top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Data governance and compliance : evolving to our current high stakes environment / / Rupa Mahanti
Data governance and compliance : evolving to our current high stakes environment / / Rupa Mahanti
Autore Mahanti Rupa
Pubbl/distr/stampa Singapore : , : Springer, , [2021]
Descrizione fisica 1 online resource (213 pages)
Disciplina 658.478
Soggetto topico Data protection - Management
Electronic data processing departments - Security measures
Information technology - Management
ISBN 981-336-877-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Foreword by Dan Power -- Preface -- Acknowledgments -- About This Book -- Contents -- About the Author -- Acronyms and Abbreviations -- List of Figures -- List of Tables -- 1 Introduction to Governance, Corporate Governance, and Compliance -- 1.1 Introduction -- 1.2 Governance Versus Management -- 1.3 Corporate Governance and Its Subdisciplines-in a Nutshell -- 1.4 Corporate Governance, the Digital Age, Data and Compliance -- 1.5 What's Ahead? -- References -- 2 Governance Evolution and Basic Concepts -- 2.1 Introduction -- 2.2 Governance -- 2.3 Corporate Governance -- 2.4 Evolution of Corporate Governance -- 2.4.1 Seventeenth Century to Nineteenth Century -- 2.4.2 Early 20th Century to 1980 -- 2.4.3 1980s Onwards -- 2.5 Concluding Thoughts -- References -- 3 Corporate Governance Subdisciplines, Data, and Data Governance -- 3.1 Corporate Governance Subdisciplines-Introduction -- 3.2 Corporate Governance-The Approach -- 3.2.1 Operational Governance -- 3.2.2 Financial Governance -- 3.2.3 Human Resource Governance -- 3.2.4 Risk Governance -- 3.2.5 Security Governance -- 3.2.6 IT Governance -- 3.2.7 Data and Data Governance -- 3.3 Data Governance-History and Evolution -- 3.4 Data Governance Definition -- 3.5 Corporate Governance and Data Governance -- 3.6 IT Governance Versus Data Governance -- 3.7 Governance, Risk, and Compliance (GRC) -- 3.8 Data Governance and GRC -- 3.9 Tying Data Governance with the Different Disciplines of Governance -- 3.10 Concluding Thoughts -- References -- 4 Regulations -- 4.1 Introduction -- 4.2 Health Insurance Portability and Accountability Act (HIPAA) -- 4.2.1 HIPAA Privacy Rule -- 4.2.2 HIPAA Security Rule -- 4.2.3 HIPAA Breach Notification Rule -- 4.3 General Data Protection Regulation (GDPR) -- 4.4 Know Your Customer (KYC), Anti-Money Laundering and Counter-Terrorism Financing Act 2006 (AML/CTF Act).
4.5 Foreign Account Tax Compliance Act (FATCA) -- 4.6 Basel Committee on Banking Supervision's Standard Number 239 (BCBS 239) -- 4.7 Common Reporting (COREP) and Financial Reporting (FINREP) -- 4.7.1 Common Reporting (COREP) -- 4.7.2 Financial Reporting (FINREP) -- 4.8 Payment Card Industry Data Security Standard (PCI DSS) -- 4.9 Concluding Thoughts -- References -- 5 Data Governance and Compliance -- 5.1 Data Governance, Regulations, and Compliance -- 5.2 Cost of Non-compliance -- 5.3 Data and Regulations-The Challenges -- 5.4 Compliance, Data Characteristics, and Activities -- 5.4.1 Data Privacy -- 5.4.2 Data Security -- 5.4.3 Data Accessibility -- 5.4.4 Data Completeness -- 5.4.5 Data Accuracy -- 5.4.6 Data Consistency -- 5.4.7 Data Integrity -- 5.4.8 Data Currency and Timeliness -- 5.4.9 Traceability -- 5.4.10 Data Granularity -- 5.4.11 Data Usage -- 5.4.12 Data Retention -- 5.5 Data Characteristics and Compliance-Interrelationships -- 5.6 How Does Data Governance Help with Being Compliant? -- 5.6.1 Improved Data Discovery And Data Lineage -- 5.6.2 Enhanced Data Privacy and Security -- 5.6.3 Improved Data Quality -- 5.6.4 Effective Risk Management -- 5.6.5 Accountabilities and Responsibilities -- 5.6.6 Policies and Processes -- 5.6.7 Metrics -- 5.6.8 Education, Training, and Change Management -- 5.7 Regulatory Compliance and Data Management -- 5.7.1 Define and Discover Data -- 5.7.2 Data Profiling and Assessment -- 5.7.3 Compliance Data Store-Data Mapping and Transformation -- 5.7.4 Logging -- 5.7.5 Data Standardization -- 5.8 Concluding Thoughts -- References -- 6 Data Governance and Compliance: Concluding Thoughts and the Way Ahead -- 6.1 Corporate Governance-Paving the Way -- 6.2 Data Governance Subdiscipline -- 6.3 Regulations, Compliance, and Data Governance -- 6.4 The Way Forward -- 7 Data Governance Interviews.
