Module Five

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

250

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by ConstableWillpowerSardine44

Report
The top three roles in a company that is significantly responsible for managing data access and regulatory compliance in my option are Data Management Executive, Security Administrators, and Data Security Auditors. The DM Executive needs to have a complete understanding of data security and regulatory requirements and is the go to person for any questions about data security and regulatory issues. They would be responsible for developing regulations to ensure data accuracy, security, reliability, and the company adheres to data privacy regulations. Security Administrators plan and put into practice security measures to keep company data and systems safe from breaches. They would need an outstanding understanding of the computer security systems and how they are set up and would be the person to go for any questions related to computer security. Data Security Auditors are responsible for making sure everyone follows the policies and procedures that Data Management Executives and Security Administrators put in place. Data Security Auditors do not have a direct responsibility for the data security and access, but they have a direct responsibility in making sure everyone else in the company follows the rules and they would have to have vast knowledge of the data security policies and regulatory requirements. The three roles, DM Executive, Security Administrators, and Data Security Auditors should all set expectations for others in the company and be the first to follow the rules and regulations that are in place. They should only access company data on company equipment and use two authentication passwords to access the data. Often others in a company will do something if the people higher up are doing them. If a third party needs access to data there should be limits on how the data is accessed and passwords given that expire after a brief period. The data analyst in these roles should use company policies and the governing body on regulations in their industry to make decisions.
DM Executives, Security Administrators, and Data Security Auditors should all work together to ensure the security of data is maintained. The DM Executives could talk to others in the company to learn what is working and what is not. Security Administrators should send out random tests to see how people in the company respond to them. The test could be what looks like an outside email that should not be opened and see how many in the company open it or reports it. The DM Executive and Security Administrator should listen to the recommendations of the Data Security Auditor when they report the findings of an audit and collaborate with one another to make changes that are recommended. References Mosley, M. (2010). The Dama Guide to the Data Management Body of Knowledge: (Dama- DMBOK Guide). Dama International.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help