 2 3 4 5 6 7 8 9 10 11 12

Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

GEIA Standard

Data Management

GEIA- 859

This Standard Was Developed under EIA Project PN 4888

1

1

2

3

4

5

6

7

8

9

10

11

12

Page 2: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

ContentsForeword.................................................................................................................................... viivii

Introduction..................................................................................................................................... 1

Scope ....................................................................................................................................... 1

Overview................................................................................................................................... 22

Terminology.............................................................................................................................. 33

References............................................................................................................................... 54

1.0 Principle: Define the Enterprise Relevant Scope of Data Management...........................75

2.0 Principle: Plan for, Acquire, and Provide Data Responsive to Customer Requirements 239

Introduction............................................................................................................................. 239

2.1 Enabler: Establish General Requirements for Data.................................................2510

2.2 Enabler: Develop Data Strategy and Data Concept of Operations..........................2611

2.3 Enabler: Determine Specific Data Requirements.....................................................2712

2.3.1 Determine the Needs for Data.............................................................................2712

2.3.2 Identify the Users of the Data and Establish the Frequency of Data Delivery.....2915

2.3.3 Relate Data Requirements to the Functional Areas Responsible for Data Generation and Distribution.................................................................................2915

2.4 Enabler: Perform Risk Analysis...............................................................................3016

2.5 Enabler: Authenticate Data Requirements...............................................................3218

2.6 Enabler: Contract for Data.......................................................................................3318

3.0 Principle: Develop DM Processes to Fit the Context and Business Environment in Which They Will Be Performed...............................................................................................3520

Introduction........................................................................................................................... 3520

3.1 Enabler: Determine the Complete Set of Requirements that the DM Solution Must Address....................................................................................................................3621

3.2 Enabler: Determine the Shape of the DM Solution..................................................3823

3.3 Enabler: Compare the Proposed, Best Solution to Existing and Planned Enterprise Capability (Infrastructure and Processes)................................................................4126

3.4 Enabler: Make Needed Adjustments in Processes, Practices, Policy, Organizational Alignment, and Infrastructure...................................................................................4227

4.0 Principle: Identify Data Products and Views So Their Requirements and Attributes Can Be Controlled...............................................................................................................4429

Introduction........................................................................................................................... 4429

4.1 Enabler: Develop Consistent Methods for Describing Data.....................................4530

4.1.1 Ensure Data Interoperability Among Team Members..........................................4631

4.1.2 Apply Processes to Characterize Data and Data Products to Ensure Adequacy and Consistency.........................................................................................................4631

4.2 Enabler: Establish Relevant Attributes to Refer to and Define Data........................4832

iii

1

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

1617

18

19

20

2122

23

2425

26

2728

2930

3132

33

34

35

3637

38

2

Page 3: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

4.3 Enabler: Assign Identifying Information to Distinguish Similar or Related Data Products from Each Other......................................................................................................4934

5.0 Principle: Control Data, Data Products, Data Views, and Metadata Using Approved Change Control Processes..........................................................................................5136

Introduction........................................................................................................................... 5136

5.1 Enabler: Control the Integrity of Data, Data Elements, Data Structures, and Data Views.......................................................................................................................5337

5.1.1 Establish a Change Control Process that Imposes the Appropriate Level of Review and Approval.......................................................................................................5438

5.1.2 Provide a Systematic Review of Proposed Changes within the Change Process............................................................................................................................ 5539

5.1.3 Determine the Impact of Change to Include Associated Products, Data, Data Elements, Data Structures, and Data Views........................................................5640

5.1.4 Gain Approval or Disapproval of Changes to Data, Data Elements, Data Structures, and Data Views (Data Products) by a Designated Approval Authority................5741

5.2 Enabler: Establish and Maintain a Status Accounting Process, Reporting Tool, and Mechanism..............................................................................................................5742

5.3 Enabler: Establish and Maintain an Internal Validation Mechanism.........................5944

6.0 Principle: Establish and Maintain a Management Process for Intellectual Property, Proprietary Information, and Competition-Sensitive Data............................................6146

Introduction........................................................................................................................... 6146

6.1 Enabler: Establish and Maintain a Process for Data Access and Distribution..........6247

6.1.1 Define Access Requirements..............................................................................6348

6.1.2 Ensure Entitlement to Access and Use of Data Is Validated and Documented by the Proper Authority..................................................................................................6449

6.2 Enabler: Establish and Maintain an Identification Process for IP, Proprietary Information, and Competition-Sensitive Data...........................................................6550

6.2.1 Distinguish Contractually Deliverable Data..........................................................6550

6.2.2 Establish and Maintain Identification Methods.....................................................6650

6.2.3 Establish and Maintain Tracking Mechanisms for Identification of Data..............6651

6.2.4 Ensure Compliance with Marking Conventions and Requirements.....................6751

6.3 Enabler: Establish and Maintain an Effective Data Control Process........................6752

6.3.1 Establish and Maintain Control Methods.............................................................6752

6.3.2 Establish Mechanisms for Tracking and Determining Status of Data..................6852

7.0 Principle: Retain Data Commensurate with Value........................................................6953

Introduction........................................................................................................................... 6953

7.1 Plan to Ensure Data Are Available When Later Needed..........................................7053

7.2 Maintain Data Assets and an Index of Enterprise Data Assets................................7155

7.3 Assess the Current and Potential Future Value of Enterprise Data Holdings..........7457

7.4 Dispose of Data.......................................................................................................7559

8.0 Principle: Continuously Improve Data Management....................................................7760

iv

1

12

34

5

67

89

1011

1213

1415

1617

18

1920

21

22

23

2425

2627

28

29

30

31

32

33

34

35

36

37

38

39

40

41

2

Page 4: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

Introduction........................................................................................................................... 7760

8.1 Enabler: Recognize the Need to Continuously Improve the Quality of Data............7760

8.2 Enabler: Establish and Maintain a Metric Process and Reporting Strategy.............7861

8.3 Enabler: Monitor the Quality of Data to Improve Data and Processes.....................7962

8.4 Enabler: Improve Data Management Through a Systematic and Self-Diagnostic Process....................................................................................................................8063

8.5 Enabler: Establish the Necessary Tools and Infrastructure to Support the Process and Assess the Results..................................................................................................8164

9.0 Principle: Effectively Integrate Data Management and Knowledge Management........8365

Introduction........................................................................................................................... 8365

9.1 Enabler: Establish the Relationship Between Data Management and Knowledge Management............................................................................................................8365

9.2 Enabler: Cooperate with Knowledge Management Where DM and KM Intersect as KM Methods Develop.....................................................................................................8366

9.2.1 Understand the State of KM in the Enterprise.....................................................8367

9.2.2 Coordinate DM and KM Efforts............................................................................8367

10.0 Application Notes.........................................................................................................8468

List of FiguresFigure 1. Data Management Principles.........................................................................................22

Figure 2-1. Contemporary Data Management Model..................................................................249

Figure 2-2. Principle 2 Enablers——.........................................................................................2510

Figure 2-3. Data Environmental Assessment............................................................................2611

Figure 2-4. Review Project Life Cycle to Identify Data Requirements and Determine the Needs for Data............................................................................................................................... 2814

Figure 2-5. Identify Users of the Data Products and Establish When Data Will Be Needed....2915

Figure 2-6. Relate Data Requirements to the Functional Areas Responsible for Generating the Data.................................................................................................................................... 3016

Figure 2-7. Example Risk Portrayal..........................................................................................3217

Figure 3-1. DM Requirements...................................................................................................3520

Figure 3-2. Process for Understanding Requirements..............................................................3621

Figure 3-3. Process for Determining the Shape of the DM Solution..........................................3924

Figure 3-4. Process for Comparing Proposed Solution to Existing and Planned Enterprise Capability............................................................................................................................ 4227

Figure 3-5. Process for Making Needed Adjustments in Processes, Practices, Policies, Enterprise, and Infrastructure.............................................................................................4328

Figure 4-1. Data Product Identification Enables the Control of Requirements and Attributes. .4429

Figure 4-2. Process for Consistently Describing Data...............................................................4630

Figure 4-3. Develop a Process for Selecting Attributes.............................................................4833

Figure 4-4. Assign Identifying Information to Distinguish Among Similar Data Products..........5034

v

1

1

2

3

4

56

78

9

10

1112

1314

15

16

17

1819

20

21

22

2324

25

2627

28

29

30

31

3233

3435

36

37

38

39

2

Page 5: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

Figure 5-1. Establishing Control................................................................................................5337

Figure 5-2. Example Change Control Process..........................................................................5439

Figure 5-3. Maintenance of Metadata for Project Use in a Status Accounting Database..........5943

Figure 5-4. Validation of Status Accounting Data and Stored Data to Ensure Integrity.............6044

Figure 6-1. Principle 6 Flow Diagram........................................................................................6146

Figure 6-2. Process for Managing Data Access to Intellectual Property, Proprietary Information, and Competition-Sensitive Data.........................................................................................6348

Figure 6-3. Process for Identifying, Controlling, Tracking, and Protecting Intellectual Property, Proprietary Information, and Competition-Sensitive Data...................................................6550

Figure 7-1. Planning Decision Tree for Data of Sustained Value..............................................6953

Figure 8-1. Improving Data Management..................................................................................7760

Figure 8-2. Process and Reporting Strategy.............................................................................7861

Figure 8-3. Monitoring Data Quality..........................................................................................7962

Figure 8-4. Improvement Strategy............................................................................................7962

Figure 8-5. Self-Diagnostic Process..........................................................................................8063

Figure 8-6. Development of Objective Evidence of Improvement.............................................8063

Figure 8-7. Process to Establish Tools and Infrastructure to Support the Process and Assess Results................................................................................................................................ 8164

Figure 9-1. Understanding the Interdependence of DM and KM...............................................8365

List of TablesTable 1. Types of Data.................................................................................................................. 11

Table 1-1. Common Functions of Traditional Data Management..................................................75

Table 1-2. Overview of Data Management Tasks, Subtasks, and Needed Skills..........................97

Table 3-1. Creation and Acquisition of Data..............................................................................3722

Table 3-2. Responsibility for Updating and Disposing of Data..................................................3722

Table 3-3. Interdependent Requirements..................................................................................4025

Table 4-1. Metadata Examples.................................................................................................4732

Table 5-1. Example Elements of Database Functionality..........................................................5944

Table 7-1. Representative Refresh and Migration Intervals......................................................7357

Table 8-1. Examples of Data Management Metrics..................................................................7861

Table 9-1. Relationship Between Data and Knowledge............................................................8365

vi

1

1

2

3

4

5

67

89

10

11

12

13

14

15

16

1718

19

2021

22

23

24

25

26

27

28

29

30

31

32

2

Page 6: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

ForewordThe identification, definition, preparation, control, archiving, and disposition of data all require a sizable investment in labor, supporting systems, and time. The purpose behind enacting consistent, high-quality data management (DM) is to make certain that the enterprise reaps a return on this investment. DM applies effective processes and tools to acquire and provide stewardship for data. A well-designed DM process ensures that customers receive the data they need when they need it, in the form they need, and of requisite quality.

When DM principles are applied using effective practices, the return on the investment in data is maximized and product life-cycle costs are reduced. This standard is intended to be used when establishing, performing, or evaluating DM processes in any industry, business enterprise, or governmental enterprise.

This standard describes DM principles and methods using a neutral DM terminology. Sections 1 through 9899 8 are normative. Annexes are informative.

The methods of DM have undergone significant changes as paper documents transitioned to digital data and continue to evolve. As a result, many policies, manuals, and instructions for DM, which mostly addressed DM for defense products, became obsolete; they described procedures that were adapted to efficient paper-based management of paper deliverables. This standard is intended to articulate contemporarycontemporarycapture current DM principles and methods that are broadly applicable to management of electronic and non-electronic data in both the commercial and government sectors.

The standard is intended to introduce the basic principles of Data Management, provide an introduction to the enablers for each principle, and to introduce what may constitute some new concepts and tasks associated with the management of data. GEIA-HB-859 is the associated manual which contains how-to information for implementation of this standard in a variety of environments.

Development of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on Data and Configuration Management initiated task PN 4888 to develop a consensus standard for data management. This is the firstsecond release of the standard. Contributors to this standard are identified in Annex A.

vii

1

1

2345678

9101112

1314

1516171819202122

2324252627

28293031

32

2

Page 7: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

1

Introduction

Scope

Data is information (e.g., concepts, thoughts, opinions) that has been recorded in a form that is convenient to move or process. Data can bemay representbe tables of values of various types (numbers, characters, and so on). Data can also take more complex forms such as engineering drawings and other documents, software, pictures, maps, sound, and animation.

For the purposes of this standard, commercial and governmentmany enterprises concern themselves with three broad types of data. Table 1 lists them, indicates how each is used, and provides examples.

Table 1. Types of Data

Type Usage Examples

Product Collaboration Cost, schedule, and performance dataScientific data such as written notes and observation of phenomenaEngineering drawings and models, parts catalogs, software applications and their components, operational and maintenance instructions, and training materials

Business Collaboration Plans and schedules, financial information, software applications, inventory status, medical, facility, vacancy and human resource information

Operational Transactional records exchange

Orders, issues, receipts, bills of lading, usage data and invoices

Data management, from the perspective of this standard, consists of the disciplined processes and systems that plan for, acquire, and provide stewardship for product and product-related business data, consistent with requirements, throughout the product and data life cycles. Thus, this standard primarily addresses product data and the business data intrinsic required for to collaboration during product acquisition and sustainment. It is recognized, however, that the principles articulated described in this standard also have broader application to business data and operational data generally. It is also recognized that the data addressed by this standard is also subject to data administration, metadata management, records management, and other processes applied at the enterprise level, and that these principles must be applied in that enterprise context.

Data has many purposes, including stating requirements, providing proof of achievement, establishing a basis for long-term product support, and many others. Deliverable data (customer-accessible information) represents only a small fraction of the project data. In general, a vast amount of design, development, fabrication, and manufacturing data remains the intellectual property of the developer/producer, unless ownership has been transferred via contractual or other agreement. For example, in the legislation that authorized the budget for 2007 contained a section that changed the assumption of

1

1

2

34567

89

10

11

12131415161718192021

22232425262728

2

peg1012, 02/05/09,
This definition is not bad. I try to distinguish more clearly between information and data. Information is the medium of communication between humans. Data is a representation of information that is in a form that may be manipulated by machines.
peg1012, 02/05/09,
I will simply accept the definition provided, but I find this a peculiar way to distinguish different data types. I think the boundaries between these type definitions are very fuzzy making it often difficult to determine whether a given information asset is defined as one type or the other or possibly multiple types simultaneously.
peg1012, 02/05/09,
I will simply accept the definition provided, but I find this a peculiar way to distinguish different data types. I think the boundaries between these type definitions are very fuzzy making it often difficult to determine whether a given information asset is defined as one type or the other or possibly multiple types simultaneously.
peg1012, 02/05/09,
I am really struggling with making this make sense. This seems to be written from the perspective that commercial concerns such as financial institutions, health services and pharma, recreation and hospitality, retail commerce and countless other industries do not participate in data management requirements and or disciplines. This appears to be very focused on engineering and manufacturing of physical equipment – I’m not even sure that civil engineering projects such as dams, electricity generation/transmission, bridges, roads and such fit in very well.
peg1012, 02/05/09,
I am really struggling with making this make sense. This seems to be written from the perspective that commercial concerns such as financial institutions, health services and pharma, recreation and hospitality, retail commerce and countless other industries do not participate in data management requirements and or disciplines. This appears to be very focused on engineering and manufacturing of physical equipment – I’m not even sure that civil engineering projects such as dams, electricity generation/transmission, bridges, roads and such fit in very well.
peg1012, 02/05/09,
May represent
peg1012, 02/05/09,
This definition is not bad. I try to distinguish more clearly between information and data. Information is the medium of communication between humans. Data is a representation of information that is in a form that may be manipulated by machines.
Page 8: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

2

ownership of rights in technical data in defense acquisition programs. Further, the value of data is not limited to its use in support of a particular specific product: data may have a life cycle longer than that of the product it describes. For instance, data from previous projects forms part of the foundation for new product and process design. Data also supports the enterprise in process redesign and quality. Thus data is essential to competitive position. An enterprise’s dataif not properly safeguardedcan also be misused by a competitor to the competitor’s advantage. For these reasons, data is an integral part of an enterprise’s intellectual assets and overall enterprise knowledge.

Overview

This standard hascomprises has nine fundamental data management principles (Figure 1). Principles are high-level descriptive statements about describing high-quality DM; they establish what high-quality DM looks like. Each principle has a set of enablers, which provide the mechanisms of DM.

1

12345678

9

10111213

2

Page 9: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

3

Figure 1. Data Management Principles

Overview of Data ManagementOverview of Data Management

1. Define the 1. Define the enterprise enterprise

relevant scope relevant scope of data of data

management management 2. Plan for, acquire, and provide data responsive to 2. Plan for, acquire, and provide data responsive to customer requirements.customer requirements.

3. Develop DM processes to fit the context and 3. Develop DM processes to fit the context and business environment in which they will be performed.business environment in which they will be performed.

4. Identify data products and views so that their 4. Identify data products and views so that their requirements and attributes can be controlled.requirements and attributes can be controlled.

5. Control data, repositories, data products, data views, 5. Control data, repositories, data products, data views, and metadata using an approved change control and metadata using an approved change control process. process.

6. Establish and maintain an identification process for 6. Establish and maintain an identification process for intellectual property, proprietary, and competitiveintellectual property, proprietary, and competitive--sensitive data.sensitive data.

7. Retain data commensurate with value.7. Retain data commensurate with value.

8. Continuously improve data management.8. Continuously improve data management.FeedbackFeedback

9. Effectively integrate data management and 9. Effectively integrate data management and knowledge managementknowledge management

Two different viewpoints, corresponding to product and data life cycles, are important to DM. Product data (and related business data) is normally acquired or created as part of the development of a new product or similar initiative. This is the project perspective. Principle 2, which addresses the planning for and acquisition of data, and Principle 4, which deals with the identification of products, views, and related data elements, are written primarily from the perspective of the individual project. The remaining principles

1

1

2

3

456789

2

B, 02/05/09,
Need to replace figure
jms3725, 02/05/09,
Removed 9. from Figure 1.
Page 10: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

4

apply at both the project and enterprise levels. Principle 9 relates DM to knowledge management (KM).

The degree to which the DM principles in this standard apply to a product varies over the product’s life cycle. Similarly, they vary in applicability over the data life cycle. Some principles may not apply during every phase of either life cycle.

This standard addresses the functions of DM but not how to organize for DM. Each enterprise, for valid reasons, locates the functions of DM within enterprise elements that make sense within its own enterprise environment.

This standard is not intended for use as a compliance document or an evaluation mechanism for DM projects. It is intended for use as a source and reference document for either purpose. Appropriate application of the functions and principles in this standard enables the user to plan and implement a DM program for a product, project, or enterprise.

Terminology

During creation of this standard, significant effort went into using neutral terms wherever possible. Please see the Glossary, (Annex B) for the definition of those terms. Neutral terms used in this standard are provided in the glossary (Annex B). There is no intent to express preference for any particular terminology set. When planning and documenting a DM program, other aliases may be substituted for the neutral terminology. Three particular sets of terms deserve special mention. The first of these is the pair of terms “program” and “project.” In practice, the term “program” is often used to represent an undertaking that is larger in scope than a “project,” but such is not universally the case. This standard consistently uses the term “project.”

Second, this standard introduces some new neutral terminology used here in the context of DM for the first time. Where the terms are introduced for the first time, they are explained in context. The most important of these are probably the terms “data view,” “data view description,” and , “bill of data” (also called a bill of information)information”., and a set of terms associated with ownership and authorities..information).

Data normally has and will be a byproduct is the product or the result of engineering, management, financial, medical, retail, public works and other work efforts. This is true regardless of the enterprise. Historically, before the widespread availability of electronic databases, a deliverable data product generally resulted from locating, assembling, and presenting existing information in the format that a customer had specified. Because the technical work had to be done anyway, and its results recorded anyway, the cost of data of a data product was in locating, assembling, and presenting it. Given the effort and cost involved, it made sense to describe the result as a product. Over time, there was an increasing recognition that the imposition of customer-specified formats often increases cost without creating equivalent value, prompting a move to utilize supplier formats whenever possible. More recently, manual effort is being replaced by electronic

1

12

345

678

910111213

14

151617181920212223

242526272829

3031323334353637383940

2

peg1012, 02/05/09,
Rather than “byproduct” data is the “product” of these work efforts; or at least the engineering work effort. Management efforts sometimes result in changed human behavior.
peg1012, 02/05/09,
Rather than “byproduct” data is the “product” of these work efforts; or at least the engineering work effort. Management efforts sometimes result in changed human behavior.
peg1012, 02/05/09,
Rather than “byproduct” data is the “product” of these work efforts; or at least the engineering work effort. Management efforts sometimes result in changed human behavior.
Page 11: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

5

extraction from an existing database, and the cost of retrieving, packaging, and even “personalizing” the data is much smaller. Further, what gets captured is a snapshot of data as seen from a particular perspective, at a particular point in time. Products become views of the data in the repository. A “data view,” a generalization of the concept of a data product, includes the visual presentation of data by technologies such as digital images, geographical information systems, graphical user interfaces, multidimensional tables and graphs, virtual reality, three-dimensional presentations, and animation.*

The “data view description” provides the agreed-to content, preparation assumptions, intended use information, and (where applicable) format for a data view. The data product format can be specified in a data item description (DID), in an extensible markup language (XML) style sheet, or by other means.

The list of data views to be provided in accordance with a contract is a data bill of datainformation,data, an example of which is a contract data requirements list (CDRL). and all the relationships to associated data.. A data bill of datainformation is a multi-viewtwo-way concept: a buyer may need specific data from a supplier in order to operate a product or a supplier may need data from the buyer in order to perform under a contract. Further, in an integrated trading partner environment, both trading partners may obtain different views of the same data, as provided for in a data bill of informationdata, from a single data repository.

Insert Data BOI structure diagram here.

Ownership and authorities are found within the standard. An “owner” is the entity with legal rights to the information. When data are created using enterprise resources these data assets typically belong to the enterprise. This is no different thant the owner of a physical asset – a product, building tool or computer.

Finally, references to terms such as the “enterprise,” “organization,” “performing activity,” “developing activity,” or “producing activity” refer to the enterprise that is responsible for performing DM. It could beFor the purposes of this standard, enterprise may be an organization, a commercial entity or a government agency. It may also be an entity resulting from a select collaboration between companies, a facility within a company, a program, a large project, or a social group. Within these principles, review the relevant scope of the “extended” enterprise in relation to the application of data management within the environment. It could be a commercial entity or a government agency. References to the customer should be interpreted as the activity that specifies requirements. A customer may be external to the developing and producing enterprise; may be an internal customer such as marketing, management, or the using department; or may even be a supplier in a conventional sense.