7.1 Andres Perez, Information Management Consultant and President, IRM Consulting, Ltd. Co. -- 7.2 Christopher Butler, CDO HSBC UK, HSBC -- 7.3 George Firican, Director, Data Governance & -- Business Intelligence @UBC DAE | Founder of www.lightsondata.com -- 7.4 Jill Dyché, Principal, Jill Dyché, LLC. -- 7.5 Dr. John R. Talburt, Acxiom Chair of Information Quality at the University of Arkansas at Little Rock, and Lead Consultant for Data Governance and Data Integration with Noetic Partners Inc. -- 7.6 John A. Zachman, Author of "The Framework for Enterprise Architecture" (The "Zachman Framework"), Zachman International -- 7.7 Laura Sebastian-Coleman, Data Quality Lead, Finance Data Governance Center of Excellence, CVS Health -- 7.8 Phil Watt, Director, Elait Australia -- 7.9 Shannon Fuller, Director of Governance Advisory Services, Gray Matter Analytics -- 7.10 Dr. Stan Rifkin, Director of R& -- D, Master Systems Inc. -- 7.11 Tony K. Epler, Chief Data Strategist, PricewaterhouseCoopers -- Appendix A Bibliography -- Appendix B Glossary of Terms -- Index.
Record Nr. UNINA-9910483893003321
Mahanti Rupa  
Singapore : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data protection for virtual data centers [[electronic resource] /] / Jason Buffington
Data protection for virtual data centers [[electronic resource] /] / Jason Buffington
Autore Buffington Jason <1970->
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, N.J., : Wiley Technology Pub., c2010
Descrizione fisica 1 online resource (530 p.)
Disciplina 005.8
Soggetto topico Virtual computer systems
Data protection - Management
ISBN 1-282-70821-X
9786612708213
1-118-25576-3
0-470-90823-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Protection for Virtual Data Centers; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: What Kind of Protection Do You Need?; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection
What Data Looks Like from the Server's PerspectiveHardware-centric Protection; File-centric Protection; Application-centric Protection; Where to Store Your Protected Data; Summary; Chapter 4: Better Backups; Solving the Problem from the Inside Out; Volume Shadow Copy Service (VSS); The Windows Server Backup Utility; System Center Data Protection Manager; Summary; Chapter 5: File Services; File System Availability and Protection in Windows Server; What Is the Distributed File System?; Enabling DFS on Your Windows File Servers; Getting Started with DFS-N; Getting Started with DFS-R
Mixing DFS-R and DFS-N for Real-World SolutionsDFS Enhancements in Windows Server 2008 R2; Summary; Chapter 6: Windows Clustering; Overview of Clustering in Windows Server 2008 and 2008 R2; Building Your First Cluster; How Failover Clustering Works; Quorum Models; Windows Server 2008 R2 Failover Clustering; Summary; Chapter 7: Microsoft Exchange; Exchange within Microsoft Cluster Services; Exchange 2007 Continuous Replication; Exchange 2010 Database Availability; Summary; Chapter 8: Microsoft SQL Server; SQL Server Built-in Resiliency; SQL Failover Clustering; SQL Database Mirroring
SQL Database FailoverSQL Log Shipping and Replication; Which SQL Server HA Solution Should You Choose?; Backing Up SQL Server; Summary; Chapter 9: Virtualization; Virtualization Changes Everything; Protecting Virtual Machines; Availability of Virtual Machines; How Virtualization Makes Data Protection and Availability Better; Disaster Recovery Staging; Bare Metal Recovery; Server Rollback; Summary; Chapter 10: Management and Deployment; Well-Managed Systems for Higher Uptime; Large Enterprise Deployment and Manageability; Virtualization Management; Midsized Management: Physical and Virtual
SummaryChapter 11: Monitoring Systems; The Need for Monitoring; Challenges in Monitoring; Enterprise End-to-End Monitoring; Monitoring the Health and Performance of Key Workloads; Monitoring in Midsized Organizations Using System Center Essentials; Summary; Chapter 12: Business Continuity and Disaster Recovery; What Makes BC and DR So Special?; Get Your Data Out of the Building; BC = DR + HA; BC/DR Solution Alternatives; Using Virtualization to Achieve Business Continuity; Planning for BC/DR to Get Better Backups and Availability; Summary; Appendix: Links and Resources; Microsoft Software
Topical Resources
Record Nr. UNINA-9910140740503321
Buffington Jason <1970->  
Hoboken, N.J., : Wiley Technology Pub., c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Data protection for virtual data centers / / Jason Buffington
Data protection for virtual data centers / / Jason Buffington
Autore Buffington Jason <1970->
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, N.J., : Wiley Technology Pub., c2010
Descrizione fisica 1 online resource (530 p.)
