Module Five
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
250
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
2
Uploaded by ConstableWillpowerSardine44
The top three roles in a company that is significantly responsible for managing data access and regulatory compliance in my option are Data Management Executive, Security Administrators, and Data Security Auditors. The DM Executive needs to have a complete understanding of data security and regulatory requirements and is the go to person for any questions about data security
and regulatory issues. They would be responsible for developing regulations to ensure data accuracy, security, reliability, and the company adheres to data privacy regulations. Security Administrators plan and put into practice security measures to keep company data and systems safe from breaches. They would need an outstanding understanding of the computer security systems and how they are set up and would be the person to go for any questions related to computer security. Data Security Auditors are responsible for making sure everyone follows the policies and procedures that Data Management Executives and Security Administrators put in place. Data Security Auditors do not have a direct responsibility for the data security and access, but they have a direct responsibility in making sure everyone else in the company follows the rules and they would have to have vast knowledge of the data security policies and regulatory requirements.
The three roles, DM Executive, Security Administrators, and Data Security Auditors should all set expectations for others in the company and be the first to follow the rules and regulations that
are in place. They should only access company data on company equipment and use two authentication passwords to access the data. Often others in a company will do something if the people higher up are doing them. If a third party needs access to data there should be limits on how the data is accessed and passwords given that expire after a brief period. The data analyst in these roles should use company policies and the governing body on regulations in their industry to make decisions.
DM Executives, Security Administrators, and Data Security Auditors should all work together to ensure the security of data is maintained. The DM Executives could talk to others in the company
to learn what is working and what is not. Security Administrators should send out random tests to
see how people in the company respond to them. The test could be what looks like an outside email that should not be opened and see how many in the company open it or reports it. The DM Executive and Security Administrator should listen to the recommendations of the Data Security Auditor when they report the findings of an audit and collaborate with one another to make changes that are recommended.
References
Mosley, M. (2010). The Dama Guide to the Data Management Body of Knowledge: (Dama-
DMBOK Guide). Dama International.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help