* The term “data product” is ubiquitous, and the concept of a “data view” is entering the data management vocabulary. At the risk of some ambiguity, this standard retains the term “data product” until the concept of a “data view” becomes more widely accepted. However, data product is used in a generalized sense.

1

1234567

89

1011

1213141516171819

20

21222324

252627282930313233343536

234

5

Page 12: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

6

References

ANSI/EIA Standard 649, Configuration Management.

EIA Standard 836, Configuration Management Data Interchange and Interoperability.

Society of Aerospace Engineers Standard AS9034, Process Standard for the Storage, Retrieval, and Use of Three Dimensional Type Design Data.

1

1

2

3

45

2

Page 13: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

7

1.0 Principle: Define the Enterprise Relevant Scope of Data Management

Different enterprises come to different conclusions regarding the scope of DM. Traditionally, DM has been thought of as including five functions (see Table 1-2).

Table 1-2. Common Functions of Traditional Data Management

Function Tasks

Identification and definition

Develop and maintain standard data requirement descriptionsReview life cycle of project or program to determine needsIdentify data requirementsEnsure completeness and eliminate duplicationProvide support to program and enterprise management

Acquisition and preparation

Prepare internal data, as identified and prescribed aboveEnsure that supplier data requirements are negotiated and orderedEnsure that externally developed data meet requirements for internal use

Control Implement controls for import and export of dataImplement controls for safeguarding intellectual propertyImplement controls for configuration managementImplement prescribed forms/formats/screens for authorization and use requestsPrepare and maintain master inventory listsEnsure the appropriate marking of data (e.g., for proprietary data rights, classification, and records management)Maintain the current and historical metadata about data status and disposition (approval/disapproval, etc.)Document control processes

Disposition Establish and document records, custodians, and project-unique records management requirementsEstablish a plan for use of a document repository, whether physical or onlinePublish and make documents available

Archiving Create physical or digital files with appropriate archived informationCreate project files for decision-tracking historiesSubmit archival packages to higher and more general archiving facilities (internal or external) that specialize in data retention

Note: The functions in this table are distilled from GEIA data management panel experience and are intended to be representative rather than comprehensive.

Although these functions remain valid for DM, theytheythis set of functions are no longer represents a sufficient response to contemporary current DM needs. However, there are DM “pockets of excellence” in particular firms and agencies that have addressed the broader foundations of DM. Further, tTherethere has been some success in documenting contemporary methods in specific organizationsenterprises outside the realm of defense industries. Important strides have been made in expanding the application of advanced

1

12

34

5

6789

1011

2

Page 14: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

8

DM methods in the finance and pharmaceutical industries to comply with new government regulations. Other industries are implementing significant Data Management programs because of compliance with,organizations, in the software engineering capability maturity model (CMM), and in the requirements for International Organization for Standardization (ISO) 9000 certification. None of these, however, has yet brought a unifying, strategic focus to DM. The intent of this standard is to highlight the importance of the strategic DM and supporting infrastructure. Accordingly, GEIA Standard 859 defines a set of four higher-level DM tasks: functionstasksfunctions: (see Table 1-2). Of those four functions, DM execution encompasses almost all of the functions in Table 1-1; the other three functions are new. tasks:

:

DM strategy and architecture development

DM process and infrastructure design

DM execution

DM process and infrastructure maintenance.

Of those four tasks, DM execution encompasses almost all of the functions in Table 1-1; the other three tasks are new.

Contemporary DM requires a broad spectrum of skills. Again NotAgain Nnot all of the functions and tasks and subtasks in Tables 1-2 through 1-5 will be relevant to every organization performing DM. Therefore, each organization will also have its own specific requirements for DM skills.

The new tasks require skills that have not previously been demanded of data managers. It should be abundantly clear that most of the skills are not resident in existing DM enterprises, and probably will not be because of the diversity of enterprises. In a rapidly changing technological society, it is crucial to train and continuously improve the resources (people, processes, tools, budgets) that support one of an enterprise’s most valuable assets, data. DM is functionally responsible for ensuring that the integrity and accessibility of data are consistent with the users’ requirements. The data manager, to be effective, should be provided the opportunity to achieve expertise through training, experience, and mentoring. Areas of concentration include planning, acquisition, preparation, control, disposition, archiving, and communication.

A particular enterprise will not necessarily agree that all functions or tasks are part of DM as defined for that enterprise. Obviously, integration from a DM standpoint is improved by consolidating these functions and skills under one enterprise entity. However, the cost might be the sub-optimizationoptimization poor support- of of another process. Further,

1

123456789

10

11

12

13

14

15

16

17

1819

20212223

24252627282930313233

34353637

2

jms3725, 02/05/09,
What other three tasks?
Page 15: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

9

any particular enterprise may decide to simply forego one or more of these tasks—or at least to leave them unmanaged.

Principles 2 through 89 in this standard were generally written from the perspective that DM includes all of the major tasks functions and each of the tasksenumerated subtasks. shown in Tables 1-2 through 1-5..

Table 1-2 provides an overview of each of the four higher-level DM tasks defined by GEIA Standard 859. The overview includes a list of subtasks and a list of skills (the same set of skills is repeated for each task). Each skill is either essential for one or more of the subtasks or is not essential but might be appropriate in some circumstances. Annex C provides a more complete mapping between subtasks and skills.†

† The lists of subtasks and skills represent an informed estimate for purposes of illustrating the range and depth of contemporary data management functions and skills.

1

12

345

6789

10

23

4

Page 16: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

10

Table 1-3. Overview of Data Management Tasks, Subtasks, and Needed Skills

Tasks and subtasksFunction Needed skillsTasks Essential?

DM strategy and architecture Clerical Noa

Development of DM strategies Budgeting YesDevelopment of DM plans Cost/benefit analysis YesDevelopment of DM policies Strategic planning and management YesDevelopment of IP strategies Program management YesIntegration of DM and knowledge managementResourcing of DM requirements

Legal YesTechnical library management YesConfiguration management YesWarehouse management Noa

Database management YesElectronic data administration Noa

Process design and engineering YesSoftware engineering Noa

Knowledge management Yes

DM process and infrastructure design Clerical YesDesign of data access provisions Budgeting YesDevelopment of paper data formats Cost/benefit analysis YesDevelopment of electronic data formats Strategic planning and management YesDesign of DM processes Program management YesDesign and development of data environments Legal YesDevelopment of training syllabi and courses Technical library management YesDevelopment and management of metadata Configuration management YesDesign of data products and views Warehouse management Yes

Development of provisions for interoperability and interchange

Database management Yes

Electronic data administration YesProcess design and engineering YesSoftware engineering YesKnowledge management Yes

DM execution ClericalRequirements identification and definition b Budgeting YesDM risk assessments Cost/benefit analysis YesImplementation of prescribed formats b Strategic planning and management YesPrioritization of data requirements Program management YesControl of data requirements b Legal YesControl of deliverables received b Technical library management YesOversight of data preparation b Configuration management YesData marking b Warehouse management Yes

1

1

2

Page 17: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

11

Table 1-3. Overview of Data Management Tasks, Subtasks, and Needed Skills

Tasks and subtasksFunction Needed skillsTasks Essential?

Import/export control b Database management Noa

Preparation and maintenance of inventory master lists b

Conversion from paper to electronicManagement of data collaboratively developed via integrated product/process teams (IPTs) or similar methodsAdministrative management of intellectual propertyImplementation of access provisionsData archiving b

Data disposal b

Electronic data administration Yes

Process design and engineering Yes

Software engineering Yes

Knowledge management Yes

Yes

DM process and infrastructure maintenance Clerical YesRecurring DM training Budgeting YesManagement of electronic repositories Cost/benefit analysis YesManagement of paper repositories Strategic planning and management Yes

Program management YesLegal Noa

Technical library management YesConfiguration management YesWarehouse management YesDatabase management Yes

Electronic data administration YesProcess design and engineering YesSoftware engineering YesKnowledge management Yes

a Skill is not normally essential to any of the subtasks, but might be appropriate in some circumstances.b Previously existing task.

1

2

Joe Roman, 06/24/09,
DO NOT DELETE THIS TABLE.
Page 18: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

12

EnterpriseTable 1-2. Common Functions of Traditional Data Asset Management: Governance and Stewardship

The enterprise invests significant resources in the acquisition and maintenance of data assets. These assets should be managed similar to the manner in which hard assets such as inventories, facilities, tools and so forth are managed. The management of an asset is usually based upon policies that direct the manner in which the asset is intended to be handled. The establishment of policies and assurance of policy compliance is often referred to as the governance system for the asset class. The management system is responsible for the execution of the enterprise processes. When dealing with specific assets, it is incumbent upon the management system to abide by the policies established by the governance system that pertain to those assets.

1.1.1 Policy Framework

A policy framework is a hierarchy used to describe all the policies that pertain to an asset class. In this context the term “policy” is intended to mean any set of rules that govern human behavior with respect to the way in which the asset is to be handled. Although the policies are directed at human behavior, they also influence computing processes and environments specifically when dealing with data assets.

The policy framework also serves the purpose of tying the policies to their drivers. Drivers may come in the form of laws and regulations, contract language, executive initiatives or other management directives. In general, drivers are the external reasons that give rise to the policies. Understanding the relationship between policies and their drivers is important in order to accomplish impact analysis. Drivers are not static. For example, the interpretation of the law by either the regulatory agency or the courts may influence the rules set forth by policies and in turn the management of the information to which the policies apply.

A suggested policy framework is comprised of a four level hierarchy. At the highest level there would be a policy that declares information and data a valuable asset of the enterprise and as such it will be managed accordingly.

The next level of the hierarchy addresses the three primary domains of asset management, they are: life-cycle, security/protection/privilege and quality. These domains will be used to categorize the information policies and sensitivities at the lower two levels.

The third level of the policy framework is used to establish the categories within each domain that the enterprise must address. For example, the life-cycle domain may address policies in the categories of identification, classification, acquisition, change control and configuration management, retention and disposition. The security/protection/privilege domain may address policies in the categories of national security, export controlled information, personally identifiable information, proprietary information owned by the corporate entity and proprietary information belonging to entities outside the corporate

1

1

23

456789

101112

13

1415161718

1920212223242526

272829

30313233

34353637383940

2

Joe Roman, 06/24/09,
PAGES 12 THRU 23 – HIGHLIGHTED LINE REMAIN IN 859. REMAINDER OF TEXT TO BE MOVED TO IM STANDARD.
Page 19: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

13

entity. The quality domain may address policies in the categories of completeness, provenance (or lineage), accuracy, validity, timeliness, usability, availability, and so forth. The categories listed here are suggestive, each Information Authority will have to understand their own environment and determine the appropriate set of categories accordingly. For example, if the environment does not include information sensitive to national security, then there is no need to address this category.

Finally, the lowest level of the framework is used to establish the detailed controls necessary to specify the rules by which information is to be managed. For example, in the category of personally identifiable information, there would be health history, payment card information, work history, payroll records, EEO complaints and so forth. The basic method for determining whether or not a different policy is required is to examine the handling rules. In the domain of protection/security/privilege the rules are generally about who may view/alter the information under what set of circumstances (disclosure roles – also called groups – and rules) as well as how the information is marked upon disclosure. If the disclosure roles and rules are identical for work history and payroll records, then one policy is sufficient for both classes of information, however, if the disclosure roles and rules are different, then two policies would be required. Generally speaking policies will be in a many-to-many relationship with information classes. Policies should be designed to minimize the total number of policies while simultaneously keeping the rules as simple as possible. Policy design is a non-trivial task. Properly designed policies can often be supported by automation that guarantees compliance. A detailed discussion of policy design is a lengthy and complex subject which is not appropriate for this document.

It is important to understand that the policies should be managed separately from the data assets (this sets a requirements for certain capabilities of a metadata management environment which are beyond the immediate discussion). The data assets must be identified and classified, the policies should then be associated with the information classes (whenever possible) rather than individual data asset instances. It is not uncommon for a given data management environment to contain millions of data assets with hundreds of relevant policies. It is virtually impossible to manage change in such an environment one-by-one. If a retention rule changes from 3 years to 7 years the steward responsible for managing the data assets will want to be able to make the policy change once and have it immediately reflected on all associated data assets. This will only be possible in an environment where the policy is associated with the appropriate classes of data assets. The metadata must be present so that the data asset instances may inherit the policies established for the classes to which they belong.

No discussion of policy is complete without at least mentioning general computing security controls. These are controls such as virus protection, password authentication to the network, whole-disc encryption, back-up and recovery procedures and so forth. These controls are not specific to any class of data assets. Rather they apply to the entire computing environment and may be considered part of the infrastructure. These may be interpreted as policies that apply to all data assets irrespective of class. In a manner of speaking they constitute the base set of default controls.

1

123456

789

1011121314151617181920212223

24252627282930313233343536

37383940414243

2

Page 20: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

14

1.1.2 Governance and Stewardship

The identification and classification of information as well as the creation and management of policies requires human effort. The roles and associated responsibility, authority and accountability (RAA) that undertake these tasks with respect to the data assets is called the Information Governance System.

Every enterprise will have a number of intersecting governance systems. These governance systems are often organized by functional responsibility. Each governance system is structured around the asset class that is the primary responsibility of the functional organization. For example, engineering organizations are generally responsible for product definition, inventory management organizations are generally responsible for inventories, information technology organizations are generally responsible for computing resources, facilities organizations are generally responsible for physical plant and real estate, and so forth. All organizations have information that they are responsible for, therefore they must all participate in the information governance system.

The degree to which these governance systems are formalized usually depends on the size of the organization. Larger organizations demand greater formality than smaller ones. As noted earlier, there is a difference between the governance system and the management system. The identification of assets that belong to a governance body and the creation and management of the policies assigned to those assets is the domain of the governance system. The daily execution of the business process is the domain of the management system. The management system is guided and constrained by the policies established by the governance system. While these two systems are not always clearly defined, they always exist.

Some of the distinguishing features that set two systems apart are as follows:

1

1

2345

6789

1011121314

151617181920212223

24

2

Page 21: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

15

GovernanceFunction

ManagementTasks

Strategic AlignmentDM strategy and architecture development

Functional AlignmentDevelopment of DM strategies

Development of DM plansDevelopment of DM policiesDevelopment of IP strategiesIntegration of DM and knowledge managementResourcing of DM requirements

Establish PolicyDM process and infrastructure design

Implement PolicyDesign of data access provisions

Development of paper data formatsDevelopment of electronic data formatsDesign of DM processesDesign and development of data environmentsDevelopment of training syllabi and coursesDevelopment and management of metadataDesign of data products and viewsDevelopment of provisions for interoperability and interchange

Life-Cycle PerspectiveDM execution

Time-Bound PerspectiveRequirements identification and definition

DM risk assessmentsImplementation of prescribed formatsPrioritization of data requirementsControl of data requirementsControl of deliverables receivedOversight of data preparationData markingImport/export controlPreparation and maintenance of inventory master listsConversion from paper to electronicManagement of data collaboratively developed via integrated product/process teams (IPTs) or similar methodsAdministrative management of intellectual propertyImplementation of access provisionsData archivingData disposal

Value-Stream PerspectiveDM process and infrastructure maintenance

Process-Bound PerspectiveRecurring DM training

Management of paper repositories Management of electronic repositories

Technical Alignment Technology Utilization

1

1

2

Joe Roman, 06/24/09,
DELETE THIS TABLE IN 859. MOVE TO IM STANDARD.
Page 22: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

16

In that a governance system is comprised of people in roles with RAAs, there must also be a management system inherent in every governance system. RAAs are carried out via process execution. While this may seem confusing, it should be clear that the mission and goals of the two systems are clearly different as depicted by the chart.

The primary mission of the governance system is to designate those assets subject to governance and establishing the policies by which they will be managed. It is imperative that there be a clear chain of authority for a system of this nature to function. For this reason, most governance systems adopt a hierarchical model for the policy setting functions. However, the governance system is also charged with ensuring policy compliance. In that information tends to be cross-functional by its very nature, the compliance functions of the information governance system tend to follow a matrix model. There are additional functions necessary to carry out the mission of information governance. These roles will be described in the chart below, although they usually do not report to the Information Authority.

Following is a suggested set of roles and RAAs for a formal information governance system. There is more than one way to distribute the RAAs necessary to achieve the goals of an information governance system. Therefore, this is not the only model that will deliver the desired result. However, it is important to understand the RAAs assigned to the different roles. If this model is not adopted, then the RAAs must be satisfied in some other manner. Also, it is important to understand that there is not necessarily a one-to-one correspondence between people and roles. A given person may fill more than one role and a given role may require more than one person. It is desirable to have at least a primary and a back-up person in every stewardship role. Also, the level of effort will depend on the maturity of the system. An immature environment where some of the RAAs have been neglected will require more effort to get through the bow-wave of work than a mature system.

Role RAA

Information Owner This is the entity with the legal rights to the information. This is no different from the owner of hard assets. Most often this will be a corporate entity rather than an individual.

Information Authority This is the individual who is responsible to protect and discharge the rights of the owners of all the data assets within his or her span of control. Most often this will be a high level manager, usually director level or above. All Information Authorities are peers to one another with respect to the Information Governance System.

Policy Steward This individual is a delegate of the

1

1234

56789

1011121314

151617181920212223242526

2

Joe Roman, 06/24/09,
DELETE THIS TABLE IN 859. MOVE TO IM STANDARD.
Page 23: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

17

Information Authority and a peer of the Compliance Steward. The primary responsibilities of this individual are to identify and classify the data assets and to establish and manage the policies that apply to those assets. This person needs to understand the full life-cycle and value stream for the information assets under his or her span of control.

Compliance Steward This individual is a delegate of the Information Authority and peer of the Policy Steward. The primary responsibility of this individual is to monitor data asset instances for policy compliance and react to non-compliant conditions when they are found.

Information Custodians The Information Custodians are all the people who provide support for the Information Authority, but typically do not have a reporting relationship to that person. Most of the Information Technology organization is in this group. Other persons who might be in this group are members of the legal organization who are subject matter experts on regulations that impact information management, records management functions, librarians, historians and archivists and so forth. Each enterprise must make a determination with respect to the members of the Information Custodians.

Process Authority (Process Owner) The Process Authority is the source of communication requirements. These requirements are satisfied by a design process that results in the identification, classification and definition of data assets. The policy Steward must work with the Process Authority (or delegate) to ensure that the Data Assets satisfy the communication requirements of the business process.

Knowledge Worker The Knowledge Worker creates (or otherwise acquires) and uses data assets

1

2

Page 24: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

18

during execution of the business process. The knowledge worker must understand and comply with the policies that are associated with the data assets pertinent to his or her job. The knowledge worker also must work with the Compliance Steward when non-compliant conditions are found and support the subsequent root cause analysis and corrective action tasks.

The Information Authority, Policy Steward and Compliance Steward are the heart of the information governance system. For this reason, these three roles will be discussed in greater detail.

Information Authority

The Information Authority should be appointed by the Executive Council. Without executive engagement the information governance system is unlikely to succeed. The Information Authority must be accountable to the highest levels of the enterprise. While the Information Authority should be accountable to the executive council, this individual remains responsible to protect and discharge the rights of the information owners of the data assets within his or her span of control.

It is not uncommon for several different information owners to be represented. The information environment of even small enterprises usually includes not just information belonging to the enterprise, but customer and supplier information as well. It is also common to find licensed software, copyrighted publications, market surveys, demographic studies, etc with contract restrictions on disclosure, replication, and so forth. In order to manage an asset, it must be identified. The Information Authority needs a complete inventory of those data assets that are within his or her span of control. It should be obvious that the Information Authority is not responsible to establish and manage the policies for every data asset in the inventory, but this individual is responsible for compliance with the policies that pertain to the data assets in their inventory.

The correct number of Information Authorities for a given enterprise is not an easy question to answer. Typically, there is one Information Authority for each major function of the enterprise (HR, Finance, Engineering, Manufacturing, Supply Chain Mgmt, etc). But there are some valid reasons to have more or less than one. In small organizations, it may make economic sense to have a single Information Authority with responsibility for more than one function. But more often the situation is one of having more than one Information Authority for a given function.

Some multi-national enterprises have very complicated legal landscapes. With operations in numerous countries these organizations must abide by the local laws and regulations

1

1

234

5

6789

1011

1213141516171819202122

23242526272829

3031

2

Page 25: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

19

where they maintain operations and they must simultaneously abide by the laws of the location in which they maintain their corporate residence. For example, the Safe Harbor regulations for personally identifiable information that are found in the EU are different (and more restrictive) than similar regulations in the US. Different regulations will give rise to different information management policies. When these situations exist, it probably makes sense to have more than one Information Authority with policy management responsibility.

Another situation that may give rise to multiple Information Authorities within a major function may be the result of span of control issues. Many large enterprises sub-divide their engineering, manufacturing and possibly other functions by product or product group, or even subsidiary business entities. In this environment the Information Authority for product group A would not want to be held accountable for policy compliance of the data assets associated with product group B due to the fact that his or her span of control does not extend to those data assets. However, all other things being equal, there should only be one set of policies irrespective of product group. For example, if both products involve foreign project participants the same export control regulations (international traffic in arms regulations, ITAR, for defense products and export administration regulations, EAR, for commercial products) are in effect. When these conditions prevail, the Information Authorities must reach an agreement with respect to the responsibility for policy management. Ultimately, there should be only one policy that governs the disclosure and markings for each protected technology.

The Information Authority is vested with a great deal of responsibility. And typically, as a high level manager these responsibilities represent only a segment of this persons full scope. A delegation structure is necessary in order for the Information Authority to faithfully execute these responsibilities. In the governance model described here, there are two primary stewardship roles that satisfy this delegation of authority. As noted above, these roles are the Policy Steward and the Compliance Steward.

It is necessary and appropriate for the Information Authority to delegate most of the responsibilities that demand daily or frequent attention. However, there are a few responsibilities that should be retained by the Information Authority or if delegated, it should only be done so on a limited basis. These responsibilities are as follows:

Appointment of Stewards: As with any delegation of authority, it is important to seek advice and counsel, but the Information Authority should always take full responsibility for the final decision regarding the individuals to whom he or she will delegate their responsibility.

Setting Priorities: It is important that the actions of the Policy and Compliance Stewards be coordinated. This can best be accomplished if the Information Authorities work together to set priorities.