Disciplina 005.8
Soggetto topico Virtual computer systems
Data protection - Management
ISBN 1-282-70821-X
9786612708213
1-118-25576-3
0-470-90823-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Data Protection for Virtual Data Centers; Acknowledgments; About the Author; Contents; Introduction; Chapter 1: What Kind of Protection Do You Need?; In the Beginning, There Were Disk and Tape; Overview of Availability Mechanisms; Overview of Protection Mechanisms; Summary; Chapter 2: Data Protection by the Numbers; The Technical Metrics: RPO and RTO; Business Metrics: RA and BIA; Risk Mitigation: Fixing It in Advance; Total Cost of Ownership; Return on Investment; Turning IT Needs into Corporate Initiatives; Summary; Chapter 3: The Layers of Data Protection
What Data Looks Like from the Server's PerspectiveHardware-centric Protection; File-centric Protection; Application-centric Protection; Where to Store Your Protected Data; Summary; Chapter 4: Better Backups; Solving the Problem from the Inside Out; Volume Shadow Copy Service (VSS); The Windows Server Backup Utility; System Center Data Protection Manager; Summary; Chapter 5: File Services; File System Availability and Protection in Windows Server; What Is the Distributed File System?; Enabling DFS on Your Windows File Servers; Getting Started with DFS-N; Getting Started with DFS-R
Mixing DFS-R and DFS-N for Real-World SolutionsDFS Enhancements in Windows Server 2008 R2; Summary; Chapter 6: Windows Clustering; Overview of Clustering in Windows Server 2008 and 2008 R2; Building Your First Cluster; How Failover Clustering Works; Quorum Models; Windows Server 2008 R2 Failover Clustering; Summary; Chapter 7: Microsoft Exchange; Exchange within Microsoft Cluster Services; Exchange 2007 Continuous Replication; Exchange 2010 Database Availability; Summary; Chapter 8: Microsoft SQL Server; SQL Server Built-in Resiliency; SQL Failover Clustering; SQL Database Mirroring
SQL Database FailoverSQL Log Shipping and Replication; Which SQL Server HA Solution Should You Choose?; Backing Up SQL Server; Summary; Chapter 9: Virtualization; Virtualization Changes Everything; Protecting Virtual Machines; Availability of Virtual Machines; How Virtualization Makes Data Protection and Availability Better; Disaster Recovery Staging; Bare Metal Recovery; Server Rollback; Summary; Chapter 10: Management and Deployment; Well-Managed Systems for Higher Uptime; Large Enterprise Deployment and Manageability; Virtualization Management; Midsized Management: Physical and Virtual
SummaryChapter 11: Monitoring Systems; The Need for Monitoring; Challenges in Monitoring; Enterprise End-to-End Monitoring; Monitoring the Health and Performance of Key Workloads; Monitoring in Midsized Organizations Using System Center Essentials; Summary; Chapter 12: Business Continuity and Disaster Recovery; What Makes BC and DR So Special?; Get Your Data Out of the Building; BC = DR + HA; BC/DR Solution Alternatives; Using Virtualization to Achieve Business Continuity; Planning for BC/DR to Get Better Backups and Availability; Summary; Appendix: Links and Resources; Microsoft Software
Topical Resources
Record Nr. UNINA-9910816015303321
Buffington Jason <1970->  
Hoboken, N.J., : Wiley Technology Pub., c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / / Jeffrey M. Stanton and Kathryn R. Stam
The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / / Jeffrey M. Stanton and Kathryn R. Stam
Autore Stanton Jeffrey M. <1961->
Pubbl/distr/stampa Medford, N.J., : Information Today, ©2006
Descrizione fisica 1 online resource (xvi, 353 pages) : illustrations
Altri autori (Persone) StamKathryn R. <1966->
Soggetto topico Electronic monitoring in the workplace
Data protection - Management
Information resources management
Supervision of employees
Privacy, Right of
ISBN 1-937290-68-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910466277303321
Stanton Jeffrey M. <1961->  
Medford, N.J., : Information Today, ©2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / / Jeffrey M. Stanton and Kathryn R. Stam
The visible employee : using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust / / Jeffrey M. Stanton and Kathryn R. Stam
Autore Stanton Jeffrey M. <1961->
Pubbl/distr/stampa Medford, N.J., : Information Today, ©2006
Descrizione fisica 1 online resource (xvi, 353 pages) : illustrations
Altri autori (Persone) StamKathryn R. <1966->
Soggetto topico Electronic monitoring in the workplace
Data protection - Management
Information resources management
Supervision of employees
Privacy, Right of
ISBN 1-937290-68-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910530265403321
Stanton Jeffrey M. <1961->  
Medford, N.J., : Information Today, ©2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui