Jump to content

Data custodian

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Themightyquill (talk | contribs) at 13:40, 1 May 2016 (removed Category:Library science; added Category:Library occupations using HotCat). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

In Data Governance groups, responsibilities for data management are increasingly divided between the business process owners and information technology (IT) departments. Two functional titles commonly used for these roles are Data Steward and Data Custodian.

Data Stewards are commonly responsible for data content, context, and associated business rules. Data Custodians are responsible for the safe custody, transport, storage of the data and implementation of business rules.[1][2] Simply put, Data Stewards are responsible for what is stored in a data field, while Data Custodians are responsible for the technical environment and database structure. Common job titles for data custodians are Database Administrator (DBA), Data Modeler, and ETL Developer.

Data Custodian Responsibilities

A data custodian ensures:

  1. Access to the data is authorized and controlled
  2. Data stewards are identified for each data set
  3. Technical processes sustain data integrity
  4. Processes exist for data quality issue resolution in partnership with Data Stewards
  5. Technical controls safeguard data
  6. Data added to data sets are consistent with the common data model
  7. Versions of Master Data are maintained along with the history of changes
  8. Change management practices are applied in maintenance of the database
  9. Data content and changes can be audited

See also

References

  1. ^ Carnegie Mellon - Information Security Roles and Responsibilities, http://www.cmu.edu/iso/governance/roles/data-custodian.html
  2. ^ Policies, Regulations and Rules: Data Management Procedures - REG 08.00.3 - Information Technology, , NC State University, http://www.ncsu.edu/policies/informationtechnology/REG08.00.3.php