<$BlogRSDUrl$>
 

This page is powered by Blogger. Isn't yours?

 Feedblitz email:
 RSS: http://linkingintegrity.blogspot.com/atom.xml

 

linking INTEGRITY

Integrity - use of values or principles to guide action in the situation at hand.

Below are links and discussion related to the values of freedom, hope, trust, privacy, responsibility, safety, and well-being, within business and government situations arising in the areas of security, privacy, technology, corporate governance, sustainability, and CSR.

The Ticket to Corporate Integrity, 7.8.04

Ganthead

[...] While IT cannot prevent collusion amongst a small set of executives to plunder corporate resources, it can establish a platform to validate the accuracy of a company's number. Reporting is all about data and the accuracy of that data is what integrity is all about. Since IT systems play an active role in capturing, processing and retention of data, IT plays a significant role in establishing data integrity.

Most systems today have very little data integrity. We have mainly considered just two dimensions during systems development:

  • cost and
  • delivery.

    The third dimension that is critical to establishing data integrity is proper data controls or the ability to ensure what you actually captured or processed is correct. Proper data controls that must be established include:

  • the verification that the data that you captured from a user is actually correct
  • the confirmation that your input and output records match up during systems processing
  • and validation that no one tampered with your data en route from one source to another.

    Data that is reported and used in critical business decisions originates somewhere and thus it is crucial that data capture controls are properly implemented. For example, in a warranty system, when a dealer enters in reimbursements for warranty items, we must ensure that they do not enter values that exceed the possible range of values or enter in fraudulent warranty claims. There must be logic in the application to ensure that only valid claims are processed and that users are immediately notified when incorrect information is entered.

    Similarly, when data is moved across the Internet, it is possible that someone may tamper with the data if proper controls are not placed on the data. This may compromise the integrity of that data. Consider the case of a subsidiary of a corporation that is on a separate network that must transmit data to a parent via the Internet. If this data is extremely sensitive, there is the potential that the data could be intercepted and altered by malicious individuals. In cases where the data is paramount to corporate integrity, companies should consider sending sensitive data via a virtual private network (VPN) or utilizing encryption techniques to mask the data.

    Perhaps the data controls that are most important in the business intelligence world are the ones around data processing. In many of the business intelligence efforts that I've seen, very little emphasis is applied to validating the cleanliness and accuracy of processing. Let's start with data cleanliness. It's true that if data input controls were robustly implemented that data cleanliness would not be an issue. The truth is that data still comes in with junk values and must be dealt with appropriately in business intelligence systems.

    Proper controls must be in place to ensure that improper records and values are filtered out before entering the data warehouse. Additionally, these improper records must be tracked and accounted for as part of the data verification process. For example, if 10 records out of 100 are excluded due to improper values, this must be tracked in the audit log and accounted for. The second piece of data processing controls are controls to ensure that the processing of data happened properly. In order to preserve integrity, we must track if input records were actually processed properly. This includes reporting and monitoring around record input counts and record output counts. Input/output verification can be performed either through hash token verification or simply counting input and output records. This goes for algorithm validation as well. Your data processing algorithms must be working properly, and controls are needed to validate this. By implementing controls during the data processing process, you can confirm that your results are right and thereby provide a structure for data integrity.

    In the data world, ensuring that the data gets captured, processed and reported is only a small piece of the puzzle. You must ensure that those results are right and can be validated by proper controls. By building effective data controls into your design that is commensurate with the sensitivity of the data you are handling, people will have more trust in your data and therefore in the integrity of the results that you present.


  • Comments

    Post a Comment
    
    

     

    Google

    Integrity Incorporated

    Site Feed

     Feedblitz email:


     RSS: http://linkingintegrity.blogspot.com/atom.xml

    
    

    "We shall need compromises in the days ahead, to be sure. But these will be, or should be, compromises of issues, not principles. We can compromise our political positions, but not ourselves. We can resolve the clash of interests without conceding our ideals. And even the necessity for the right kind of compromise does not eliminate the need for those idealists and reformers who keep our compromises moving ahead, who prevent all political situations from meeting the description supplied by Shaw: "smirched with compromise, rotted with opportunism, mildewed by expedience, stretched out of shape with wirepulling and putrefied with permeation.
    Compromise need not mean cowardice. .."

    John Fitzgerald Kennedy, "Profiles in Courage"

    Archives

    07.03   08.03   09.03   10.03   11.03   12.03   01.04   02.04   03.04   04.04   05.04   06.04   07.04   08.04   09.04   10.04   11.04   12.04   01.05   02.05   03.05   04.05   05.05   06.05   07.05   08.05   09.05   10.05   11.05   12.05   01.06   02.06   03.06   04.06   05.06   06.06   08.06   09.06   10.06   11.06   01.07   02.07   03.07   04.07   07.07   08.07   09.07   10.07   05.08   06.08