Before you collect, analyze, or use data, you need to define what data quality means for your specific purpose and context. Data quality criteria can include dimensions such as accuracy, completeness, timeliness, relevance, consistency, and validity. You can use these criteria to set standards, measure performance, and identify gaps or errors in your data. For example, you can use data quality indicators (DQIs) to monitor and report on the status of your data quality. You can also use data quality tools (DQTs) to validate, clean, or enrich your data.
-
When it comes to data quality I believe having the right tools (Software) to collect data is as critical as knowing what measurements you want to track (KPIs) defined, in relation to the Outcome you want to achieve, prior to selecting or upgrading your backend (BE) software because as we know garbage in garbage out is the #1 data quality criteria. This reduces gaps and errors in your data collection quality. And if you are using these measurements to forecast then accuracy is everything.
-
The old adage garbage in garbage out is still relevant. Decide what you want out of your data before you begin construction. What analysis are you in need of?
Data security is not only a technical issue, but also a legal and ethical one. You need to comply with the relevant data protection laws and regulations in your region, such as the General Data Protection Regulation (GDPR) in the European Union or the California Consumer Privacy Act (CCPA) in the United States. You also need to respect the rights and preferences of your data subjects, such as their consent, access, or deletion requests. To implement data security policies, you need to establish roles and responsibilities, define data classification and retention rules, and enforce data encryption and authentication methods.
-
After the UK has exited the EU, this has also amended the UK data protection rules, so bearing this in mind is equally important
-
Also in areas like healthcare you have additional very strict data protection requirements, in that field HIPAA law breaches can lead to fines and sanctions.
You don't have to reinvent the wheel when it comes to data quality and security. You can adopt existing frameworks and standards that provide best practices and guidelines for managing and improving your data. For example, you can use the ISO 8000 series of standards for data quality management, which cover aspects such as data governance, data architecture, data operations, and data assessment. You can also use the ISO 27000 series of standards for information security management, which cover aspects such as risk assessment, security controls, audits, and compliance.
Data quality and security are not only the responsibility of your data professionals, but also of your data users. You need to train and educate your data users on how to handle and use data properly and safely. You can provide them with data quality and security awareness programs, manuals, or guides that explain the principles, policies, and procedures of your data management. You can also encourage them to follow data quality and security best practices, such as verifying data sources, checking data accuracy, reporting data issues, and protecting data privacy.
-
Our analysts and daily data users must know how to spot data that is not valid. Validated data is formatted properly and within an acceptable range of values. Further, the data in your set should be accurate and consistent. Invalid or bad data leads to inaccurate analysis and inaccurate insights, which can lead to bad decisions by senior leaders. It's critical for data users to know the difference.
-
Also testing your data users using techniques such as fake phishing emails and text messages is a good way of reinforcing the training that all data users should undergo.
Data quality and security are not static, but dynamic. They can change over time due to various factors, such as new data sources, new business requirements, new technologies, or new threats. You need to monitor and review your data quality and security regularly and continuously, using metrics, reports, feedback, or audits. You also need to update and improve your data quality and security processes, tools, and frameworks based on the results of your monitoring and review. You can use a continuous improvement cycle, such as the Plan-Do-Check-Act (PDCA) model, to guide your actions.
-
I believe this is where training is critical, having specialists who understands the process in its entirety from purpose to desired outcome with the ability to perform Gap Analysis and Improve or Develop new processes or procedures is key.
Data quality and security are complex and evolving fields that require constant learning and updating. You can learn from data quality and security experts who have experience and knowledge in these domains. You can access their insights, tips, or best practices through various sources, such as books, blogs, podcasts, webinars, or courses. You can also network with them through online or offline communities, forums, or events. You can ask them questions, share your challenges, or seek their advice on how to improve your data quality and security.
-
Having an analyst with expertise in Software development, Gap Analysis, Performance Improvement, and Problem solving expertise is key because they have the ability to identify when there are gaps and come up with solutions. In the past at a call centre not only did this ability help the company I worked for by identify the gaps (they needed to capture specific KPIs), the shareholders had certain criterias written into their contract as a requirement in order to secure their multi-million dollar contract, as a result the Software vendor also benefitted tremendously because I ended up designing the improvements/upgrades needed for their software in the process which opened doors for their company in that industry in a significant way.
更多相关阅读内容
-
Data GovernanceHow can you protect sensitive data without sacrificing usability?
-
Information TechnologyWhat are the benefits of a data classification scheme?
-
Data ManagementWhat are the best practices for storing and managing collected data?
-
Data EngineeringWhat are the key security considerations in data acquisition?