Granting Exceptions: When not constrained by law, regulations or contract, the Information Authority may grant exceptions from policy compliance. This authority should not be delegated

1

1234567

89

101112131415161718192021

222324252627

28293031

32333435

363738

394041

2

Page 26: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

20

Resolving Conflict: The Stewards may not always be able to reach agreement regarding the responsibility for certain data assets and policies. When an impasse is reached, the Information Authorities must resolve the conflict.

Final Approvals: Information classification. policy decisions, corrective actions and other information management decisions are not without financial implications. The Information Authority needs to understand the costs, associated risks and make sound business decisions when approving recommendations made by the stewards.

Policy Steward

The Policy Steward must maintain a value stream view that covers the full life-cycle of the data assets within his or her span of control. Although the Policy Steward is responsible for the following tasks, this individual is not expected to perform all this work in a vacuum. First and foremost, the Policy Stewards must function as a team. There may be contention regarding the responsibility for certain data assets. The Policy Stewards should make every effort to reconcile these disputes, only when they simply cannot reach an agreement should the conflict be elevated to the Information Authorities for resolution. Further, while the Policy Steward has the responsibility to insure that the appropriate policies are created and maintained, this individual is not necessarily expected to understand all the legal intricacies of every regulation that drives policy statement. The Policy Steward must seek out the appropriate subject matter experts to assist in the formulation of policy statements. In addition, the Policy Stewards must consult with the Compliance Stewards in order to make sure that the rules set forth by the policy statements are pragmatic and can be implemented with a reasonable investment in training without undo impact to the business process. Further, if certain policies are subject to automation in order to guarantee a high degree of compliance, the Policy Steward will usually have to work with Custodians in the IT community in order to achieve the desired results. The primary responsibilities of the Policy Steward are:

Data Asset Identification: The Policy Steward must create and maintain the inventory of assets that are within his or her span of control. If there is more than one Policy Steward reporting to an Information Authority, the sum of the inventories assembled by the Policy Stewards designate the total inventory for the Information Authority. Care must be taken so that there is no dual counting or orphaned data assets in the process of assembling the inventory.

Data Asset Classification: To as great an extent as possible, data assets should be managed by class rather than by instance. In most cases, the inventory of data assets can be stated at the class level rather than a physical count of individual data assets. Determining the class granularity can be difficult. A data asset is a discrete, individually identifiable entity such as a purchase order, invoice, part geometry, marketing video, training presentation, etc. A class is simply the unique identifier for the definition of a group of data assets that share similar properties and purposes. For example, a specific purchase order let to a specific supplier represents a data asset instance usually identified by a unique purchase order number. “Purchase Order” is a class identifier for all the specific data asset instances. “Purchase Order” may not be

1

123

4567

8

91011121314151617181920212223242526

272829303132

33343536373839404142

2

Page 27: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

21

sufficiently granular. If there are significant differences between the way production purchase orders and MRO purchase orders are managed, then these two types of purchase orders require separate classes.

Data Asset Class Definition: Each data asset class must be described with respect to its purpose, structure, content and other important properties.

Data Asset Evaluation: Evaluation is another complex subject which will only be introduced here. Data asset evaluation is also a moving target. Just like hard assets, data assets are perishable so their value changes over time. Data asset value is generally assessed at the point in time when the asset is at the point of greatest value (usually this is near the point of acquisition). While there are many ways in which valuation may be determined, one of the more common approaches is to rate the data asset with respect to the three parameters: confidentiality, integrity and availability (CIA). Each parameter is designated on a five-point scale and determined by assessing the potential damage to the enterprise should the condition occur. For example, if the subject data asset is potentially export controlled, then the impact of disclosure of the data asset to a person not entitled to view such information must be evaluated. This condition may result in revocation of export licenses, heavy financial penalties and loss of business confidence in the enterprise. This would probably be ranked “5”. This same method is used to assess the integrity and availability parameters. The individual CIA values are averaged (sometimes they may be weighted first). The result of this process is the valuation score. The higher the score, the more valuable the data asset. Although this system of assessing value is somewhat subjective it is relatively easy to apply and tends to provide reasonably consistent results.

Data Attribute Definition: When the data asset is “structured”, that is composed primarily of individual attributes (or data elements), each attribute must be identified with a unique name, description and set of characteristics such as data type, valid range of values, business rules, etc.

Policy Management: The policy framework provides a listing of the policies which must be created, maintained and managed. This framework forms the basis of the policy management responsibility. The Policy Stewards must collectively review the policy framework periodically to ensure that it reflects the current environment for the enterprise. In addition, they need to come to agreement with respect to who has the responsibility for each policy in the framework. The Policy Steward needs to work with the appropriate subject matter experts and custodians to create those policies which are indicated by the framework, but do not exist. They also need to ensure that all existing policies are current with the legal landscape and management directions. Policies are data assets. At the lowest level of the framework, the level at which automation is implemented, policies are structured data assets. As stated earlier, design of a policy system is a complex subject, so it will not be developed here, nevertheless, the goals of a policy system are set forth as follows:

1

123

45

6789

101112131415161718192021222324

25262728

29303132333435363738394041

2

Page 28: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

22

o Policies must be relatively easy to understand. This goal supersedes all others. To some extent automation may be implemented to guarantee policy compliance for electronically stored and transmitted data assets; however it must be remembered that information management policies are ultimately intended to guide human behavior. Certain policies may require specialized training, nevertheless, policy language must be “controlled’ and declarative logic is preferred over procedural logic.

o Minimize the total number of policies

o Share as many attributes as possible (e.g., roles or groups should be common across all policies that use roles)

o Take advantage of existing infrastructure items (if the environment already has an identity management application, use it, although data quality issues may have to be addressed)

Manage Policy Assignment: The information management policies must be associated with the information classes as appropriate. As previously noted, the policy drivers are not static, so policies are subject to change. Before changes are introduced, the Policy Steward needs to do an impact analysis in order to determine exactly what is to be changed and who will be impacted. Coordination with the appropriate Compliance Stewards is usually necessary so that the changes can be introduced under a well-managed process. It must be remembered that policies are intended to direct human behavior, therefore policy revisions must be a coordinated effort rather than an independent action.

Compliance Steward

That which gets measured gets managed. Monitoring and measuring compliance is an essential component of the governance system. Compliance is the point at which the governance and management systems intersect. While the Policy Steward must maintain a strategic perspective, the Compliance Steward has a tactical view and a quality assurance responsibility. The Compliance Steward is responsible for monitoring activity against instances of the data assets to assure that the policies are being complied with. As such, the Compliance Steward needs to be knowledgeable about the business process that creates, acquires or uses the data assets. It is not unusual to have more than one Compliance Steward monitoring the same data asset at different points in the value stream and different times in the life-cycle. Following are the primary responsibilities of the Compliance Steward:

Monitor Policy Compliance: Some policies can be monitored via reporting mechanisms. The Compliance Steward is responsible for working with the appropriate Custodians to design the monitoring reports, running them on a periodic basis, analyzing the results and taking action if non-compliant conditions (or negative trends) are found.

1

1234567

8

910

111213

141516171819202122

23

2425262728293031323334

3536373839

2

Page 29: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

23

Knowledge Worker Focal: Often the discovery of non-compliant conditions takes place during the execution of the business process. The Knowledge Worker is usually the person who makes this discovery. When this situation arises, the Knowledge Worker must report the condition to the Compliance Steward so that the reasons for the non-compliance can be investigated.

Severity Evaluation: Every non-compliant condition should be recorded; however they vary with respect to impact to the business. The severity of the condition must be assessed in order to determine what action to take next. If the situation is not too serious and it appears to be an isolated incident, it may not warrant any follow-on activity. On the other hand, if the severity is very high, or the condition appears to be part of a trend, further investigation may be required.

Lead Root Cause Analysis: When investigation is warranted, the Compliance Steward has the responsibility to lead the effort to determine the source of non-compliance.

Propose Corrective Action: Corrective actions usually have two components: first, taking action in order to eliminate the source that has given rise to the non-compliant condition. Second, it is not unusual for there to be a number of data assets that are already in a non-compliant state, a corrective action plan must be created in order to address those data assets which are in this condition. The corrective action must be justified by a business case. Separate actions may be warranted based on the position of the data assets with respect to the value stream and life-cycle. Those data assets that are current and active may require significant effort to correct, while other data assets that are near the end of their useful life may be left alone. The Policy Steward, process management and the Information Authority may all participate in the review of the corrective action plan.

Implement Corrective Actions: Once corrective action plans are accepted, they must be implemented. Depending on the situation the corrective action may require a project plan and engage a number of resources. The Compliance Steward is responsible for the plan and its execution.

Represent Process Management: As mentioned earlier, the Policy Steward and Compliance Steward are members of a peer group. The Compliance Steward is the voice of process management with respect to policy management. The Compliance Steward must validate policy proposals to ensure that they will be understood and are of a pragmatic nature.

1

12345

6789

1011

121314

1516171819202122232425

26272829

3031323334

2

Page 30: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

24

2.0 Principle: Plan for, Acquire, and Provide Data Responsive to Customer Requirements

Introduction

To provide data that is responsive to customer requirements, DM solutions plan for, acquire, deliver, or arrange access to data consistent with the contemporary DM model (Figure 2-2). This principle addresses the steps in the DM model beginning with data need and ending with contract award.‡ Later principles discuss data development; storage, retention, and disposal; delivery and access; and other important related topics.

Figure 2-2. Contemporary Contractual Data Management Model

Five aspects of this model are important to planning for and acquiring data:

First, the data customer can be either external or internal to the enterprise.

Second, data can be provided to the customer in two different ways:

In hard copy or, increasingly, electronic form. In this case, there is normally some process by which the customer reviews and accepts the data in the form of a data product, such as a report. The customer then retains and is responsible for the representation of the data that is provided. Ownership (control authority)authority)authority)authority) may or may not transfer, depending on the terms of the contract or agreement.

‡ Here the term “contract” is intended to include formal contracts between two companies, formal contracts between a government agency and a company, interdepartmental work authorizations within a company, memoranda of agreement, and any other form of agreement that describes the duties of a supplier to perform DM for a customer. Data may also be provided through a stand-alone contract or, and more generally, as part of a larger contract for goods or services.

1

12

3

45678

9

10

11

12

13

141516171819

23456

7

peg1012, 02/05/09,
The Control Authority (the Boeing term is “Information Authority”) is the entity with the responsibility to protect and discharge the rights of the Owner. The Owner and the Control Authority may or may not be the same entity.
peg1012, 02/05/09,
The Control Authority (the Boeing term is “Information Authority”) is the entity with the responsibility to protect and discharge the rights of the Owner. The Owner and the Control Authority may or may not be the same entity.
peg1012, 02/05/09,
The Control Authority (the Boeing term is “Information Authority”) is the entity with the responsibility to protect and discharge the rights of the Owner. The Owner and the Control Authority may or may not be the same entity.
peg1012, 02/05/09,
The Control Authority (the Boeing term is “Information Authority”) is the entity with the responsibility to protect and discharge the rights of the Owner. The Owner and the Control Authority may or may not be the same entity.
peg1012, 02/05/09,
Be clear about the term “Owner”. This is the entity with the legal rights to the information (data). This is no different than the owner of a physical asset such as a building, tool, computer, etc.
peg1012, 02/05/09,
Be clear about the term “Owner”. This is the entity with the legal rights to the information (data). This is no different than the owner of a physical asset such as a building, tool, computer, etc.
Page 31: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

25

Through access to a database or repository maintained by the data developer or a third party. Data products in a conventional sense may not exist, and data objects may be formed at the time of need in response to customer-created queries against a database. Because the concept of a data product is so deeply embedded in the practice of data management, this standard will continue to use the term. However “data product” has a more generalized meaning than it has had historically.

Third, data development, review, acceptance, and disposal may be joint activities, conducted by the data developer and customer.

Fourth, planning for data is deliberately linked to the overall product acquisition strategy and long-term sustainment planning through development of a data strategy and data concept of operations.

Fifth, the data requirements authentication process, which almost always exists in some form, is preceded by a data risk analysis that examines the

risks of not providing for delivery or access to data and

risks of over-procuring data (e.g., where the data may become rapidly obsolete).

The enablers for Principle 2, which follow the logic of Figure 2-1, are diagrammed in Figure 2-3 and detailed below.

Figure 2-3. Principle 2 Enablers——

Enabler: Establish General Requirements for Data

At the start of a project, the first step is to review the project strategy and planning to determine the anticipated general needs for data delivery or access throughout the product life cycle. Because specific data requirements may not yet be known, a practical way to proceed is to examine the data requirements of recent, similar projects. The output of this enabler is a general description of potential requirements. At this point, before establishing a data strategy, it is not necessary or even desirable to attempt to define specific data requirements. This review should consider data that may be needed to support design oversight, business oversight, manufacturing, testing, operation and

1

1234567

89

101112

1314

15

1617

1819

20

21

22

2324252627282930

2

peg1012, 02/05/09,
No – This decision is dictated by the Owner and is the responsibility of the Authority. Disposal is a decision that balances legal requirements with business value. The developer is seldom in a position to do this. The customer makes this decision only when ownership transfers (in which case the customer becomes the new owner).
peg1012, 02/05/09,
No – This decision is dictated by the Owner and is the responsibility of the Authority. Disposal is a decision that balances legal requirements with business value. The developer is seldom in a position to do this. The customer makes this decision only when ownership transfers (in which case the customer becomes the new owner).
Page 32: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

26

maintenance, and documentation that will be needed for legal, tax, historical, internal audit, or other valid purposes. The intent is to recognize the spectrum variety of data views that may be needed to support the project tasks and products throughout the product life cycle. (As noted on page 5, a data view is a generalization of the concept of a data product. It includes the visual presentation of data by technologies such as digital images, geographical information systems, graphical user interfaces, multidimensional tables and graphs, virtual reality, three-dimensional presentations, and animation.) Included are not only project-specific requirements, but also related data that may be needed to meet broader enterprise or external requirements. It should be feasible at this point to anticipate the form in which the data will be required and if access or delivery is appropriate.

Enabler: Develop Data Strategy and Data Concept of Operations

This enabler is the project-level equivalent of Principle 3. Principle 3 provides a more comprehensive treatment at the enterprise level.

A data strategy is important because all decisions, including those related to data, have consequences. A data strategy creates the potential for data-related decisions to contribute to both short- and long-term goals for the project and enterprise by aligning DM with the context in which it lives. The general data requirements (Enabler 1) define the data “mission”what needs to be done for whom, how, and whythe first step in any strategic analysis. The next step in the formulation of a data strategy is a data environmental assessment (DEA) (Figure 2-4). The DEA, in the context of the general requirements, examines the following:

Internal strengths and weaknesses of the project and enterprise

External opportunities and challenges

Stakeholders and power sources.

Figure 2-4. Data Environmental Assessment

A strength, for instance, might be the existence of defined processes and accompanying technical infrastructure for vaulting electronic data. A weakness might be lack of training on those processes. Strengths promote and weaknesses limit the ability of the project to satisfy the project data requirements. Understanding opportunities and challenges external to the project reveals how the external environment can affect DM. An example

1

123456789

1011

12

1314

1516171819202122

23

24

25

26

27

2829303132

2

Page 33: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

27

of a threat could be a corporate intent to retire a database that the project had intended to use. A classic opportunity is an informed customer who creates a need to develop new capabilities that have market potential beyond that customer. Understanding stakeholders and power sources is important; stakeholders have to be satisfied, and power sources influence resource allocation. Taken together, strengths, weaknesses, opportunities, challenges, stakeholders, and power sources identified through the DEA define what can be done without change and what will need to change to satisfy the project data requirements.

The DEA outcome is the basis for defining a course of action to solve gaps and capitalize on opportunities. In other words, it determines if the needed capabilities will be in place and starts the process of creating them if they are not.

It is also essential to describe how those capabilities will be employed. This is the role of the data concept of operations. The data concept of operations should cover the following:

Who the customers will be

What range and depth of data will be provided, and over what period of time

What the nature of the business relationship will be and, if applicable, how it is expected to change over time

How data views will be generated and provided to the customer (e.g., hard copy, electronic copy, access to a data server)

How quality assurance will be provided

Where resources will come from.

Enabler: Determine Specific Data Requirements

Next, the enterprise must determine specific data requirements. The steps include determining the data needs, identifying users of the data and when the will be needed, and relating data requirements to the functional areas responsible for generating and distributing the data.

2.1.1 Determine the Needs for Data

The first step is to identify the data products that will be needed to support the project throughout its entire life cycle. Figure 2-5 shows the data product identification process.

The process begins with understanding the project life cycle and, in that context, reviewing the project requirements documentation to determine the types of data products that will need to be created. Both project-specific requirements and any other data that may be needed to meet enterprise or government requirements should be included. Not all data requirements may be documented at the start of a project. There may be a need to

1

12345678

91011

121314

15

16

1718

1920

21

22

23

24252627

28

2930

3132333435

2

Page 34: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

28

anticipate some data requirements based on the potential for future need. As discussed under Enabler 2.1, it may be useful to examine the requirements of similar projects.

The enterprise should recognize that the need for data products may change throughout the life cycle of the project. Management should assess the impact that any change to the project requirements has on the need for data products or the requirements for those data products.

Figure 2-5. Review Project Life Cycle to Identify Data Requirements and Determine the Needs for Data

Once the types of data products have been determined, their specific content and format requirements need to be defined. This task includes defining the processes used to create each different type of data product.

As a part of the process of defining requirements, consideration should be given to the tradeoffs between consolidating the requirements for similar data products versus providing the ability, possibly on the fly, to personalize products. Historically, when the

1

12

3456

78

9

101112

131415

2

Page 35: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

29

term “data product” meant the production of a hard copy, it was important to consolidate requirements for similar products to minimize the number of items to be created, managed, and maintained. With electronic access to data using integrated digital environment technologies, the benefits from personalizing the presentation of data to fit individual needs can outweigh the decreasing cost of doing so.

The end result should be a consolidated list of data products needed to support the tasks and products of the project throughout their entire life cycle, the format and content requirements for those data products, and process information necessary to ensure that the data products that are created will meet the noted requirements.

2.1.2 Identify the Users of the Data and Establish the Parameters that Determine When Data Will be Delivered.Frequency of Data Delivery

The next step is to identify the specific users of the data products and establish when the users need each of these items. A user may be either external to the enterprise—a customer in the usual sense—or an internal customer. Need may be defined in terms of specific calendar date or in relation to an event in the project life cycle. Figure 2-6 shows the steps included in this process.

Figure 2-6. Identify Users of the Data Products and Establish When Data Will Be Needed

The users who need access to each of the completed data products, and any interim data products, are identified based on life-cycle requirements of the project. If multiple areas use a data product, all areas that require the information should be recorded, along with the dates needed.

Identified users should be contacted to verify the data products that they need and the required need dates. If the data will be updated, or is periodic in nature, the necessary

1

12345

6789

1011

1213141516

1718

19

20212223

2425

2

peg1012, 02/05/09,
This is not quite specific enough to address threshold conditions that result in exception reports or other types of notification and information delivery. This is ignored in the flow-chart that terminates with list of data products and delivery dates. Also, thresholds are usually updateable parameters that may be reset at will any time during the life-cycle. So rather than agreeing on the specific event (or date), the agreement is on the parameters that are employed to establish the threshold conditions.
peg1012, 02/05/09,
This is not quite specific enough to address threshold conditions that result in exception reports or other types of notification and information delivery. This is ignored in the flow-chart that terminates with list of data products and delivery dates. Also, thresholds are usually updateable parameters that may be reset at will any time during the life-cycle. So rather than agreeing on the specific event (or date), the agreement is on the parameters that are employed to establish the threshold conditions.
DRD, 02/05/09,
Can I change this to “Parameters that Trigger Data Delivery” ?
Page 36: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

30

frequency for any updates also must be determined.

2.1.3 Relate Data Requirements to the Functional Areas Responsible for Data Generation and Distribution

This step, done in cooperation with the functional areas who will produce the data, is to determine who will provide the data and how. More than one functional area may be involved in the creation of some data products. Figure 2-7 shows the steps included in this process. As an input, the process requires a complete list of the data products required by the project.

Figure 2-7. Relate Data Requirements to the Functional Areas Responsible for Generating the Data

The process begins by identifying the functional area (or areas) responsible for generating each of the data products. If a data product requires input from multiple areas, the areas that provide source information and the area with final responsibility for the finished data product should be noted. In addition, the data requirements, including marking requirements, should be clearly defined and documented (see Principle 6). If an internal source is responsible for preparing a data product, enterprise procedures should ensure that data requirements are communicated to the responsible functional area(s). If a subcontractor or other outside source is responsible for preparing a data product, the requirements must be properly communicated. The enterprise should provide the functional area with the schedule and the supporting information, make sure they understand what is required, and secure commitment. If requirements were collaboratively developed, implementation of this step is simplified.

1

1

23

45678

910

11

121314151617181920212223

2

Page 37: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

31

Enabler: Perform Risk Analysis

Data management involves identifying the rishsrecognitionriskhsrecognition of multiple sources of risk, including the following:

Under-provisioning of the data—failure to provide data when it is needed

Over-provisioning data—providing data that is not useful or providing data prematurely, to the detriment of its accuracy

Inability to retrieve data as a result of non-existent or inadequate cataloguing and metadata

Data loss, whether due to misplacement, theft, or a natural disaster

Data obsolescence—retaining data that is of no value.

Compromise of intellectual property.

These and other sources of risk must be identified, and the different impacts of each risk should be estimated. For example, the loss of data will probably have several impacts of predictable types, whereas the inappropriate disclosure will impacts of a different type. .

Although the specifics of projects differ from one another, the following is a demonstrated risk analysis method:

Recognize and enumerate list the sources of risk

For each risk, determine the

likelihood of occurrence and

severity of consequence if the risk materializes.

Simple scales (e.g., high, medium, low) for evaluation often are adequate to characterize both likelihood and severity of consequence (Figure 2-8). Priority for risk mitigation then is given to those risks that, in relation to others, have combinations of higher likelihood of occurrence and severe consequences if they occur.and severe consequences (Comment Consequences of loss/corruption/destruction are somewhat different than unauthorized disclosure or theft. In any case, consequences may be categorized:

1) Competitive advantage (this may be impaired by loss)

2) Value to a competitor (this may come from disclosure)

3) Damage to brand/reputation in the eyes of the public

4) Damage to stock price or other measure of market value

1

1

23

4

56

78

9

10

11

12131415

1617

18

19

20

21

22232425262728

29

30

31

32

2

peg1012, 02/05/09,
Consequences of loss/corruption/destruction are somewhat different than unauthorized disclosure or theft. In any case, consequences may be categorized: 1) Competitive advantage (this may be impaired by loss) 2) Value to a competitor (this may come from disclosure) 3) Damage to brand/reputation in the eyes of the public 4) Damage to stock price or other measure of market value 5) Damage to customer/supplier trust and confidence 6) Regulatory risk (Trade Secrets Act, EAR/ITAR, PII, PCI, etc) 7) Contractual Agreements 8) Damage to operations – business continuity The categories may be graded on a 3 or 5 point scale.
Page 38: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

32

5) Damage to customer/supplier trust and confidence

6) Regulatory risk (Trade Secrets Act, EAR/ITAR, PII, PCI, etc)

7) Contractual Agreements

8) Damage to operations – business continuity

The categories may be graded on a 3 or 5 point scale. and severe consequences if they occur.

1

1

2

3

4

56

2

peg1012, 02/05/09,
Consequences of loss/corruption/destruction are somewhat different than unauthorized disclosure or theft. In any case, consequences may be categorized: 1) Competitive advantage (this may be impaired by loss) 2) Value to a competitor (this may come from disclosure) 3) Damage to brand/reputation in the eyes of the public 4) Damage to stock price or other measure of market value 5) Damage to customer/supplier trust and confidence 6) Regulatory risk (Trade Secrets Act, EAR/ITAR, PII, PCI, etc) 7) Contractual Agreements 8) Damage to operations – business continuity The categories may be graded on a 3 or 5 point scale.
Page 39: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

33

Figure 2-8. Example Risk Portrayal

Probability

Con

sequ

ence

Low Medium High

Low

Med

ium

Hig

h Theft of classified data

If delivered at outset, data will become obsolete

Unable to find data from prior projects

Re-hosting of electronic data may not succeed

Without access provisions, will be unsupportable.

Characterization of the first two sources of risk (under- and over-provisioning) is an important input to data authentication. It provides a basis for understanding and defending data requirements that should be satisfied, as well as those that should not. Understanding the other four sources of risk is important to process adequacy and potential process redesign. There may be other sources of risk as well; the list is not intended to be comprehensive.

1

1

2

3

456789

2

Page 40: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

34

Finally, risk management is an iterative process rather than a one-time event. Risk analysis is an inherent part of the data requirements definition and consolidation steps discussed earlier.is a process that continues throughout the life of a project; it is also a well-documented area of practice. There may be expertise in your enterprise’s information security, project management or another functional organization that the data manager can tap for assistance in using these techniques.

Enabler: Authenticate Data Requirements

Authentication is the capstone task before contracting for or authorizing internal development of data. The purpose is to make sure that requirements, as defined in a bill of data, are valid, complete, and make sense from a business standpoint. In authenticating data requirements, the enterprise should address the following questions at a minimum:

Are a DM strategy and DM plan in place to guide overall data acquisition for the affected project? Are the strategy and plan adequate? Does the proposed procurement of data follow the strategy and plan?

Does the proposed bill of data respond to user requirements? Specifically, does the content as well as the types, formats, and delivery or access timelines respond to user and enterprise needs?

Has a risk assessment been performed? Is the risk assessment reasonable—i.e., are the risks understood and the approach to risk mitigation reasonable?

Are the risks of the current requirements and the plan to support them, known and is their impact understood? Is there a plan in place that mitigates, avoids, transfers or accepts those risks? For information security risks, has the appropriate expertise (IT services and/or security, for example) assisted in the development of the assessment and plan?

Have requirements been adequately integrated to resolve duplicate requirements? Did the integration effort look for and resolve implied or missing requirements? Were non- or low-value added requirements identified and resolved?

Are adequate quality assurance measures specified so that the data received, generated, and used will be appropriate and suitable?

Have data rights issues been addressed adequately?

If future access or contingent requirements are involved, have data maintenance, configuration management, and (if appropriate) deferred data delivery, deferred data ordering, or third-party escrow been addressed?

Enabler: Contract for Data

Contract award is the final enabler for this principle. As noted earlier in the discussion of this principle, the term “contract” is intended to include formal contracts between two

1

123456

7

89

1011

121314

151617

1819

2021222324

252627

2829

30

313233

34

3536

2

peg1012, 02/05/09,
This can be a very complex task requiring special skills and knowledge that go beyond the normal scope of Data Management. This assessment needs to entertain social engineering vulnerabilities, boundary controls, network security, encryption, etc. A lot of factors that are not within Data Management disciplines. I wonder if it wouldn’t be better to phrase this along the lines of assessing whether there are significant differences between the current requirement and previous ones that would warrant a risk assessment by information protection and security specialists or something along those lines.
peg1012, 02/05/09,
This can be a very complex task requiring special skills and knowledge that go beyond the normal scope of Data Management. This assessment needs to entertain social engineering vulnerabilities, boundary controls, network security, encryption, etc. A lot of factors that are not within Data Management disciplines. I wonder if it wouldn’t be better to phrase this along the lines of assessing whether there are significant differences between the current requirement and previous ones that would warrant a risk assessment by information protection and security specialists or something along those lines.
peg1012, 02/05/09,
Along with evaluation of potential consequences. You might want to include a footnote that the discussion of risk assessment and evaluation of consequences is part of the larger topic of information protection and computing security – out of scope for this document.
Page 41: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

35

companies, formal contracts between a government agency and a company, interdepartmental work authorizations within a company, memoranda of agreement, and any other form of agreement that describes the duties of a supplier to perform DM for a customer. Data may also be provided through a standalone contract or, and more generally, as part of a larger contract for goods or services. What is contracted for can take many forms, including the following:

Data access under agreed-to provisions (for example, period of time, individuals who may access, purposes of access, and limitations). This approach is becoming increasingly important and does away with delivery, per se. “Delivery,” when it is needed at all, is effected by notification that the data is available to be accessed.

Conventional delivery at a specified time or in conjunction with a specified event.

Deferred data delivery. This approach is used when it is in the buyer’s interest, for example, when design is still evolving and what is desired is technical data that corresponds to the final design. Deferred data delivery establishes an obligation on the part of the supplier to deliver data up until some specified time period (e.g., 2 years) after contract termination or the date of acceptance of the last item other than technical data or computer software.

Deferred data ordering. This approach is used when a firm requirement for a particular data item has not been established before contract award but there is a potential need for the data. Under this provision, the buyer may order any data that has been generated in the performance of the contract, or any subcontract, until some specified time (e.g., 3 years) after contract termination or acceptance of all items other than technical data or computer software.

Third-party data escrow. This approach is used when it is not in the buyer’s interest to take immediate delivery of data, but the buyer needs assurance that data will be available to the buyer if the supplier goes out of business, if the supplier decides to stop supporting the related business line, or if, for any of a number of similar reasons, the supplier might be unable or unwilling to provide needed data. Placing the data in the hands of a disinterested third party protects supplier technology and intellectual assets until release under specified conditions. Provisions for periodic updates (e.g., when versions change) and verification can be included.

Also, as noted above, there is event based delivery. The customer specifies certain parameters such that threshold conditions may be established. Thresholds may be logically combined using Boolean operators in order to determine when a delivery takes place. As we progress deeper into the age of information over-load, it is safe to say that there will be increasingly sophisticated ways of specifying conditions under which deliveries take place as well as selective filtering of precisely what is to be delivered.

1

123456

789

10

11

121314151617

181920212223

242526272829303132

33343536373839

2

Page 42: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

36

3.0 Principle: Develop DM Processes to Fit the Context and Business Environment in Which They Will Be Performed

Introduction

To be effective, DM solutions, processes, and practices should be supported by a realistic analysis and understanding of the business context and environment in which they will be performed. The business context and environment are characterized by both internal and external factors; DM solutions are necessarily conditioned by those factors. Requirements to be satisfied come not only from projects themselves but also from future expectations related to projects, from enterprise policies and processes, and from the environment external to the enterprise. Taken together, these sources define the context and business environment in which DM will operate (Figure 3-9).

Figure 3-9. DM Requirements

In a particular circumstance, the project-specific, enterprise-wide, and externally imposed requirements can be complementary. In this instance, planning for their solution amounts to identifying all of the requirements and deciding, within available resources, which can be satisfied, when they can be satisfied, and how. But the requirements can also be in conflict. An example would be a requirement for enhanced data sharing and a simultaneous requirement to improve controls over intellectual property. Regardless of whether they are complementary,synergisticcomplementary,synergistic, additive, in conflict, or—more likely—a mixture of the three, it is DM’s task to identify and then address the full set of requirements, including examining tradeoffs where appropriate.

1

123

4

56789

101112

13

14

151617181920212223

2

Page 43: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

37

Principle 2 addresses the identification of project-specific requirements. Enterprise requirements and the requirements arising from the environment external to the enterprise are integrated with project-specific requirements by the current principle. This principle addresses the four major components of a successful DM solution:

Deriving the complete set of DM requirements

Determining the shape of the preferred DM solution

Comparing the proposed, best solution to existing and planned enterprise process infrastructure

Making needed adjustments that fulfill the total set of DM solution requirements by resolving gaps and conflicts.

Enabler: Determine the Complete Set of Requirements that the DM Solution Must Address

Before developing new DM strategies and solutions, the enterprise must identify the general set of requirements to be addressed. This includes not only the requirements for data, but also the broader requirements that relate to data capabilities and data processes. To identify these broader requirements, it is important to understand, at a minimum, the intended use of the data, related business objectives, technology issues, and external constraints. The steps listed in Figure 3-2 outline a process for developing a complete set of requirements.

Figure 3-10. Process for Understanding Requirements

Determine theexpected life cycle

of the data.Determine

requirementsfor access and

delivery.

Determine whowill create,

access, update,and dispose of

the data.

Determinerelated

businessobjectives.

Determinerelated

organizationalpolicies

Identifyexternalforces

As illustrated in Figure 3-2, among the essential considerations are the following, although this list is not exhaustive:

Determine the expected life cycle of the data and expected use of the data. Is data being developed or acquired against a one-time requirement, or is there likely to be a recurring requirement for the data?

1

1234

5

6

78

910

1112

13141516171819

20

21

2223

242526

2

Page 44: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

38

Determine who will create or acquire the data. At least three situations can apply: customer developed or acquired, developed or acquired for the customer, or collaboratively developed (Table 3-4).

Table 3-4. Creation and Acquisition of Data

Who creates or acquires

Passes through hands of data

manager? Considerations

Customer developed and provided

Yes Important to understand what the customer expects in the way of data inventory management and protection for data provided

Developed or acquired for the customer

Yes Realm of “traditional” DM and, assuming reasonably unambiguous requirements, the easiest for which to plan

Collaboratively developed

Probably no Growing in prominence as a result of increased use of IPTs and other trust-based relationships.DM task is to put in place the means and processes for IPT-level self-management as well as long term stewardship.

Determine the expected requirements for access, delivery, maintenance, storage, protection, and disposal over the life cycle. As an example, it is reasonable to expect that data created during the early design phases of a project will be important during later phases. As another example, it is important to determine if the customer is likely to want delivery or access.

Determine who, over the life cycle, will have access to, be responsible for updating, and be responsible for disposal of data (Table 3-5). Assess which of these cases is the most likely, and plan accordingly.

Table 3-5. Responsibility for Updating and Disposing of Data

Case Comments

Customer has requested delivery with no provision for updates

Customer may take responsibility for keeping the data current, or it is possible that the customer has not yet considered the need for update and disposal

Customer has requested, or is likely to request, either delivery or access sometime in the future

Customer will probably want the data developer to keep the data current

Determine if there are related business objectives and considerations. The following are examples of questions that should be addressed:

Will the data potentially be reused or repurposed?

1

123

4

56789

101112

13

1415

16

2

Page 45: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

39

Is there any provision for warranting the correctness of the data? If so, then this needs to be taken into account and planned for from both a process and financial standpoint.

Is any of the data important from an intellectual property standpoint?

If there is, or is likely to be, a requirement to provide for continued long-term access, what are the provisions for ensuring access if the enterprise ceases to exist in its current form (e.g., as a result of reorganization, a buyout, or a decision to abandon the line of business)?

Does the enterprise want to be in the business of data warehousing long-term retention and delivery (for either electronic or non-electronic data) or will this responsibility be outsourced to a third party?

Is the data requirement indicative of an emerging market for the enterprise, a market the enterprise is maintaining, or a market the enterprise intends to withdraw from? The appropriate investments (time, infrastructure, acquisition of staff, training) are different for each case.

Determine what enterprise policies pertain:

Does the enterprise have in place policies that promote either centralized or decentralized management of data?

Does the enterprise have in place policies related to retention and disposal?

Is there a formal or informal policy related to disaster planning and recovery, such as maintaining data in more than one physical location?

Identify what external forces apply:

Has the customer requested compliance with national or international standards? If so, it will be important to understand the extent to which changes in the standards, some of which cannot necessarily be foreseen, create new requirements.

Similarly, has the enterprise adopted national or international standards that apply?

Are there either national or international legal requirements (e.g., with respect to intellectual property such as patents or copyrights) that have to be respected?

Enabler: Determine the Shape of the DM Solution

Next, the enterprise must consider the broad characteristics of the DM solution and what it must address (but not how the solution will be implemented). A complete solution

1

123

4

5678

91011

12131415

16

1718

19

2021

22

23242526

2728

293031

32

3334

2

peg1012, 02/05/09,
This is ambiguous. Data warehousing has a particular meaning within the context of analysis and business intelligence (only relevant to structured data). There is also the notion of archival warehousing to satisfy disaster recovery and/or long-term retention requirements. The intent as used here is not clear.
Page 46: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

40

includes an analysis of all factors: internal, project specific, and external. Figure 3-3 illustrates the essential steps, a matter of applying standard systems engineering precepts to the development of a DM solution. Although the process in Figure 3-3 is portrayed as linear, it generally is iterative, especially requiring some cycling back and forth between development of alternatives and prioritization.

Figure 3-11. Process for Determining the Shape of the DM Solution

The enterprise should assemble the requirements identified by Enabler 3-1 in a form that can be worked with to design the DM solution. One way to do this is to list the requirements according to their source and relative priority. The following are examples of how requirements could be grouped:

Current external customer contract requirements for specific deliverables or access requirements.

Current internal customer contract requirements for specific deliverables or access requirements.

Supplier requirements—i.e., requirements for data to be provided to suppliers rather than external or internal customers. An example might be a set of envelope drawings that a supplier needs in order to proceed with detailed design.

Derivative, intermediate data sets required to satisfy external or internal customer requirements. As an example, even though a formal logistics support analysis may not be called for in the contract from an external customer, the logistics support analysis may still be needed in order to determine sustainment requirements and design a supply chain.

Anticipated near-term new contract or internal requirements for deliverables or access requirements.

Anticipated longer-term contract or internal requirements.

Requirements imposed by enterprise policy and practice.

Requirements, such as those found in the uniform commercial code or laws, that come from the environment outside the enterprise.

Normally, the requirements from the process just described are not fully independent of each other (Table 3-6).

1

12345

6

7

89

1011

1213

1415

161718

1920212223

2425

26

27

2829

3031

2

Page 47: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

41

Table 3-6. Interdependent Requirements

Case Comments

Duplicative requirements

Important to detect and look for ways to combine requirements so they can be satisfied with a single rather than multiple efforts

Conflicting requirements

Can be simple—such as needs for the same or similar data, but at different points in timeCan be more complex—such as competing needs for data sharing and protection of intellectual property rights

Synergistic requirements

Example is case where the data created in response to one requirement, when integrated with or augmented by data created in response to a second requirement, provides a solution to a third requirementAlmost always introduces time dependencies; important to capture interdependencies in a process chart, network chart, or by similar suitable means

The method for portraying integrated requirements varies from circumstance to circumstance. In some cases, a simple database is sufficient. In others, particularly where process and capability considerations are important, a narrative report may be required. A strong DM solution depends on a clear understanding of the relationships.

The enterprise should develop a set of alternative solutions for the comprehensive set of requirements. Each solution is a scenario: a particular combination of processes, enterprise elements, and infrastructure elements. The processes, enterprise elements, and infrastructure elements do not need to already exist. In fact, it would be a mistake to consider only existing elements, because doing so almost certainly constrains improvement. In particular, the enterprise should not be limited by preexisting policies and practices. These policies and practices are essentially the “residue” of previous decisions. Although valuable because they represent enterprise learning, they can also be counterproductive if that learning is not relevant to the problem being studied. The costsWhether or not tThe coststhe cost (monetary, labor, time, and good will) and benefits ofto changingofingto changinge changingto changingeto change policy or practice is worth it canshould be considered as part ofduring the alternatives analysis and evaluation process.

Generating alternative solutions is typically the most difficult of the steps, because it involves idea generation; it is harder to envision what could be than what already is. The enterprise should consider researchingresearchingresearchingcreating alternative solutions via literature searches, usethrough some form of a consultant with experience in the problem space, or researching off-the-shelf products. All of these approaches have the benefit of leveraging existing knowledge. If these approaches do not yield a solution that supports most of the requirements, then consider brainstorming exercise—an approach that has proven to create solutionbe effective. As an aid to creating alternatives, that incorporate, the enterprise should identify and consider incorporating best practices. When a set of candidate alternatives has been generated, a top-level, first-order analysis must be done to separate feasible from infeasible alternatives. For instance, there is no

1

1

2345

6789

101112131415161718

1920212223242526272829

2

peg1012, 02/05/09,
Bench-marking can be useful if the information is available. It can also be cost-effective to hire an experienced consultant. Literature search of trade journals and research organizations can also prove beneficial. In general, it should be assumed that this is not a totally new and unique set of conditions. Somebody, somewhere has probably dealt with something similar and there’s a good chance they wrote about it.
peg1012, 02/05/09,
Object oriented analysis expressed with UML models and an underlying repository should be employed (CASE tool is implied). UML is a standard which is increasingly recognized and understood world-wide. The repository is necessary to maximize re-use, disambiguate requirements and to identify and reconcile conflicts.
Page 48: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

42

point considering an alternative that violates rules of physics or would require resources beyond those likely to be available.

Next, the enterprise must prioritize the feasible solutions in terms of their ability to satisfy the requirements and their cost of implementation. This is almost always a matter of comparing multiple solutions in terms of their ability to satisfy multiple objectives. The comparative analysis involves the following steps:

Prioritize the requirements in terms of high, medium, low; on a nine-point scale; or through some similar notation.

Evaluate the ability of each solution to satisfy each requirement, again using an appropriate and complementary scale.

Evaluate the implementation cost—both monetary and non-monetary—of each solution on an appropriate scale (e.g., low, medium, high). Preparing precise cost estimates are not normally worth the effort at this stage of analysis.

Determine which alternative does the best job of satisfying the most important requirements at the most attractive cost and risk. Although this process can be painstaking, the tradeoffs associated with alternative solutions are frequently those most important to the decision-making process. Well-crafted solutions yield positive results for the enterprise, better processes and practices for the future, and even the development of competitive-edge methods.

The structured approach described above may show that no proposed alternative solution satisfies enough of the priority requirements to be acceptable. If this happens, then additional alternatives should be identified and analyzed. Even after considerable effort, it is possible to not have a feasible alternative. In this case, it may be necessary to go back one more step to make sure the requirements were correctly understood and, potentially, to challenge them. Those who established requirements did not necessarily have available to them an understanding of the feasibility or affordability of solutions that would satisfy the stated need.

The best solution is derived using all relevant considerations, framed in the context of benefits, risks, gains, and losses that other solutions may represent. The enterprise should review the ranking for reasonableness and, in addition, consider other factors that are relevant but may be difficult to quantify.

Enabler: Compare the Proposed, Best Solution to Existing and Planned Enterprise Capability (Infrastructure and Processes)

Because most organizations have some DM capability already in place, it is important to compare the needs of the proposed, best solution to existing and planned enterprise capability (Figure 3-4).

1

12

3456

78

910

111213

141516171819

2021222324252627

28293031

323334

353637

2

Page 49: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

43

Figure 3-12. Process for Comparing Proposed Solution to Existing and Planned Enterprise Capability

Enumerateprocess, practice,

policy,organizational, and

infrastructureassumptions of

preferred solution

Perform gapanalysis; compare

assumptions toexisting processes,practices, policies,organization, and

infrastructure.

Estimateimplementationcosts of needed

changes.

This process begins with a detailed examination of the preferred solution and identification of process, practice, policy, enterprise, and infrastructure characteristics that are required to implement it.

Next, a gap/overlap analysis is done to compare the needed characteristics to those of existing processes, practices, policies, organizational alignments, and infrastructure. For instance, if the preferred solution involves electronic storage of quantities of digital data over extended periods of time, the enterprise should determine if its infrastructure plans are supportive. Similarly, if the preferred solution involves processes different from those in place, then process reengineering is required.

The enterprise should identify any conflicts or roadblocks (e.g., plans to remove infrastructure that will be needed) that will have to be overcome or considered. Current processes, practices, policies, and infrastructure capabilities may not be in easily retrievable form. Part of the gap analysis may entail knowledge capture and a subsequent documentation effort sufficient to perform the gap analysis.

Finally, the enterprise must determine the monetary and non-monetary implementation costs of the needed changes. Because this estimate provides a basis for advocating for and allocating resources, the resources should be estimated in financial terms (e.g., in dollars) within an acceptable range of uncertainty (e.g., 10 percent).

Enabler: Make Needed Adjustments in Processes, Practices, Policy, Organizational Alignment, and Infrastructure

Using the comparison results derived in the previous enabler, the enterprise must make needed adjustments to resolve the gaps (Figure 3-5).

Figure 3-13. Process for Making Needed Adjustments in Processes, Practices, Policies, Enterprise, and Infrastructure

1

12

3

456

789

101112

1314151617

18192021

2223

2425

2627

28

2

Page 50: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

44

The process begins by identifying the needed changes in processes, practices, policy, organizational alignment, and infrastructure. (Some of this work will have been completed in the previous enabler.)

Using the comprehensive list of needed changes, the enterprise should develop a time-phased, resourced strategy to resolve the gaps. Devoting an appropriate amount of effort to developing this time-phased strategy is important for many reasons; some are listed below:

Not all requirements need to be satisfied up-front. Because money has a time value, projects to establish new capabilities should be initiated lead-time away from their need. There is also a secondary benefit of lead-time away implementation: there is less uncertainty what the requirements are.

The enterprise may not be able to provide all of the resources up-front. A carefully considered plan enables the enterprise to implement changes with the highest return on investment first.

Enterprises can absorb only so much change at once. Particularly where changes in processes, practices, and organizational alignment are involved, it is important to develop buy-in through appropriate education and other forms of outreach and communication. Time needs to be allocated for outreach and communication.

Once it has defined the strategy, the enterprise can implement it.

Finally, the enterprise should monitor the implementation of the strategy and make course corrections as needed. Aside from detecting implementation problems, it is unlikely that the solution was as completely correct as initially envisioned. Further, there will be fact-of-life changes in requirements as time goes on that the enterprise will need to address.

1

123

4567

89

1011

121314

15161718

19

2021222324

2

peg1012, 02/05/09,
This often underestimated and can be the largest part of the effort in both time and money. Buy-in is a three step process: UAS, understanding, acceptance and support. Only after support is gained can process change begin. Even here the change agents need to be constantly alert. It is possible for superficial changes to be made without making the desired substantive changes to the core of a process. This often demands a lot of diligence and strong executive sponsorship.
peg1012, 02/05/09,
This often underestimated and can be the largest part of the effort in both time and money. Buy-in is a three step process: UAS, understanding, acceptance and support. Only after support is gained can process change begin. Even here the change agents need to be constantly alert. It is possible for superficial changes to be made without making the desired substantive changes to the core of a process. This often demands a lot of diligence and strong executive sponsorship.
Page 51: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

45

4.0 Principle: Identify Data Products and Views So Their Requirements and Attributes Can Be Controlled

Introduction

Data is of value to the enterprise when it can be located or accessed by users.users; if data can be discovered, retrieved, and re-used across product boundaries, organization boundaries and across time, it is most useful. users. Metadata, or data about data, is essential for data managers and others to identify, catalog, store, search for, locate, and retrieve data. Metadata includes attributes and relationships and is further described in Enabler 4-1. Careful consideration of requirements when selecting elements of metadata enhances the ability of users to locate data regardless of storage medium or the amount of data stored. Creating standard processes for selecting metadata provides for consistent, uniform, repeatable processes that can be tailored to specific business requirements. Further, using uniform processes saves time, reduces cost, and enables projects to reap economies of scale through adoption by multiple users or enterprises that exchange data.

Not all data is delivered as a data product; if anything, the trend is away from delivery and toward access as needed. When access is provided for, an authorized user can retrieve data that has been grouped or organized to meet specific needs—what is referred to in this standard as a “data view.” Data views, whether implemented as queries, XML schema, or by other means, are described by metadata. It is important to define and control the metadata, particularly where the data views are complex and when it is important to ensure that the same view is provided each time it is needed.

The purpose of this principle is to ensure that metadata is selected to enable effective identification, storage, and retrieval of data so that the creation and retention of data can be properly managed. Figure 4-14 illustrates the process.

Figure 4-14. Data Product Identification Enables the Control of Requirements and Attributes

Identify users andrequirements

Develop consistentmethods for

describing data

Establish relevantattributes to define

data

Assign uniqueidentifiers

The process begins with identification of users and a review of the requirements to identify data that need to be developed or procured. This can be an iterative process that may reveal additional data requirements.

The enterprise should develop consistent methods for describing data. To avoiddata. Doing so avoids the confusion that comes from calling a data element an “author” in one context, “person_author” in another, “document_author” in a third, use tools such as

1

123

4

56789

101112131415

16171819202122

232425

2627

28

293031

323334

2

peg1012, 02/05/09,
In point of fact, the development of a controlled vocabulary requires relatively standard library tools. In the example if all three terms are in common use, it is not enough to simply assert “author” as the correct term. A thesauri is required in order to indicate “person_author” and “document_author” as synonyms to the preferred glossary term “author”.
Page 52: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

46

thesauri, a unifying taxonomy, or enlist a librarian to help develop a controlled vocabulary for use across multiple systems.and so on, when they all are describing the same thing.

After it has developed a consistent method for describing data, the enterprise can establish relevant attributes for the project’s data products and then assign unique identifiers. The unique identifiers, usually called “keys” in database terminology, are the attributes (e.g., document number and version number) that make it possible to unambiguously distinguish one product from another.

Enabler: Develop Consistent Methods for Describing Data

Although the types of data to be managed vary among enterprises and projects, the process for establishing metadata can be standardized.standardized.standardized.standardized. Standards for the development of metadata have been developed, and there are many standards that data managers should be aware of; some examples are:

The Dublin Core Metadata Initiative (http://dublincore.org/) is developing interoperable online metadata standards for different purposes, useful in different business settings.

The International Standards Organization develops standards for metadata and related technologies via its ISO/IEC JTC1 SC32 WG2 (http://metadata-stds.org/)

The World Wide Web Consortium works on metadata activities via its Semantic Web Activity (http://www.w3.org/2001/sw/).

There are also domain-specific standards (for example, the Content Standard for Digital Geospatial Metadata, and the Standard for the Exchange of Product Model Data (ISO 10303)), so data managers should be aware of those that exist for the domains in which they work)

standardized. Consistent development and use of metadata enable effective communications across enterprises exchanging data as well as within and between enterprises over time. The process for selecting metadata should be coordinated with users or other enterprises to ensure compatibility among those who will exchange data. Process templates can be used to provide a consistent, repeatable method for identifying the data products and flow of data among enterprises.

Attributes are the properties that uniquely characterize the data, such as document number, title, date and data type. A metadata record consists of a set of attributes necessary to describe the data in question. Although identification of attributes initially occurs during the early stages of planning, it should be seen as an iterative process throughout the data life cycle. New methods of data storage and new types of data may evolve, requiring different ways of storing and retrieving data. Changes to metadata should support multiple paper or electronic storage and retrieval approaches, while maintaining the integrity of existing attributes. See Figure 4-15.

1

123

45678

9

1011121314

1516171819202122232425

262728293031

3233343536373839

2

peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
In fact, there are standards bodies devoted to identifying, naming and defining metadata e.g. most notably, Dublin Core, http://dublincore.org/. Also within the engineering discipline there is STEP (Standard for the Exchange of Product Model Data), ISO 10303. I am not an expert on these standards, and there are a lot more out there, some generic and others industry specific. The point is to the greatest extent possible I recommend adopting standard names and definitions.
peg1012, 02/05/09,
This is not as simple as it sounds. One has to pay attention to how these identifiers are to be used by whom. System generated Object Identifiers (OIDs) are great for internal use of databases and content management systems, but these meaningless strings are hostile to humans. I’ve seen reports identified by their unique job numbers – IT knows what these are, but the intended audience hasn’t a clue. If the identified data product is to be externalized then it requires a meaningful (and unique) identifier. It may well carry an internal OID as well.
peg1012, 02/05/09,
This is not as simple as it sounds. One has to pay attention to how these identifiers are to be used by whom. System generated Object Identifiers (OIDs) are great for internal use of databases and content management systems, but these meaningless strings are hostile to humans. I’ve seen reports identified by their unique job numbers – IT knows what these are, but the intended audience hasn’t a clue. If the identified data product is to be externalized then it requires a meaningful (and unique) identifier. It may well carry an internal OID as well.
Page 53: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

47

Figure 4-15. Process for Consistently Describing Data

Business rules are needed to consistently describe data throughout the life cycle. The enterprise should consider selecting attributes from a “controlled vocabulary,” which is a limited set of consistently used and carefully defined terms. Without basic terminology control, inconsistent metadata diminishes the quality of search results. Ideally, the controlled vocabulary is not project specific but is created at the enterprise or higher level in the form of a standard data dictionary, standard ontology, or similar means and applied consistently to all projects (see Enabler 4.1.1).

4.1.1 Ensure Data Interoperability Among Team Members

When selecting metadata attributes, the enterprise should identify team members who potentially create data, update data, exchange data, enter data into a repository, or search for data. Team members should be contacted to obtain input and coordinate requirements. Although it is desirable to standardize attributes, it may be expensive to do so if existing data systems must be modified. An alternative is for each team member to map to a neutral standard. In any event, standards invoked by a customer should be flowed down to team members and understood by all parties. Use of standards, such as EIA-836, Configuration Management Data Exchange and Interoperability, and the Universal Data Element Framework (UDEF), enhances the ability to exchange data.

4.1.2 Apply Processes to Characterize Data and Data Products to Ensure Adequacy and Consistency

Processes should be developed to map the flow of data throughout the life cycle. The use of a template provides a consistent, repeatable method to identify data products and the flow of data among users. Use of templates helps ensure consistency across the enterprise in defining data products. Data owners and users are identified in the process, along with any requirements associated with metadata. A template, for instance, could help identify commonly needed fields for any product, the associated metadata, and valid entries for the data.

1

1

2

3456789

10

111213141516171819

2021

22232425262728

2

peg1012, 02/05/09,
OK – Yes, this concurs with my comment above regarding standards.
Page 54: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

48

Once processes are developed and tested, users should be trained in using the templates to identify the data products. Users should be provided with the templates along with instructions for use and possible tailoring. The purpose, expected results, and any ground rules should be identified to assist users with accomplishing their goals. Consistent use of the templates helps in the exchange of data among users. Table 4-7 is intended as a representative sample of some types of attributes that may be selected by an enterprise. Specific titles and descriptions are defined by the project or enterprise to meet specific requirements. A glossary, often referred to as a data dictionary, is required to define each attribute. An attribute such as “document type” can mean different things on different projects and to different enterprises, although the use of a controlled vocabulary acts to restrain proliferation. (review this table for any controlled term once glossary and terminology section are complete):

Table 4-7. Metadata Examples

Attribute Description

Author Originator of the document or file

Classification Level of security classification or business sensitivity

Contract identifier Contract number or other identifier

Date modified Date of revision

Date originated Date of document or file; may be date of creation, date of approval, or date entered into repository

Document number Unique number assigned to a document using a numbering convention developed by the enterprise or project

Document owner Individual authorized to make or direct changes to the documentwith legal rights to the document

Document size Physical size of document such as 8 1/2 x 11, 3 x 5, roll microfilm, etc.

Document type General content type such as report, plan, agenda, or test procedure

Environmental requirements

Environmental considerations for storage

File format Software application used to create the file, for example, Word, PowerPoint, ProE, or Adobe Acrobat; sometimes includes version, such as Word 6.0

File size Size of electronic file, usually identified electronically by the system when entered into a repository

File type Physical characteristics such as hard copy, microfilm, electronic, etc.

Enterprise identifier Enterprise, department, or project

Related document ID Other documents to which the document is related

Related product ID Products to which the document is related

Revision identifier Unique identifier for data revision or version

Rights Rights and limitations in access and use of data

Storage medium Electronic, file cabinet, card catalog, etc.

Subject Subject matter of the document or file

Submittal date Date of formal submittal to customer, trading partner, supplier, etc.

Title Document title or other descriptive information defining the content of the document or file

1

123456789

101112

13

2

peg1012, 02/05/09,
The whole point of creating this glossary is to reach an agreement on the use and meaning of terms. Nevertheless, I would suggest that the term “owner” should not take on new dimensions just because we are in the data realm. For virtually every other asset type “owner” describes the entity with legal rights to the asset. In many cases, this will not be an individual. The preferred term would be “Document Authority” or better still “Information Authority.” There is nothing dictating that the information should take the form of a document. In fact, the same information may have a number of representations, a document might be one of them.
Page 55: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

49

Enabler: Establish Relevant Attributes to Refer to and Define Data

Figure 4-16 shows the factors that should be considered when selecting attributes.

Figure 4-16. Develop a Process for Selecting Attributes

Identify formator physical

characteristics ofdata

Specifyparameters for

identifiers

Identifyrequirements for

accessrestrictions

Identify storageand retrieval

methods

Identify metricsto be tracked

Identifyrelationshipsamong data

elements

Evaluate costand benefits of

attributes

Reviewattributes forobsolescence

Cataloging, storing, and retrieving data depend on understanding the format of the data to be managed. Electronic files are managed differently than hard-copy paper or microfilm, so the physical characteristics should be considered when establishing attributes. File format, or the software application used to create or view the file, is relevant for retrieval of electronic files but not for data stored only in hard-copy format. The storage medium and file formats influence readability and reproducibility of the content. Microfiche, for instance, can pose important readability limitations.

The storage medium and file formats also influence the selection of attributes. Selection of attributes to support identification of storage medium is useful in planning for storage facilities. For example, identifying the file size of data to be stored electronically helps identify the resource allocation.

Access to data is restricted based on proprietary issues, security issues, or other limits in data rights. Thus, part of what is involved in selecting attributes is determining what attributes are needed to identify data that requires special handling or limited access. Providing for these attributes helps protect the enterprise from inadvertent disclosure of data to inappropriate parties. For more information, see Principle 6.

Requirements for tracking and reporting metrics also should be considered when selecting attributes. Metrics are typically used to monitor throughput and ensure that the process is operating as intended, or to ensure that resources are properly allocated. Enterprises that routinely track certain metrics should assist with creating standard attributes to enable the collection of metrics. For more information, see Principle 8.

The enterprise should identify relationships and their importance relative to other data elements in order to efficiently identify and manage related objects. For example, the attribute for document revision may be related to another attribute for date of revision. Relationships among products and data should also be considered. There may also be a

1

12

3

4

5

6789

101112

13141516

1718192021

2223242526

27282930

2

peg1012, 02/05/09,
“The enterprise” typically can not do this. This is an effort that involves the analysis of the complete life-cycle and value stream of the information. This is a governance task that should be the responsibility of the appropriate steward.
peg1012, 02/05/09,
The life-cycle of the information also needs to be taken into consideration. Storage media, retrieval time, accessibility, etc may be subject to planned changes over time. The information may be maintained on high-performance disc for a period, then moved to low-cost disc, then to archival optical WORM or tape and finally disposal beyond forensic recovery.
Page 56: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

50

need to create superior and subordinate relationships, or parent-child relationships, among data products. These relationships should be identified when selecting metadata attributes.

It is important to weigh the cost of creating and entering metadata attributes, as well as the potential benefits. If users are required to complete numerous metadata entries when placing a document in a repository, it is likely that documents will be entered with missing or erroneous entries, or that documents will not be entered into the repository at all. Potential attributes should be evaluated based on whether there is value added in tracking and locating data. The set of required attributes should be kept as small and simple as possible to enable a user to create simple descriptive records and provide for effective retrieval.retrieval. Any existing metadata standards should be tailored to meet needs.

Metadata attributes change over time due to evolving requirements throughout the life cycle. These changes include changes to the data repository (e.g., facility or system upgrades) as well as obsolescence. Part of the overall DM process includes periodic reviews of metadata attributes.

When making changes to attributes, the enterprise should consider the impact on legacy data. In a large repository, it may not be feasible to update the metadata of existing data, and it may be necessary to develop translation tables or similar mechanisms.

Enabler: Assign Identifying Information to Distinguish Similar or Related Data Products from Each Other

Data must be assigned unique identifying information, which commonly consists of a title, unique identifier (e.g., document number), the source of the document, date, and revision. Figure 4-17 shows the steps for assigning identifiers. The requirements for document identification are discussed in EIA-649, National Consensus Standard for Configuration Management, and EIA-836, Configuration Management Data Exchange and Interoperability.

1

123

456789

101112

13141516

171819

2021

222324252627

2

peg1012, 02/05/09,
A couple of other thoughts – To as great an extent as possible, attributes should be selected from pick-lists of controlled vocabularies rather than free-form entries. Also, as many relevant attributes as possible should be derived from environmental conditions. Hopefully, knowledge workers will be authenticated (as opposed to anonymous access), therefore the ID and date/time of the access will be known. The actions taken (create, read, revise, copy, print, etc.) may be recorded. A great deal of useful metadata may be derived.
Page 57: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

51

Figure 4-17. Assign Identifying Information to Distinguish Among Similar Data Products

Identify source forIdentifiers:

Internally developed orExternally Assigned

InternallyDeveloped?

Define IdentificationSystem

Assign Identifiersand Track Usage

Yes

No

The enterprise should ensure that a unique identifier is needed. Unique identifiers are assigned only to the data that needs to be tracked and controlled to meet ongoing needs for the data. The identifier provides a method for differentiating among similar documents and enables consumers to identify the information they need to perform their assigned tasks. It also helps to minimize the delay in retrieving the desired information, and the problems caused by the use of incorrect information.

1

12

3

456789

2

Page 58: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

52

5.0 Principle: Control Data, Data Products, Data Views, and Metadata Using Approved Change Control Processes

Introduction

This principle provides guidance that will ensure the integrity and timeliness of data, data elements, data structures, and data views by applying the principles of configuration management (CM).

DM and CM are two disciplines critical to the success of any project. They are strongly related and interwoven in their scope, application, and elements. Both are disciplines whose ultimate purpose is ensuring the integrity of the products they support. One of the functions of each of these disciplines is to control change or, for some types of data, to protect the data from change. It should be recognized that not all data requires formal change control or the same level of control;control; it is a matter of balancing cost and benefits. This principle addresses the body of data for which some level of control is appropriate.

An important factor to consider is when a data product is ready to be placed under formal data management control. This process implies a transfer of control (or stewardship) from the author or originating IPT to the data management control process.

The data product needs to be in a state of maturity that makes control both meaningful and productive. When judging when a data product should come under the data management control process, several factors should be evaluated: the completeness of the data product to fulfill its end use, whether it is ready (or needed) to fulfill that intended use and certainly programmatic constraints like schedule and need. It is at this point that the author (or originating IPT) delivers the data product to the program. product tofor use. this level of maturity, the intended condition of the data product when it will be put to use must be known and compared to the state of the data at the time of transfer. Consideration of the following factors is essential:

The format and media are in concert with the requirements.

The data is accurate and at an appropriate level of completeness.

The timing of the transfer is appropriate to the data product’s intended use (too early is just as critical as too late):

Too early often imposes unnecessary control when it is not yet appropriate.

Too late can cause time problems with the intended use.

The data product has been reviewed by an appropriate level of authority (e.g., engineering manager, IPT lead). DM receives the control-ready product from appropriate, predetermined sources.

1

123

4

567

89

101112131415

161718

192021222324252627

28

29

3031

32

33

343536

2

peg1012, 02/05/09,
When to establish the “baseline”. Unfortunately, the reality is that this is often schedule driven.
peg1012, 02/05/09,
Determination of the level of change control and configuration management is a policy decision that should be driven by an information governance system.
peg1012, 02/05/09,
Not sufficiently addressed in this section is the relationship of change control to configuration management. Depending on legal and contractual obligations there may be a requirement to precisely reconstruct the exact configuration of the data schema and instance values for each approved configuration. This can be accomplished by either taking a “snapshot” of every approved configuration and saving it in some tamper-proof manner or having a system by which every revision can be “backed-out” in order to restore a given configuration at specific point in time. Each approach has its pros and cons. The “snap-shot” method is relatively simple, but can be storage intensive and may miss configurations resulting from “emergency” change. The restoration method is less storage intensive, and if correctly implemented will never fail to restore exact configurations, but is also quite complex with respect to design and implementation.
Page 59: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

53

In large programprograms/projects, it may be appropriate to develop a formal process to cover this transfer as part of the general change control process. process.

It is important to develop buy-in through appropriate education and other forms of outreach and communication with the parties involved. Time needs to be allocated for outreach and communication with all related stakeholders. Acceptance, although important, is not sufficient. Active support is necessary.

The change control functions and principles defined in EIA-649, National Consensus Standard for Configuration Management, are appropriate for DM. While the CM process is defined for the control of product data, it valid for the formal control of data assets as well. It is widely recognized to provide the orderly discipline for change and provides the traceability to maintain the history of the approved revisions of the data assets. Knowing this change history is critical to reconstruct the exact configuration of the data asset. There may even be contractual requirements that demand this traceability.

As we maintain a revision history at each instance of the incorporation of approved changes a new baseline is struck. This baseline defines the configuration of the data asset at a point in time. The striking of a baseline may also be contract driven to support significant contractual events including the delivery of a baselined data asset to the customer.

For theseat reasons,For that reason, what is discussed here borrows heavily from CM and describes how the change control process applies to DM.

The levels of control, which can be formal or informal, are defined by the requirements of a project. It is important that the levels of control for data be identified and communicated at the beginning of a project. (Where DM is provided as matrixed support, such identification should be accomplished jointly by project management and DM.) The following discussion applies to data under formal change control.

Figure 5-18 summarizes the steps needed to provide control. Much of the process can be tailored as needed.

1

123

4567

89

1011121314

1516171819

2021

2223242526

2728

2

Lockheed Martin, 02/05/09,
Added in response to peg25
Lockheed Martin, 02/05/09,
, it is important to develop buy-in through appropriate education and other forms of outreach and communication. Time needs to be allocated for outreach and communication. Moved and expanded as per peg16
Page 60: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

54

Figure 5-18. Establishing Control

Processimplementation:

Review Approve Roll-out- Timing- Training

Plan process:

Contractrequirements

Localrequirements

Cost constraints

Determineprocesses:

Satisfyrequirements

Electronic/manual

Size & scopeof project

Tailor existingprocess?

Conceptapproval

Processimprovement:

Review process Make changes

(if necessary)

Design process:

Employ DMprinciples

Employ CMprinciples (asrequired)

Enabler: Control the Integrity of Data, Data Elements, Data Structures, and Data Views

DM ensures that data products satisfy requirements. Doing so, in part, requires that the integrity of the data products (see Principle 2 for definition) and associated data elements is maintained using a consistent change control process and that changes are traceable and baselined and are approved by an authorized approval authority.

Data retains value commensurate with its accuracy, timeliness, and relevancy to the business. The value added by the DM processes is the preservation of this worth. Business revenues are dependent, in part, on the compliance of the data to requirements and intangibly on customer satisfaction. Relevancy of the data will vary throughout the project. Data can vary in maturity and therefore importance. Data within a project undergoes continuous development, from working data to mature data, released data, submitted data, approved data, archived data, and possibly delivered data. At each of these stages, data possesses different levels of value and importance. Recognition of these relative stages is important with regard to the level of control that is imposed on the data. Some data is placed under change control at project inception, some is considered for formal control at a later date, and some may never be brought under any formal control.

A given project may also require different levels of control, depending on customer-imposed requirements, enterprise requirements, or maturity of the project. Decisions need to be made early in the process outlining which data “objects” (products, views, schema, queries, etc.) will require configuration control. It is also important to consider when control needs to be imposed, whether changes to data asset need to be traceable and baselined, and therefore what level of control is necessary.

1

1

2

34

5678

910111213141516171819

202122232425

2

Lockheed Martin, 02/05/09,
Added in response to peg25
Lockheed Martin, 02/05/09,
Added in response to peg25
Page 61: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

55

Determination of the level of changes control is a policy decision that should be driven by an information governance system (See Principle 1). The over-application of controls is just as inappropriate as too little control, and the application of control too soon is as inappropriate as too late. An appropriate change control process ensures efficient and effective processing of change requests without impeding design development, production, or operational readiness.

5.1.1 Establish a Change Control Process that Imposes the Appropriate Level of Review and Approval

Data Management CcontrolControl of data within a project is as important as Configuration Management control of the product’s design. In fact, accurate, controlled data is an essential support requirement for control of the product design. Figure 5-19 represents a basic change control process, (from basic control perspective), which can be tailored to meet the requirements of a particular project.

Figure 5-19. Example Change Control Process

Identify needfor change

Generaterequest for

change

Forward toreviewers

Conductreview

Provide reviewcomments

Provide impactassessment

Assemblechangepackage

Convenechange

control board

Addressrequest forchange

Dispositionchange

DetermineImpact ofchange

Addressimpact

comments

Addressreview

comments

Scheduleimplementation

Notifyaffectedparties

Implementchange

Close requestfor change

Update Status Accounting Data

1

123456

78

910111213

14

15

16

17

18

19

20

21

22

23

24

25

26

27

2

Lockheed Martin, 02/05/09,
Revised figure 5.1.2 – reordered boxes in third row.
Lockheed Martin, 02/05/09,
Change by JHR
Lockheed Martin, 02/05/09,
Added in response to peg25
Page 62: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

56

5.1.2 Provide a Systematic Review of Proposed Changes within the Change Process

One of the most important reasons for an organized change control process is the thorough review that is applied to a proposed change. This process provides critical information for the status accounting of the change, the change history, and the ultimate disposition of the change. Although it is not always necessary to exactly mimic the CM change process, the basic principles of good CM should be adopted.

The change authority plays a vital role in the configuration change control process. This authority evaluates requests for change based on information developed as a result of an administrative and technical review to approve (and implement) the change, disapprove the change, defer the change, or return the change request to the originator for rework. This change authority may take the form of a single project-designated individual or be implemented as a more formal change control board (CCB).

The change authority should evaluate the

validity of the proposed change,

interface effect on other data under control,

1

1

23

45678

91011121314

15

16

17

2

peg1012, 02/05/09,
It is often more effective to assemble the change package prior to assessing impacts. A well designed package can maximize the benefit to be realized from the changes with respect to the impacts that they impose. Notify affected parties rather than “effected” parties. Further, this step would better be named “coordinate” with affect parties as opposed to “notify”.
peg1012, 02/05/09,
It is often more effective to assemble the change package prior to assessing impacts. A well designed package can maximize the benefit to be realized from the changes with respect to the impacts that they impose. Notify affected parties rather than “effected” parties. Further, this step would better be named “coordinate” with affect parties as opposed to “notify”.
Page 63: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

57

impact on project areas other than the area recommending the change,

effect on established delivery schedules,

life-cycle cost effectiveness and the availability of funds, and

other factors pertinent to the project.

The configuration change control process begins with the preparation of a request for change. The form and format of this request, usually a formalized document that exists either on paper or electronically, is dependent on the project. Although this is not strictly governed by the configuration management requirements for the project, it may be advantageous to implement a format that is similar to the project’s CM request for change. The formality of the process depends on the requirements of the project.

After recording receipt of the request for change, an administrative review of the request for change and associated supporting documentation (making up the request for change package) may be required to determine if the request for change is acceptable for processing.

The project manager may designate a subject matter expert as the sponsor for the request for change and be responsible for conducting a thorough review. The key is selecting the correct reviewers for the requested change. Ultimately, they should represent those affected by the change.

This review provides the information needed by the change authority to make a reasonable, economic, and informed decision about the disposition of the change (approve, disapprove, defer, or return the change for rework).

This kind of process, in the teaming environment under which many projects are being conducted, also provides buy-in for the team participants. It allows the team to play an active role in both the technical and programmatic content of the project.

A structured means for disseminating the change package to the selected reviewers may be important. Consideration should be given to electronic workflow, but paper distribution may be more realistic in certain circumstances such as small projects. The change authority and/or the technical manager has the responsibility to ensure that the appropriate person sees and reviews each change. This responsibility normally may be delegated.

5.1.3 Determine the Impact of Change to Include Associated Products, Data, Data Elements, Data Structures, and Data Views

A significant benefit accrued in applying CM techniques to DM is in the management and control of data through providing a process for determining the impact of change.

There are several considerations relative to the execution of this process. As noted above, the selection of the reviewers is critical to the successful accomplishment of the impact

1

1

2

3

4

56789

10

11121314

15161718

192021

222324

252627282930

3132

3334

3536

2

Page 64: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

58

assessment. Reviewers should be subject matter experts, competent in understanding the technical areas associated with the proposed change.

It is often helpful to provide a set of criteria by which the assessment should be made. These criteria, which typically address, cost, schedule, and performance, may be as simple or as technically complex as needed.

The areas affected by the change and the extent and significance of the impact need to be determined. Some of the areas that might be affected by changes to a data element are

requirements,

specifications,

customer-furnished information,

supplier data,

contract,

de facto performance, and

cost or schedule.

The impact of a change is likely to be significant, but obtaining a precise statement of the impact and its potential consequences may prove to be elusive, reinforcing the need for effective selection of reviewers.

The review process entails ensuring balance between thoroughness and the timeliness of the review. Once this review is conducted and any impacts (and their potential consequences) are determined, the enterprise should create a concise written statement and forward it to the designated approval authority for action.

5.1.4 Gain Approval or Disapproval of Changes to Data, Data Elements, Data Structures, and Data Views (Data Products) by a Designated Approval Authority

After completing the processes for conducting reviews of changes, the process for determining change disposition follows logically. The formality of this process (e.g., a structured CCB or a single person authority) is dependent on the size, scope, and contractual requirements placed on the DM process.

The change authority disposes of the change in one of three four ways:

Approve the change and forward the change to the proper authority for implementation and ultimate closeout.

Disapprove the change. In this case, the disapproval is noted in the CCB recordrecor,d and the change originator/sponsor is notified.

1

12

345

67

8

9

10

11

12

13

14

151617

18192021

222324

25262728

29

3031

3233

2

Page 65: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

59

Defer the change. This could occur for a variety of reasons. For example, additional information may be required to make an informed decision, there may be a flaw in the supporting documentation submitted, or there are unresolved funding issues. The change is returned to the originator or sponsor for further correction, amplification, or clarification.

Repackage the changes – this is essentially a combination of the above, but it should be viewed as a separate action due to the influence it may have on budget, schedule and/or quality.

Regardless of the disposition, a notification is prepared and issued to those affected by or otherwise interested in the disposition. The form and formality of the notification vary from circumstance to circumstance. It is good practice to document not only the disposition but also the position (for or against, with reasoning) of each party to the decision. The notification also provides essential information for updating status accounting records, the “official” records of change dispositions.

Enabler: Establish and Maintain a Status Accounting Process, Reporting Tool, and Mechanism

A unique change control number is assigned to each request for change and entered into a change status accounting tracking system. The tracking system should include, as a minimum and as applicable, the date of request for change, request for change control number, priority, classification (if required), originator, request for change title, affected data items, date of receipt by the change authority, CCB meeting date (if there is no CCB, the disposition date), request for change status (approval, disapproval, deferral).

In addition to tracking change history, data sources and other project-related information should be accounted for and tracked. This data includes, but is not limited to, items delivered to the contractor by subcontractors. Examples of the type of metadata that may be recorded within the status accounting database are listed below:

Identification of data item

Source of the data item

Date delivered

Contract required date

Contract (or subcontract) reference

Format of item (hard copy, disk, CD, file)

Destination (who received a copy or who was notified of receipt)

Storage location of original

1

12345

678

91011121314

1516

171819202122

23242526

27

28

29

30

31

32

33

34

2

Page 66: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

60

Security classification (if applicable)

Export/import information (if applicable).

Establishing a status accounting mechanism is as important as establishing a status accounting process. This mechanism consists of the tools that support and complement the status accounting process.

The process for maintaining metadata, pictured in Figure 5-20, defines how the metadata is generated, gathered, and introduced into the status accounting database. The process largely defines the information that is stored in the database and sets the database requirements.

Figure 5-20. Maintenance of Metadata for Project Usein a Status Accounting Database

Project requirements, availability of technical database expertise at affordable cost, and reuse opportunities drive the architecture of the database. These elements have a bearing on whether the database is standalone, network centric, Internet centric (web based), a simple flat file, relational, homegrown, or a commercial product. Reuse of existing status accounting databases should be considered. Reuse can save time and money. Table 5-1 lists examples of the types of functions that should be considered.

1

1

2

345

6789

1011

12

131415161718

2

Page 67: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

61

Table 5-8. Example Elements of Database Functionality

Administrative functions User interfaces Data relationships and functions

Database securityUser permissionsAdministrative overridesAdministrative rights

Screen layoutsSign-on screensView screensInput screensOutput screens

ReportsAd hocUser generated

Data fieldsData formatsData relationshipsMetadata requirementsMetadata definitionsSearch mechanismsSearch criteria

Enabler: Establish and Maintain an Internal Validation Mechanism

Several key validations are required within the DM process (Figure 5-21). These relate to the status accounting process itself (as discussed in Enabler 5-2), the data stored in a repository (if used), and the data contained in the change status accounting database.

Figure 5-21. Validation of Status Accounting Data and Stored Data to Ensure Integrity

Validation of processes can be done by anyone, but frequently, they are best accomplished by the element of the enterprise charged with DM. There are several reasons for this:

The self-validation process helps to build lessons learned in a more meaningful fashion when conducted by the process owners.

The enterprise element charged with DM is most familiar with the DM processes.

1

1

23

456

7

8

91011

1213

14

2

Page 68: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

62

Correction of deficiencies is normally more expedient when responsibility is centralized.

Self-examinations can be conducted prior to, or in conjunction with, formal quality validations, thus expediting and adding integrity to a formal validation.

If a repository is available for a project to store significant data, the integrity of that data needs to be maintained. A self-validation can assess the completeness and uniqueness of the data items within the repository, adequacy of metadata, and similar essential characteristics. The validation should also ensure that each data item is worthy of storage and retrieval. Validations are a convenient time to reassess the continued value of data and to dispose of or archive it if appropriate. The validation can also examine the adequacy of protections for intellectual property.

1

12

34

56789

1011

2

Page 69: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

63

6.0 Principle: Establish and Maintain a Management Process for Intellectual Property, Proprietary Information, and Competition-Sensitive Data

Introduction

Intellectual property (IP) is a term used to describe real but intangible assets, embodied in such items as patents, copyrights, trademarks, and trade secrets. IP is at the center of an enterprise’s competitive position and ultimately contributes to financial success.§ For this reason, protection of IP is necessary to maintain an enterprise’s competitiveness. In many cases, it is also necessary to comply with legal obligations to trading partners, including suppliers and customers.

IP assets come from a variety of sources. In addition to internally developed data, IP is received from suppliers, subcontractors, and trading partners. All of this data is identified and tracked for protection based on data rights. Figure 6-22 illustrates, at a relatively high level, the management process for IP and its relationship with other DM principles. Lower-level processes are delineated under the discussions of enablers.

Figure 6-22. Principle 6 Flow Diagram

Identify data sourceVendor

SubcontractorTrading partner

Internally developed

Determineprotection

obligations andrequirements

Develop, defineand establish anIP identification

method(See Principle 4)

Ensure markingcompliance

Develop, defineand establish anIP control method(See Principle 5)

Validate data securityaccess

Establish processfor access levelsand definitions

Disposition data(See Principle

7)

The rights obtained from the provider through documented agreements, such as statements of work, license agreements, and contract negotiations, determine how IP is managed. These documents also define the ability to deliver the information obtained from a supplier to a third party, as well as the obligations and requirements to limit access and use are also defined in these documents.

There are several varieties of proprietary data. Some examples include general business information (available to the general public), information to be used only within the enterprise (internal use only), information developed by the enterprise that has monetary value (enterprise proprietary information), and enterprise-developed information that has been officially registered with a legal authority (registered proprietary information). Data

§ From a process standpoint, protection of classified data and protection of intellectual property are more alike than different. Here the emphasis is on intellectual property. The rules for management of classified data can be found in agency-specific government documents.

1

123

4

56789

10

1112131415

16

17

1819202122

2324252627

234

5

Page 70: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

64

not specifically typed but that might be construed as providing an enterprise advantage within industry is considered to be competition-sensitive data. Examples include information about best practices, proposal information, and tools implementations.

Enterprise policies for IP management provide a standardized way to type, mark, and identify the information; control and track ownership; manage rights to use and sell; control access; distribute; and dispose of IP within the enterprise. Management of IP requires the following:

Identify items that need to be protected and tracked.

Store items in a protected environment or repository with limited access.

Control access to and distribution of data dependent on data type and source.

Provide security as required by agreements and legal obligations.

In some instances, an enterprise needs to sell, purchase, or license IP for purposes such as establishing standards, developing business relationships, creating new and larger markets, and realizing strategic goals. Under certain circumstances it may even be in the best interest of the enterprise to place IP in the public domain. Irrespective of the reasons, thesettThese transfers should take place under stipulated conditions and be carefully controlled to protect the rights of the data originators and owners. Regardless of the type or source of IP, it should be managed as an asset of the enterprise. Failure to successfully manage IP can have personal, enterprise, national, and international implications.

The three enablers provide a basis for flexible and tailorable IP management.

Enabler: Establish and Maintain a Process for Data Access and Distribution

To effectively manage IP, a method for managing data access and distribution needs to be in place. Access to and distribution of data are critical to the protection of data rights. The process to support Enabler 6-1 is delineated in Figure 6-23.

1

123

4567

8

9

10

11

1213141516171819

20

2122

232425

2

Page 71: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

65

Figure 6-23. Process for Managing Data Access to Intellectual Property, Proprietary Information, and Competition-Sensitive Data

Establishdistribution

process

Post/distributedata

Validate datasecurity access

Establish securityprocess for

access levels anddefinitions

Identify distributionrequirements

Data approvedfor use?

Establish andevaluate user

needs andrequirements

Grant user read/write access(secure data)

Dispose of data

No

Yes

Evaluate IP rightsto data

The enterprise should review the types and varieties of IP that are to be addressed, and should create a method of controlling access and distribution. In a manual environment, IP may be managed through boundary controls such as limited access facilities andsuch asand as locked files or areas. In an electronic environment, electronic methods such as organizational and role-based access control are generally required to limit the electronic access to data.

Where enterprise policies and procedures do not exist, the enterprise should document the access constraints for the various types and varieties of data. Once this process is defined, it can be applied to all sources of data at all levels of the enterprise.

6.1.1 Define Access Requirements

Documented agreements should be reviewed to verify that access rights support the intended use by the enterprise. If rights to data are not authorized, the enterprise should evaluate data to determine the currency of the business need within the enterprise. At some point in the information life-cycle, the access restrictions may be relaxed and the security procedures may be reduced or removed. It is important to remove access constraints when appropriate because increased controls always comes at a cost to the enterprise. Obsolete IitemsItemsitems--iIitemsItems-- no longer current or needed-- should be disposed of in accordance with the enterprise or department retention schedules and authorization for the intended use. Contract negotiations, subcontract negotiations, licensing agreements, royalty payments, and similar legal documentation define the rights to data. Data is not distributed or used until the legal right to do so has been verified. Government regulations (most notably export controls on technical information) may also dictate specific information disclosure rules and parties.

1

12

3

456789

101112

13

14151617181920212223242526

2

Page 72: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

66

The enterprise should review contractual requirements and legal rights and responsibilities before providing access or distribution of data to trading partners, subcontractors, suppliers, and customers. If access is authorized through a documented agreement, export license or other means the enterprise should verify the type of data needed by the user, as well as the distribution method and access level required to support the user’s needs while ensuring that the user has the appropriate credentials required to access the requested information.

When interchange data environments are required or used, the enterprise should define the levels of and definitions for access rights and should establish the mechanism for authorizing that access.

6.1.2 Ensure Entitlement to Access and Use of Data Is Validated and Documented by the Proper Authority

The enterprise should ensure that the owner of the data (an organization or individual representative)representative) has authorized or validated the user’s need for access. Records of access rights granted, distribution methods, and account authorizations should be maintained for verification and validation purposes. The enterprise should review these records regularly to ensure that data remains secure and access rights are current.

Before data is distributed, the enterprise should validate that the information is approved or authorized for use. If not authorized, the data should be evaluated to determine the reasons. Data is distributed or used only after authorization by a review authority.authority. If authorized, the data should be distributed in accordance with the defined process and the user rights. This distribution may be performed manually, through e-mail, by means of an electronic interchange data environment, or any other method that meets the requirements of the process.

The security of the data should be validated periodically as part of an audit activity. Failing to secure the data or allowing unauthorized use can result in monetary fines or other penalties for both enterprises and individuals. An audit can address the following, among other things:

IP is properly identified by type and source.

IP is properly marked and tracked.

Patents exist where appropriate.

Copyrights are registered where appropriate.

IP rights granted are current and followedenforced.

Import and export evidence exists where appropriate.

IP user access rights are reviewed.

1

1234567

89

10

1112

1314151617

18192021222324

25262728

29

30

31

32

33

34

35

2

peg1012, 02/05/09,
steward
peg1012, 02/05/09,
Information Authority or delegated steward
peg1012, 02/05/09,
This needs to be a responsible individual who can be held accountable
peg1012, 02/05/09,
Entity with the legal rights
Page 73: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

67

IP distribution is reviewed.

IP disposition schedules and methods are followed.

When data or information is disposed of or considered of no ongoing value, it is handled in accordance with Principle 7.

Enabler: Establish and Maintain an Identification Process for IP, Proprietary Information, and Competition-Sensitive Data

Figure 6-24 depicts the process to support Enablers 6.2 and 6.3.

Figure 6-24. Process for Identifying, Controlling, Tracking, and Protecting Intellectual Property, Proprietary Information, and Competition-Sensitive Data

Establishidentification

based on datatype

Determine accessand distribution

needs

Determineregistration needs

and register asappropriate

Ensure markingcompliance

Distribute dataappropriate to

data rights

Validate securityof data

6.1.3 Distinguish Contractually Deliverable Data

At the enterprise level, policies are documented to define the process for distinguishing IP from other data and managing it. Prior to design of a product, a process should be used to determine the data requirements for development of the product. When the product contains information that is deliverable to a customer, an evaluation occurs regarding IP and the legal responsibility to protect it, regardless of source. Negotiations occur with potential suppliers to establish an agreement to use or resell the data. The outcome of those negotiations is documented and forms the basis for what can legally be contracted to another party.

When a potential or contracted customer requests delivery of data where legal rights to deliver to a third party do not exist, resolution must be reached with the customer, the supplier, or both, usually through negotiations. Even if data is not contractually deliverable, it must be identified and secured to protect the rights of the provider. Data is used in accordance with the rights granted by the provider, through contracts, subcontracts, license agreements, or other legal documentation. The enterprise must always evaluate the obligations and legal responsibility for data protection.

6.1.4 Establish and Maintain Identification Methods

Enterprise processes should exist for identification methods that address data within the enterprise. Data and data requirements are defined and identified with unique identifiers,

1

1

2

34

56

7

89

10

11

1213141516171819

20212223242526

27

2829

2

Page 74: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

68

as delineated in Principle 4. At the project level, the identification methods should be documented if they deviate from an enterprise policy or an enterprise policy does not exist. This includes another layer of identification for IP to ensure that the data is handled in accordance with IP policies and legal obligations. Internally generated data can then be easily identified and typed for protection.

The enterprise should evaluate internally developed and funded data to determine if a patent, trademark, or copyright is feasible in the business environment. In the United States, patents and trademarks are registered with the U.S. Patent and Trademark Office (http://www.uspto.gov/). Copyrights are automatic, but in some instances (e.g., protection of data rights in a global market), it is advantageous to register a copyright with the U.S. Copyright Office (http://www.copyright.gov/).

The enterprise should review data obtained from an external source to determine if it is registered IP. Documented rights to data should be verified prior to use to ensure that the data is appropriately protected.

An enterprise policy or process for import and export control should address the legal obligations for importing and exporting data outside the country of origin. Data should be reviewed before export to ensure compliance with enterprise processes and legal obligations. Additional information about and assistance with U.S. policies can be obtained through the Bureau of Export Administration, U.S. Department of Commerce ((http://bxa.fedworld.gov/).(http://bxa.fedworld.gov/http://www.bxa.doc.gov/bxahelp.htm).

6.1.5 Establish and Maintain Tracking Mechanisms for Identification of Data

Identification and control of data are addressed in Principles 4 and 5, respectively. However, some additional elements of metadata need to be tracked for IP. Tracking mechanisms and evidence are fundamental for the following items:

Distribution is appropriate to rights granted.

Appropriate maintenance of data is possible.

Configuration status of IP is maintained.

Import and export forms are maintained.

Licensed quantities and locations are tracked.

Appropriate rights are negotiated or granted for updated items.

Distribution (list of names, addresses, restrictions, etc.) is appropriate to rights granted.

Depending on the variety of information to be protected (IP, other sensitive or classified data, for example) it may be useful to prepare guidance in the form of a decision tree that

1

12345

6789

1011

121314

15161718192021

22

232425

26

27

28

29

30

31

3233

3435

2

peg1012, 02/05/09,
Also, International Traffic in Arms Regulations (ITAR) for military and dual use technical information
Page 75: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

69

leads employees through the logic and business rules that must be followed to properly categorize data and data products for distribution data rights and export control. .

6.1.6 Ensure Compliance with Marking Conventions and Requirements

Once IP has been identified, it should be marked appropriate to its type or variety. Proprietary information or IP provided to the U.S. government is marked using government notices or legends. Disclosure of proprietary information in any other context requires an agreement establishing the limits on disclosure. Such an agreement restricts the use and disclosure of the information being shared.

If the information is provided to a non-U.S. citizen, export control requirements need to be satisfied prior to disclosure. This includes printed, electronic, or verbal disclosure of information.

Enabler: Establish and Maintain an Effective Data Control Process

The process to support Enabler 6.3 is delineated in Figure 6-3.

6.1.7 Establish and Maintain Control Methods

Processes should exist for control methods that address data within the enterprise. Data is controlled so that changes to data are reviewed and authorized by the appropriate personnel and results are provided on a need-to-know basis. Details of the change process are defined in Principle 5. For IP, control systems are different based on owners and use of data and include appropriate approval mechanisms and updated documented agreements for data rights. This provides another layer of control for IP to ensure that the data is handled in accordance with IP policies and legal obligations.

The enterprise should evaluate internally developed and funded data to assess the impact of the change on a patent, trademark, or copyright. If appropriate, patents and trademarks should be reregistered with the U.S. Patent and Trademark Office (http://www.uspto.gov/), and copyrights should be reregistered with the U.S. Copyright Office (http://www.copyright.gov/).

Changes to the data may or may not impact documented agreements for data rights. The enterprise should review documented agreements to assess the impact of the change. Areas of particular concern exist where the right to use the updated item is not part of the original agreement. In those instances, new agreements must be negotiated. Review and disposition methods for IP changes should be established based on the business needs.

6.1.8 Establish Mechanisms for Tracking and Determining Status of Data

The mechanism for tracking IP continues when tracking changes to IP. When changes occur, the ability to trace users of IP data assists in determining the distribution for

1

12

3

4

56789

101112

1314

15

16

17181920212223

2425262728

2930313233

34

3536

2

Page 76: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

70

approved updates. As with other IP issues, changes need to be tracked and the data rights reviewed before distribution.

At some point, rights to data expire or are no longer of value to the enterprise. IfIf tThere isshould be there is an enterprise retention policy, or abecause there is often a legal obligation to maintain the data.., tThe data, the enterprise therefore shouldmustshould retain the IP information, including theany and all documented agreements that define the data rights. Principle 7 provides guidelines for data retention and storage.

1

12

34567

2

peg1012, 02/05/09,
Data management demands that there be information retention and disposition policies. Some of this is formal records management, but all information (whether designated as a ‘record’ or not) should be addressed by retention policies and disposition procedures. This is appears to be adequately covered in the next section.
Page 77: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

71

7.0 Principle: Retain Data Commensurate with Value

Introduction

The purpose of this principle is to delineate define methods for ensuring adequate retention and preservation of data assets that are of value to the enterprise and effectively disposing of data assets that are no longer of value. Figure 7-25 illustrates the overall process.

Figure 7-25. Planning Decision Tree for Data of Sustained Value

Receive electronicfile

Create electronicfile with metadata

for disposition

Vault and validateelectronic file indesired format

Retain files andpreserve asnecessary

Receive papercopy

File paper copy ordestroy IAW

authority

Destroy papercopy IAW authority

for disposition

Purge/dispositionelectronic files

IAW authority fordisposition

Discard applicationsoftware

Retain applicationsoftware

Ensure disasterrecovery backup

available

Ensure dataretrievability toneeded parties

Eliminateunneeded

duplicate files

Assess files formedia currency,

metadatacurrency,

continued value

Of continuedvalue?

YES

NO

and and

Any data assets that are of potential business, project, operational, or historic value should be retained until their value is depleted. Data of sustained value to the enterprise should be retained and evaluated on an ongoing basis as notionally shown in Figure 7-25. (The figure presumes that if data in paper form is of sustained value then it will be converted to electronic form. Although this is more and more the rule, not all organizations will choose or have the means to do so.) The enablers provide a basis for enterprise behavior that ensures data is retained commensurate with its potential entrepreneurial, legal, contractual, and other worth to the enterprise and customer. Quality, accurate, and up-to-date data aids in critical business decisions. Timeliness of the decision-making process with value-added data increases competitive advantage. The right data at the right time is cost effective and reduces lead-time to decision making and business processes. Non-value-added data should be removed from the enterprise’s inventory. Obsolete information may become a liability to the organization. Not only does it needlessly waste storage space, but it may be mistakenly used when more current information exists. Further, it may even prove damaging if subpoenaed relative to legal proceedings.

1

1

2

3456

7

8

9101112131415161718192021222324

2

Page 78: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

72

Plan to Ensure Data Are Available When Later Needed

Data assets should, upon their creation and initial storage, have planned retention requirements identified and documented. Such business processes would cover archive formats, frequency of reviews, purge planning, disposition funding, and related activities. Clearly defined methods for data retention help ensure that the data will be available when and if needed. One such method is to develop an enterprise policy on data retention. Enabler 7-2 details considerations for such a policy.

Effective control of data is best accomplished through defined process ownership and accountability. To ensure proper planning for eventual disposition of data assets, the enterprise should identify an appropriate data steward for planning disposition dates early in the data life cycle. These Data stewards should be trained in the organization’s retention and disposal processes. They manage physical custody of enterprise assets to ensure, as a minimum, that electronic data with wide applicability is stored in a retrievable storage media, that inactive data is archived, that hard copies are protected, and that data is identified and catalogued for retrievability. They ensure that movements of data assets and anytheir copies of the assets abackups are known to them. Further, they ensure that planning is in place to control data assets near the end of their useful lives such that the enterprise does not store items that no longer retain value.

Data stewards ensure that data is stored at authorized locations. They maintain backup copies at locations separate from the masters for best disaster recovery practice. They ensure that backup copies are not maintained or stored at unapproved locations, such as personal residences. They make certain that the physical location of data assets is known and that those assets are easily retrievable by those who need them.

Maintaining control of the repository and the associated processes or data holdings is a DM function. The data manager should pay special attention to changes of stewardship. These changes can result from a number of factors, including the following:

Enterprise charter changes, corporate mergers, or corporate divestitures

Personnel changes resulting from changes in position responsibilities, retirement, attrition, or similar actions

Changes in management during the data life cycle, for example, from an on-site location in the early life cycle to an off-site location when data is archived.

To ensure proper planning for storage in protected environments, the enterprise should investigate cost and facility availability to meet upcoming needs for data protection environments. Paper files may be somewhat protected from fire, for example, with inert gas systems. Protection of CDs and other heat- and light-sensitive items in warehouse environments may be ensured with effective cooling and humidity control. Protection of electronic files from viruses may be enhanced through an effective virus protection program.

1

1

234567

89

101112131415161718

1920212223

242526

27

2829

3031

32333435363738

2

peg1012, 02/05/09,
“Backup” is a poor word choice. Backups are typically done to ensure business continuity. Backups are seldom saved for more than a month in that the media is generally recycled. They do not record information in a retrievable manner, they are only useful post restoration. Backup and recovery are important data management disciplines, but not meant for long-term preservation / restoration of content. Backup/recovery operations are generally meant to address local, isolated system failures, not widespread disaster. “Replication” is a better term. Replicated copies are exact copies of the master records and may be used directly. They can be sorted, searched, filtered, etc, and most importantly, read.
peg1012, 02/05/09,
“Backup” is a poor word choice. Backups are typically done to ensure business continuity. Backups are seldom saved for more than a month in that the media is generally recycled. They do not record information in a retrievable manner, they are only useful post restoration. Backup and recovery are important data management disciplines, but not meant for long-term preservation / restoration of content. Backup/recovery operations are generally meant to address local, isolated system failures, not widespread disaster. “Replication” is a better term. Replicated copies are exact copies of the master records and may be used directly. They can be sorted, searched, filtered, etc, and most importantly, read.
Page 79: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

73

An essential element of preservation planning is to ensure planning for adequate protection of data against potential disaster commensurate with the value of the data. The enterprise should review risk areas where singular versions of data could be lost in the event of a disaster and develop plans to mitigate such risks. Mitigation may occur by developing duplicate copies or scanning paper documents to provide backup, as well as by maintaining electronic versions (tapes, CD, etc.) of files and associated software. Storage of the duplicated data at a separate location in the local area or even in a different region of the country is prudent to overcome risk of local disasters such as hurricane, tornado, or earthquake. In addition, effective planning for disaster recovery in the event of a crisis such as facility fire, server crash, or flood mitigates the potential of data asset loss and implicit inability to retrieve such assets. For some enterprises, a disaster has been cause to cease operations, because those enterprises had not incorporated disaster planning in their basic business planning.

Maintain Data Assets and an Index of Enterprise Data Assets

Data stewards are to ensure that accurate and complete records data products are identified, available for view by those with a valid business need, controlled, retained, protected, and subsequently disposed of in accordance with the requirements set forth for the data assets.

Retention dates are the latest of dates set by law, by local policy, by ascertained potential need to the enterprise, or by potential need to the customer. (Society of Aerospace Engineers Standard AS9034, “Process Standard for the Storage, Retrieval, and Use of Three Dimensional Type Design Data,” provides related process descriptions and related information for aerospace-specific application.)

To ensure that data assets are well identified, the enterprise should use appropriate metadata—identifyingmetadata—identifying data pertinent to the items—to enable retrieval of those assets. Metadata may include date, contract number, author, title, general topic key words, owning enterprise document number, document serialization, default retention date, and data steward. Effectively identified data assets enable timely retrieval and destruction as appropriate.

To protect data assets from unauthorized viewing, the enterprise should place security requirements on data assets as appropriate (Principle 6). Enterprise data assets may be of a proprietary, government classified, or other sensitive nature, warranting protection against unauthorized viewing. In a paper environment, protection may be ensured through physical security. In an electronic environment, protection may be ensured through segregation of data by server, by firewall, by password, and similar means.

When evaluating how to store data, the following questions may assist with decision making:

Will the data ever be used as direct source information in the creation of new material?

1

123456789

10111213

14

15161718

1920212223

242526272829

303132333435

3637

3839

2

peg1012, 02/05/09,
Denise – Insert reference to metadata section.
peg1012, 02/05/09,
Loaded legal term. “Records” are not the same as data assets or information assets. See http://www.arma.org/
peg1012, 02/05/09,
Loaded legal term. “Records” are not the same as data assets or information assets. See http://www.arma.org/
peg1012, 02/05/09,
Loaded legal term. “Records” are not the same as data assets or information assets. See http://www.arma.org/
peg1012, 02/05/09,
Loaded legal term. “Records” are not the same as data assets or information assets. See http://www.arma.org/
peg1012, 02/05/09,
Loaded legal term. “Records” are not the same as data assets or information assets. See http://www.arma.org/
peg1012, 02/05/09,
Loaded legal term. “Records” are not the same as data assets or information assets. See http://www.arma.org/
Page 80: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

74

How long will this electronic data likely have value to the enterprise? If a long duration, electronic data migration might be considered more heavily than if a short duration.

How long will this paper data likely have value to the enterprise, and how frequently might it be accessed? If a long duration, electronic conversion may be warranted.

How difficult will it be to retain compatible (and potentially obsolescent) equipment and software in order to provide for retrievabilityirretrievability and readability of the files over their anticipated lives?

Use To ensure that data assets are readable in future years, storage of data in neutral formats is preferable if the data is not anticipated to store data will generally simplify lifecycle storage issues. be manipulated later or used in the creation of new material. Neutral formats work well for data that is only for reference and not a source for future workworkworkworkwork, and some neutral formats such as extensible markup language (xml) support storage, exchange and manipulation as well as retrieval for reference. An alternative is to periodically migrate data assets to current software applications and hardware formats for continued currency and availability for re-use. A combination of these approaches (for example, use of a widely supported neutral format so that import of that neutral format is available for many tools in the migration path) is another option. work.

When no neutral format or format migration path will support re-use of certain data assets, it may be necessary (as a last resort) to retain necessary computer resources to recall and install, view, revise, print images, or refresh to newer technology. The decision to retain obsolete computer resources should be driven by economics pertinent to the predicted likelihood of data reuse. In this case, the process may involve extending date expiration-sensitive licenses or arranging software support into outyears. By retaining computer resources, the enterprise ensures that pertinent records are viewable and editable upon later need.

Regardless of the approach taken (neutral format, hardware/software migration, or retention of original hardware/software environment) testing and validation for accuracy and usability must be part of the process. Failure to ensure usability for needed data assetsassets can be costly to the enterprise. It is time-consuming, expensive, and potentially not possible to locate a supplier or enterprise with the capability to migrate to current technology media.

To ensure that data assets are readable in native formats for later manipulation, the enterprise should retain necessary computer resources to recall and install, view, revise, print images, or refresh to newer technology. Alternatively, the enterprise should plan to periodically migrate data assets to current software applications and hardware formats for continued currency and availability for retrieval. The decision process to retain obsolete computer resources or to refresh to newer technology is a business case, driven by economics pertinent to the predicted likelihood of data reuse. In the case of retaining

1

123

456

789

1011121314151617181920

2122232425262728

293031323334

35363738394041

2

peg1012, 02/05/09,
There have been great strides here in the xml world allowing for a neutral format that can be searched, sorted, filtered, analyzed and re-used.
peg1012, 02/05/09,
There have been great strides here in the xml world allowing for a neutral format that can be searched, sorted, filtered, analyzed and re-used.
peg1012, 02/05/09,
There have been great strides here in the xml world allowing for a neutral format that can be searched, sorted, filtered, analyzed and re-used.
peg1012, 02/05/09,
There have been great strides here in the xml world allowing for a neutral format that can be searched, sorted, filtered, analyzed and re-used.
peg1012, 02/05/09,
There have been great strides here in the xml world allowing for a neutral format that can be searched, sorted, filtered, analyzed and re-used.
Page 81: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

75

obsolete resources, this process may involve extending date expiration-sensitive licenses or arranging software support into outyears. By retaining computer resources, the enterprise ensures that pertinent records are viewable and editable upon later need. In the case of migrating data assets to current formats, periodic migration to current software with its correlated validation for accuracy occurs. Failure to continue migration to current formats can be costly to the enterprise. It is time-consuming, expensive, and potentially not possible to locate a supplier or enterprise with the capability to migrate to current technology media.

Hard-copy data, while not as susceptible to some of the issues electronic media face, has its own vulnerabilities. Many inks fade over time, degrading legibility of data on Mylar, for example. Copied material is somewhat prone to ink lifting, particularly if exposed to heat, and legibility degrades with each succeeding generation of copies.

To mitigate electronic data loss due to shelf-life limitations of storage media, the enterprise should perform periodic refreshes and data validation. It should consider migration to state-of-the-art software formats and storage media. Some CDs, whose shelf life has been viewed as very long term, are now rendered useless because of the acid content in the inks used to print labels. Inventories of data assets maintained in current software formats allow for fast retrievability and easy readability. Maintaining a data refresh schedule facilitates proper attention to electronic data before media shelf lives are exhausted.

Table 7-9 provides representative refresh and migration intervals. The data in this table are gathered from experiential as well as supplier sources. It is for general information only.

Table 7-9. Representative Refresh and Migration Intervals

Media Refresh/migration Anticipated life

File server Back up daily 5 years

Disks, compact (CDs and their variations) 5 (10) years 25–100 years

Disk (diskette), 8 inch Migrate to current formats 1–3 years

Disk (diskette), 5¼ inch Migrate to current formats 1–3 years

Disk (diskette), 3½ inch Migrate to current formats 1–3 years

Tape, cassette (magnetic tape, cartridge) Migrate to current formats 10–30 years

Tape, magnetic (magnetic tape, reel) Every 5 years, migrate to current formats 10–30 years

Magnetic tape, compact Every 5 years, migrate to current formats 10–30 years

Removable disk, ZIP/JAZ Every 5 years, migrate to current formats 5–15 years

Microfilm/microfiche Consider for migration 40 years

PC hard drives Back up to other locations 5 years

To minimize retention of duplicate media, the enterprise should review duplicate data assets and determine the need to store multiple media beyond that needed for disaster

1

12345678

9101112

1314151617181920

212223

24

2526

2

peg1012, 02/05/09,
This may be rarely be necessary, but every possible alternative should be investigated before deciding to become a hostage of obsolete technology. Much better strategy is to ensure that there is a standards based neutral format supported by an export capability before committing to a proprietary software/hardware environment for the creation and maintenance of long-term enterprise information.
Page 82: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

76

recovery. When records exist in more than one physical medium without specific need, unnecessary duplication wastes physical space (in a paper environment) and digital storage (in an electronic environment). In addition, and perhaps most important, retaining multiple copies exacerbates worsens configuration control problems. On the other hand, an enterprise should must be cognizant aware of business needs or specific legal and contractual requirements that may mandate that multiple media be retained.

Providing special protection and backup for vital data records provides greater likelihood of retrieval for items of key legal or strategic significance (Principle 6). Such protection may include greater physical protection such as a rodent-proof container, fireproof vault, temperature and humidity controlled area, etc. It can also mean added security (access restriction) protection. Data with the greatest potential loss to the enterprise may be a candidate for special attention. Added measures to prevent data getting to the possession of unauthorized personnel need to be carefully weighed against the inherent advantages to ensuring broad availability of important data. In an acquisition and merger environment, proper attention to the rights of the current and prior data owners is paramount to doing business. Special requirements may exist for retention and/or disposition relative to previous or new corporate ownership. For example, data pertaining to a certain project, with certain tax application, created during a certain period, etc., may have to be reviewed by another enterprise as part of the disposal process.

Assess the Current and Potential Future Value of Enterprise Data Holdings

To make sure thatthat it does not retain non-value-added data is not retained, the enterprise datashould assets should be assessedss its data periodically. As a minimum, data should be reevaluated at the time originally designated for disposition, its original default retention date. Reevaluation considers the latest of dates set by law, by local policy, or by ascertained potential need to the enterprise or potential need to the customer.

Enterprises need to periodically reassess the value of current holdings to the enterprise’s future. Some key points in timeevents are natural candidates for reassessment, for example, when planning for a physical move, transitioning from one contract to another, reassigning data stewards, or undergoing corporate reorganization or sale.

The frequency for review of holdings can be easily managed in an electronic environment. Many enterprises have computer reporting of potentially obsolete data by virtue of a metadata sort, for example, date-driven reports that flag original metadata entries as suggesting they are obsolete. At such time, the enterprise reevaluates the continued value of such data. Upon reevaluation, the enterprise should readjust default retention dates or, if the data is determined to be non-value added, should arrange for disposal. When evaluating the current and future value of data, some questions that may be asked are as follows:

What data is currently stored and for what purpose?

1

123456

789

10111213141516171819

2021

222324252627

28293031

3233343536373839

40

2

peg1012, 02/05/09,
This is not as easy as it sounds. Retention is seldom specified as a data certain. It is usually based on an elapsed time after an event. The event must be recorded in order for the retention clock to be meaningful. There also needs to be a way of associating information asset instances with the class for which the retention period has been specified. Even relatively simple parameters like “x years since last accessed” can be deceptively difficult to measure because backup routines generally update the last accessed metadata leading to a false impression that the information has had recent use.
Page 83: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

77

Is the data accurate and up-to-date?

What are the criteria for the storage life of data?

What are the costs associated with data retention?

Will retaining the data enhance network security?

Is there potential for this data to satisfy contractual or other legal requirements (for example, legal hold)?

Value assessments and disposition processes pertinent to particular data should cease immediately upon knowledge of a potential or initiated lawsuit and not be reinitiated until after such action is completed. Added safeguards and access limitations may also be prudent to protect such data from loss, damage, or alteration.

Active data needs to be readily available to the enterprise for regular reference. Inactive data still retains value but is not considered to have regular, continuing need. Such data needs to be retrievable, but can be stored less centrally. The data retention program should include a periodic review to determine when data is no longer being actively used, can be classified as inactive, and can be moved to an archival location. Inactive data is usually relocated to an archival database, if electronic, or to an off-site location, if electronic or paper. Relocation of such inactive data frees up physical and digital storage space. Supplier off-site storage may be an option for storing historical hard copy that is space consumptive. Suppliers who specialize in data storage may be able to offer rates that allow cost-effective retention. If backup or additional copies of these archived files are available, storage of the additional copies at a separate location in the local area or even in a different region of the country is prudent to overcome risk of local disasters such as hurricane, tornado, or earthquake. Conversely, if these archived files have no backup version or second copy, they are likely of greater value to the enterprise with local storage, because it normally facilitates faster retrieval.

Supplier off-site storage may be an option for storing historical copies of data assets. If additional copies of these archived files are available, storage of the additional copies at a separate location in the local area or even in a different region of the country is prudent to overcome risk of local disasters such as hurricane, tornado, or earthquake. Conversely, if these archived files have no second copy, they are likely of greater value to the enterprise with local storage, because it normally facilitates faster retrieval.

Suppliers who specialize in data storage may be able to offer rates that allow cost-effective retention. Their services usually include hardened and climate controlled storage facilities as well as location management and guaranteed turn-around time on retrieval. For additional fees, some of these vendors will provide replication service and off-site storage in geographically separate locations.

1

1

2

3

4

56

789

10

111213141516171819202122232425

262728293031323334353637

38

2

peg1012, 02/05/09,
These services usually include hardened and climate controlled storage facilities as well as location management and guaranteed turn-around time on retrieval. For additional fees some of these vendors will provide replication service and off-site storage in geographically separate locations. Archive management is non-trivial. If the information assets warrant retention, they most likely also warrant appropriate archive management. Most enterprises are not in a position to self-provide these services.
peg1012, 02/05/09,
I think more depth and a separate section to address “legal hold” would be advisable. This is an extremely important subject. You will recall Arthur Andersen, which was one of the “Big 5” internationally recognized accounting firms was essentially driven out of business for violating this information management process in conjunction with the Enron debacle.
Page 84: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

78

The enterprise should review both active and inactive data periodically to determine if the data still adds value. If not, the enterprise should arrange for disposal of the non-value-added data.

Dispose of Data

Upon determination that data retained is not of continued value, The the enterprise should arrange for disposal.

An enterprise should discontinue use of personnel energy, physical space, and other resources for maintaining non-value-added data. Additionally, obsolete information may become a liability to the organization. Not only does it needlessly waste storage space, but it may be mistakenly used when more current information exists. Further, it may even prove damaging if subpoenaed relative to legal proceedings.

Obsolete and/or non-value added data should be purged from the enterprise records and disposed of in a manner that makes best business sense. When data is removed, its associated metadata should likewise be removed. A record should be retained to identify what documents were destroyed, when they were destroyed, and who authorized the destruction. An enterprise needs to have an effective process to ensure that qualified individuals or teams of potentially interested parties authorize destruction. In some cases, as in merger environments, other enterprises may be required to jointly authorize destruction.

An enterprise should discontinue use of personnel energy, physical space, and other resources to non-value-added data. Such non-value data should be purged from the enterprise records and disposed of in a manner that makes best business sense. When data is removed, its associated metadata should likewise be removed. A record should be retained to identify what documents were destroyed, when they were destroyed, and who authorized the destruction. An enterprise needs to have an effective process to ensure that qualified individuals or teams of potentially interested parties authorize destruction. In some cases, as in merger environments, other enterprises may be required to jointly authorize destruction.

The enterprise should ensure that data assets of potential value to other parties are destroyed in a way that prevents those assets from becoming publicly available.available. For example, such measures as electronic deletion, shredding, or burning may be appropriate methods for destruction; each enterprise may accomplish destruction through security or another . function. Effective destruction processes ensure that the enterprise’s non-value-added data—its trash—is not compromised, becoming another enterprise’s treasure.

Failure to dispose of data in a timely, appropriate manner may exact a cost in poor use of space (square footage expenditure) or compromise of data.

1

123

4

56

789

1011

1213141516171819

202122232425262728

29303132333435

3637

2

peg1012, 02/05/09,
Beyond forensic recovery. Most forms of electronic deletion are inadequate for this purpose. This usually requires destruction of the physical storage media. Destruction methods should be evaluated against the potential liability. There is another issue around disposal; that is making sure that all the information is accounted for. Back-up tapes, paper copies, secondary reporting warehouse files, PC hard drive files, and so forth all need to be destroyed. Determining the information lineage can be a nightmare.
peg1012, 02/05/09,
This usually called a “stub” or “token”. 02/05/09 – Team discussed and determined “record” to be the best term.
peg1012, 02/05/09,
This is not just a matter of “non-value-added”. Rather, obsolete information can be an outright liability.
peg1012, 02/05/09,
This is not just a matter of “non-value-added”. Rather, obsolete information can be an outright liability.
Windows SOE, 02/05/09,
02/05/09 – We need to rethink the wording of this last sentence to keep the intent
Page 85: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

79

Legal Hold

If there is a reason to believe that a body of information may be sensitive to legal proceedings all potentially sensitive information should be placed in a “legal hold” status at the first indication of such legal sensitivity. Usually, the legal organization of the enterprise will provide such notification, but those charged with the responsibility for managing the information should be aware of significant events and take action at the earliest indication of potential litigation. However, all held information must be confirmed by a request from the law department of the organization.

Placing information in legal hold entails the following actions:

Select all data objects that may be relevant to incident which may result in litigation. If there is any doubt regarding the eligibility of certain information it is best to err on the side of over-selection. Once a formal hold is issued by the law department of the organization, final selection criteria will be determined.

S equester all selected data objects. This is best accomplished by physically separating the data objects from those that are not selected. If the tools and controls are available this may accomplished via electronic means for electronically stored information, however, proof of adequacy of the electronic controls may be demanded by the court. If the information is needed for business continuity, then the sequestered information must be a “snapshot” of the information at a given point in time. The snapshot must be complete data objects including the current state of all reference data.

Suspend activity. All actions that may affect the content of sequestered data objects must be suspended. Obviously, these data objects may not be disposition irrespective of the retention periods, but they also may not be updated or altered in any manner. In some cases even normal entitlement to view the information must be suspended.

Maintain the chain of authority. The source authority for all sequestered information must be known and recorded. The selection criteria, date and time of the sequestered information must be recorded.

Retain relevant metadata. All relevant metadata associated with the information must also be retained (i.e., create date, last revision date, ID of last revision, etc.). Also, legally held information must be associated with a unique identifier indicating specifically which incident (litigation, subpoena, etc.) that gave rise to the legal hold. Be advised that more than one legal hold may apply to the same information at a given time.

Release information. Once all legal holds against the information are closed, the information is generally subject to one of two conditions. There may be instructions from the court directing the long-term management of the information. Alternatively, the information is returned to normal processing. In

1

1

2345678

9

10111213

1415161718192021

2223242526

272829

303132333435

36373839

2

Joe Roman, 06/24/09,
KEEP IN 859.
Page 86: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

80

this case the state of the information dictates whether it is returned to the active file, archived or disposed.

Legal hold is a non-trivial and virtually inevitable condition. The organization should have processes and tools in place to effect legal hold in the event the action is needed. The tools should be tested and the processes should be periodically rehearsed in order to ensure that legal holds can be effectively and efficiently carried out when required.

1

12

3456

2

Joe Roman, 06/24/09,
KEEP IN 859.
Joe Roman, 06/24/09,
DELETE FROM 859 AND MOVE TO IM STANDARD.
Joe Roman, 06/24/09,
DELETE FROM 859 & MOVE TO IM STANDARD.
Page 87: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

81

8.0 Principle: Continuously Improve Data Management

Introduction

In a rapidly changing technological society, it is crucial to continuously improve the quality of the resources that house one of an enterprise’s most valuable assets, data. DM is the function responsible for ensuring that the quality of data is consistent with the users’ requirements. The purpose of this principle is to provide a basis for implementing a process for data quality improvement. Figure 8-26 illustrates a process.

Figure 8-26. Improving Data Management

Establish and maintainmetric process and

reporting

Monitor dataquality

Improve datamanagement

Establish tools &infrastructure to beused to support the

process

Enabler: Recognize the Need to Continuously Improve the Quality of Data

Metrics are essential for determining where to improve and to monitor improvement. Metrics should be designed to positively motivate, rather than keep score, and should focus on future strategy rather than providing a compilation of past history. The enterprise should identify the users most directly involved with metrics and performance measurements and make them active members of the DM team. This may include personnel familiar with administrative, financial, technical, and, where applicable, contracting issues. To effectively facilitate continuous improvement, the following questions need to be considered:

What type of data is required, by whom and when?

Who will use the data?

How will the data be used?

What is the user’s infrastructure?

How will the data be delivered?

Where is the data maintained?

The answers to these questions establish a meaningful process and should be considered not only for the specific project but also reviewed for the overall impact on the enterprise.

1

1

2

34567

8

9

1011

1213141516171819

20

21

22

23

24

25

2627

2

Page 88: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

82

Enabler: Establish and Maintain a Metric Process and Reporting Strategy

The steps in Figure 8-27 assist with establishing a reporting process that identifies and utilizes appropriate, advantageous metrics to improve the quality of data and the process that reports the quality. A consistent and repeatable process based on this enabler permits proactive actions by the enterprise and specific projects.

Figure 8-27. Process and Reporting Strategy

Establishreportingstrategy

Identify metricsEstablishreportingprocess

Analyze theReported Data

Identifyimprovements

Implementproactivesolutions

Improvedbusiness

processes

Metrics vary from enterprise to enterprise and from project to project. These process measurements should be simple and accurate indicators of performance, yet provide sufficient data to allow analysis. Table 8-10 shows examples of metrics that may be useful to assess the volume and performance of data activity.

Table 8-10. Examples of Data Management Metrics

Metric name DefinitionSuggested reporting

frequency

Data schedule status Summarizes delivery status, contains number delivered early, on time, and late, by month

Monthly

Electronic delivery status

Summarizes progress toward electronic delivery; contains the percentage of deliverables made electronically for each month

Monthly

Project data report Summarizes the project data traffic; identifies the number of correspondence items transmitted between prime trading partners each month

Monthly

Data acceptance rate Measures percentage of submittals approved and disapproved by customer on first submission

Monthly

Review cycle time Measures the cycle time of the review and approval process, both internally and externally

Monthly (issues addressed more frequently)

Problem reports Measures the number of problems reported and time to problem closure

Monthly

Customer satisfaction Measures customer satisfaction trends using survey methodology

Annual or on project closeout

1

12

3456

7

8

9101112

13

2

peg1012, 02/05/09,
The form of the information makes a big difference as well. Structured information quality can usually be assessed more easily than content objects.
peg1012, 02/05/09,
The form of the information makes a big difference as well. Structured information quality can usually be assessed more easily than content objects.
Page 89: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

83

For example, analyzing the review and approval process may identify areas for potential cycle-time reduction, resulting in improved data deliveries and schedule performance. If a particular area is revealed to have a longer turnaround for approval, the causes can be examined and corrected or the process can be changed to accommodate needs and achieve objectives. Publication of results and findings provides a method to standardize metrics across the enterprise.

Enabler: Monitor the Quality of Data to Improve Data and Processes

Monitoring the data quality (Figure 8-28) through the use of metrics ensures that changes in initial input quality are identified. Degradation of the data below the metric goal identifies a need to reevaluate the goal and possibly update the process. As quality improves, the process can be changed to accommodate more stringent goals. The value of this activity is the ongoing assurance that the quality of the data meets or exceeds requirements through an up-to-date identifiable process that also contributes to achieving enterprise goals.

Figure 8-28. Monitoring Data Quality

Monitor dataquality

Establishinput plan

Maintainidentifiable

process

Encourageprocess

improvements

The enterprise should develop and implement a process improvement plan, with resources planned and allocated, to improve process performance and capability. The plan should be updated at defined intervals or as required. The plan should include identification, evaluation, and incorporation of new technology innovations into the defined process. The plan should also include measures of effectiveness from which metrics can be derived.

The purpose of implementing a strategy (Figure 8-29) for ongoing improvement is to ensure that the plan is current and continues to provide direction and meet requirements. The value gained from this plan is the ability to readily identify improvements toward an objective of continuous improvement and preventive maintenance.

Figure 8-29. Improvement Strategy

Identification ofdata

measurements

Evaluate andmonitor data

Incorporatenew

technology

Update plan asrequired

After establishing baseline requirements, a continuous improvement plan should be implemented. A systematic assessment of the process should be applied through planning, measurement, causal analysis and defect prevention, execution, and process refinement. The results provide the basis for modification of systems and personnel

1

123456

78

9101112131415

16

17

181920212223

24252627

28

29

30313233

2

Page 90: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

84

retraining, as required. Adherence to this plan ensures that goals are reviewed consistently and adjusted as improvements in quality are made.

Enabler: Improve Data Management Through a Systematic and Self-Diagnostic Process

The four steps listed in Figure 8-30 are necessary in the development of a systematic approach to self-analyzing the identified improvement process. This self-assessment improves the ability to identify, analyze, address, and correct data issues. The end result will be ready access to pertinent and accurate data.

Figure 8-30. Self-Diagnostic Process

Identify areain need of

improvement

Develop self-assessment

process

Identifyobjective

evidence ofimprovement

Validateimprovements

Enterprises use numerous process improvement projects. Any systematic process should identify and address the following:

Prevention of errors from recurring by identifying and eliminating the cause

Periodic reviews, audits, and publication of metric results

Lessons learned, documented, and published for reuse

Best practices identified, documented, and published for reuse.

For maximum gain and return on the costs of development, an effective improvement process includes periodic reviews and audits.

Objectivedevelop oObjectiveObjectivedevelop oObjectiveDdevelop objective evidence of improvements should be developed in order to provide concrete indication of the process results and actions. The correlationTioncorrelationand how tThey correlateion of the evidencethey correlate to the process improvement (Figure 8-31) must also be demonstrated.).demonstrated.).demonstrated.). Validated documentation ensures that documented proof of improvements achieved as a result of the process improvement is readily available.

Figure 8-31. Development of Objective Evidence of Improvement

Identifyprocess

criteria tomeasure

Measureprocess results

Analyze andmatch results

to process

Documentvalidatedresults

1

12

34

5678

9

10

1112

13

14

15

16

1718

19202122232425

26

27

2

peg1012, 02/05/09,
I could quite literally write a dissertation on this subject. Suffice it to say that the standard factory measurement model: Defect count and cycle time tend to be not particularly useful with respect to knowledge work. The underlying assumptions regarding the nature of the work often fail (repetitive, asynchronous, low-coordination, etc.). When the assumptions break-down, the correlations don’t hold up either. Output measures are usually not good surrogates for knowledge based work. Figuring out what to measure is very difficult. I would be happy to discuss this with the author.
peg1012, 02/05/09,
I could quite literally write a dissertation on this subject. Suffice it to say that the standard factory measurement model: Defect count and cycle time tend to be not particularly useful with respect to knowledge work. The underlying assumptions regarding the nature of the work often fail (repetitive, asynchronous, low-coordination, etc.). When the assumptions break-down, the correlations don’t hold up either. Output measures are usually not good surrogates for knowledge based work. Figuring out what to measure is very difficult. I would be happy to discuss this with the author.
peg1012, 02/05/09,
I could quite literally write a dissertation on this subject. Suffice it to say that the standard factory measurement model: Defect count and cycle time tend to be not particularly useful with respect to knowledge work. The underlying assumptions regarding the nature of the work often fail (repetitive, asynchronous, low-coordination, etc.). When the assumptions break-down, the correlations don’t hold up either. Output measures are usually not good surrogates for knowledge based work. Figuring out what to measure is very difficult. I would be happy to discuss this with the author.
peg1012, 02/05/09,
I could quite literally write a dissertation on this subject. Suffice it to say that the standard factory measurement model: Defect count and cycle time tend to be not particularly useful with respect to knowledge work. The underlying assumptions regarding the nature of the work often fail (repetitive, asynchronous, low-coordination, etc.). When the assumptions break-down, the correlations don’t hold up either. Output measures are usually not good surrogates for knowledge based work. Figuring out what to measure is very difficult. I would be happy to discuss this with the author.
peg1012, 02/05/09,
I could quite literally write a dissertation on this subject. Suffice it to say that the standard factory measurement model: Defect count and cycle time tend to be not particularly useful with respect to knowledge work. The underlying assumptions regarding the nature of the work often fail (repetitive, asynchronous, low-coordination, etc.). When the assumptions break-down, the correlations don’t hold up either. Output measures are usually not good surrogates for knowledge based work. Figuring out what to measure is very difficult. I would be happy to discuss this with the author.
peg1012, 02/05/09,
A process to assess the impact of errors already introduced to the data and implementation of corrective actions (if warranted) must be added to this list
peg1012, 02/05/09,
Why isn’t step 3 “implement process improvement” in the process?
Page 91: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

85

Creation of a process assessment matrix, or other tracking method, listing the stated criteria, would be advantageous in indicating the process/steps taken to accomplish the results of objective evidence. Efforts expended and lessons learned to improve the process should be documented documented, and reviewed as part of starting future process improvement efforts, to leverage the efficiency of future measurements.

Enabler: Establish the Necessary Tools and Infrastructure to Support the Process and Assess the Results

Establishing the necessary tools and infrastructure (Figure 8-32) is essential. Identifying the data requirements at project inception and the mechanisms on which the process will be based reduces confusion and increases productivity. Knowing the expectations in the beginning benefits the project and the enterprise by allowing time for planning and for achieving the expected results, thus saving time and money.

Figure 8-32. Process to Establish Tools and Infrastructure to Support the Process and Assess Results

Identify datarequirements and

mechanisms

Identify tools tosupport process

and function

Plan for expectedresults

Monitorperformance and

results

Tools may vary depending on the requirements and available infrastructure. At a minimum, the tools should have the capability to support the enterprise process and perform the following functions:

Data scheduling

Action tracking

Data delivery.

The process infrastructure at a minimum should include the following:

Resources

Information systems dependencies

Training approach

Other essential elements needed to support process improvement.

Metrics enable the following:

Performance monitoring

Progress demonstration

1

12345

67

89

101112

1314

15

161718

19

20

21

22

23

24

25

26

27

28

29

2

peg1012, 02/05/09,
Definition of the “enterprise” is crucial. Airbus used different design s/w in Germany and in France for A380. As a result, the designs did not integrate - $2 billion data management oops.
peg1012, 02/05/09,
I have witnessed the production of countless “lessons learned” documents, but rarely have I seen them leveraged in subsequent projects. If the WBS for a project does not include “study lessons learned from previous projects” it does not get done.
Page 92: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

86

Project completion.

The evidence provided by metrics creates a level of confidence in the process being measured. A properly established set of metrics supports goals and process improvement; it also provides a basis for assessing the improvements and evaluating trends.

1

1

234

2

Page 93: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

87

9.0 Principle: Effectively Integrate Data Management and Knowledge Management

Introduction

This principle describes the interdependent relationship between DM and KM. Because DM and KM are naturally interdependent, the objective of this principle is to distinguish the roles of each so that, in practice, DM and KM efforts are complementary. Ultimately, if DM and KM are managed such that they are complementary, the enterprise and its trading partners achieve increased return on their investment in intellectual assets. Figure 9-33 is a top-level process view.

Figure 9-33. Understanding the Interdependence of DM and KM

Establish the relationshipbetween data management

and knowledgemanagement.

Manage explicit product,business, and operationaldata created during the

acquisition processconsistent with the otherprinciples and enablers in

this standard.

Cooperate with knowledgemanagement where DM

and KM intersect.

Enabler: Establish the Relationship Between Data Management and Knowledge Management

Table 9-11 illustrates the relationship between data and knowledge. The scope of knowledge spans both explicit information (data recorded on media) and tacit information (information held in the minds of individuals). Explicit data includes both structured data, such as is found in traditional databases, and unstructured data, such as is found in technical manuals, drawings, and reports. The term “unstructured” is used in the information technology field to contrast with the structured data found in databases. Unstructured data often does have some structure, such as a table of contents.

Table 9-11. Relationship Between Data and Knowledge

Type

Explicit

TacitStructured Unstructured

Transactions Collaboration

Examples Purchase orderPurchase order acknowledgementInvoiceRemittance adviceRequest for quotationShipping schedule

Technical report, Analysis report, specification, manualParts listDrawing…

Mental modelsInformal recipesRules of thumbLessons learnedCommunities of practice

Normally responsibility of

Database administration Data management Knowledge management

1

12

3

456789

10

11

1213

14151617181920

2

peg1012, 02/05/09,
It is becoming more and more difficult to distinguish between these categories. Consider the impact of XML databases, DITA, S1000D, component content management systems. On the other side, digital product definition, geometric and geophysical databases, etc. It’s a very mushy world at the technical data layer. Even the information and knowledge layers are not behaving in the traditional manner. And semantic technologies such as RDF, OWL, intelligent search, etc. are coming at us. This is central to KM.
peg1012, 02/05/09,
The introduction of this document defined data management. I have struggled with the failure to identify information management as a separate issue. But going from DM to KM without any discussion of IM is a leap. The A380 problem I cited above was a DM problem. It was the result of a fundamental technical inconsistency. Note that the information content, the design artifacts, was essentially the same in France in Germany. Fixing this would require a complete overhaul of this document. Probably not in the cards this time around, but maybe this should be recognized at some future revision.
Page 94: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

88

The key insights regarding knowledge management, are as follows:

Knowledge comprises both explicit and tacit information.

Data can be structured or unstructured.

Structured data, which supports transactions, has historically been the domain of database administration.

Unstructured data, which supports collaboration, generated as part of the acquisition process, has historically been the domain of DM. There is also other unstructured data well outside the scope of historical DM. Examples are the books and articles managed by librarians and the human resources files managed by that function.

Knowledge management, as it is emerging, primarily addresses the management of human aspects of knowledge, such as the fostering and support of communities of practice.

Knowledge management as a named field is relatively new, dating to the mid-1990s; thus the KM field is still emerging. Data administration and data management date back at least 40 years and have historically been separate fields; data administration dealt mostly with automated data, and DM dealt mostly with paper products. Likewise, records management has largely been separate from both data administration and data management. With the impact of information technology on data, these three four fields (data administration, data management, knowledge management, and records management) often overlap. As a minimum, DM practitioners need to understand the other two three fields and the potential for interdependency, leveraging, or other issues.

As discussed in the introduction to the standard, data can be defined in terms of broad classes (product, business, and operational). The scope of DM, within the context of this DM standard, extends primarily to product, business, and operational data as created and maintained during the life-cycle process. Because DM provides a solution for management of explicit product, business, and operational data created during the acquisition process, it inherently provides that part of the solution for knowledge management.

Enabler: Cooperate with Knowledge Management Where DM and KM Intersect as KM Methods Develop

The emerging field of knowledge management is developing methods for managing tacit data and the human aspects of knowledge. All of these methods are subject to rapid change as enabling technologies emerge and mature. Because tacit data and the human aspects of knowledge management are outside the domain of DM as defined in Enabler 9-1, the best strategy for DM is to cooperate with knowledge management as KM methods develop, while leveraging the capability that KM is developing.

1

1

2

3

45

6789

10

111213

141516171819202122

23242526272829

3031

323334353637

2

Page 95: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

89

KM implementations generally stress three elements:

1. Organizing content (repositories and structure)

2. Connecting people (for purposes of facilitating data exchange)

3. Managing change (promoting knowledge sharing behavior and providing tools that facilitate knowledge management within the enterprise and with its trading partners).

For any enterprise, DM and KM intersect with regard to element 1 and potentially to element 3 (with respect to tools). Because the state of KM is fluid, the methods in use are enterprise dependent. Therefore, integration with regard to element 1 and element 3 requires understanding the state of KM capability in the enterprise with respect to these elements.

9.1.1 Understand the State of KM in the Enterprise

Three steps are required to understand the state of KM in the enterprise:

Determine through interviews or similar means if the enterprise has designated either a formal or informal knowledge management individual or group. If there is no such individual or group, then KM activity is ad hoc at best.

Determine through interviews or similar means if the enterprise has accomplished a KM capability self-assessment (that is, an internal assessment of its KM capability).

Use existing self-assessment or perform self-assessment. If the enterprise has accomplished such a self-assessment and it is reasonably current, or if one is intended within a reasonable time period, use the results of that self-assessment.

If the enterprise has not performed a self-assessment or has not planned one, then it should estimate the value of developing a self-assessment, considering cost, corporate culture and vision. Such an assessment may involve broadening the role of DM to encompass KM. Such assessments may yield tremendous potential benefit if a project is in the early phases of the life cycle. Although inherently of less value in the later phases of the project’s life cycle, projects with long anticipated future use may still warrant a more encompassing DM role. If the assessment suggests merit to further pursuit, then perform a self-assessment.

9.1.2 Coordinate DM and KM Efforts

Once an enterprise understands the state its KM, it should coordinate DM and KM efforts for elements 1 and 3. The specifics depend on both the results of the KM self-assessment and the state of DM in the enterprise.

1

1

2

3

456

789

1011

12

13

141516

171819

202122

2324252627282930

31

323334

2

Page 96: Working Copy of 859 - R1 Sponsored Documents/…  · Web viewDevelopment of this standard began in August 2000 when the Electronic Industries Alliance’s (EIA) G-33 Committee on

90

10.0 Application Notes1. GEIA 859 is a principles-based guidance document. It is not intended to be a

compliance document in a contract for purchase and acquisition of a product. It may be used as a source for relevant information when preparing such items as a request for proposal or other business contract agreements. Following GEIA 859 principles enables users to establish, plan, document, and communicate appropriate and consistent DM programs and plans for an enterprise or project environment.

2. This standard should be used to design, plan, implement, and sustain effective DM solutions for the enterprise or the project. DM practices should be selected and applied in context and to the extent appropriate.

3. Because this is a principles-based standard, the standard can be used to communicate and convey effective DM solutions and processes. Example users might be:

a practitioner who is seeking best methods for DM and associated solutions;

an author who is drafting a DM plan;

a manager who is developing criteria for measurement of a process.

4. This standard provides the basic terminology for DM. It has been coordinated with EIA-836 and ANSI/EIA-649A to ensure consistent use of common terms and definitions.

5. Annex D, “Non-Commercial Practices For Data Management,” identifies Department of Defense (DoD) data management procedures and relates the existing practices to this standard where applicable. The annex is intended to identify DoD-specific data procurement, management, and administration practices but not to direct or limit the use of any particular practice or business strategy

1

1

234567

89

10

1112

13

14

15

161718

1920212223

2