First Tuna Data Workshop (TDW-1) 23-27 October 2006, Noumea, New Caledonia Oceanic Fisheries Programme (OFP) Secretariat of the Pacific Community (SPC)

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

CLEARSPACE Digital Document Archiving system INTRODUCTION Digital Document Archiving is the process of capturing paper documents through scanning and.
Database Management System MIS 520 – Database Theory Fall 2001 (Day) Lecture 13.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
11 3 / 12 CHAPTER Databases MIS105 Lec14 Irfan Ahmed Ilyas.
Computer Security: Principles and Practice
Created May 2, Division of Public Health Managing Records What is a Record? What is a Records Retention & Disposition Schedule? Why is this Important?
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Introduction to Databases and Database Languages
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
General Awareness Training
Handling information 14 Standard.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
1.1 System Performance Security Module 1 Version 5.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.

Security Architecture
 Definition  Components  Advantages  Limitations Contents  Definition Definition  Functions Functions.
Workshop on International Standards, Contemporary Technologies and Regional Cooperation, Noumea, New Caledonia, 04–08 February 2008 Results Generated from.
Chapter 7: Database Systems Succeeding with Technology: Second Edition.
CDP Standard Grade1 Commercial Data Processing Standard Grade Computing Studies.
Information Systems Security Operational Control for Information Security.
Mark A. Magumba Storage Management. What is storage An electronic place where computer may store data and instructions for retrieval The objective of.
Data Protection Act AS Module Heathcote Ch. 12.
Information: Policy, Strategy and Systems Module Overview
Database What is a database? A database is a collection of information that is typically organized so that it can easily be storing, managing and retrieving.
Chapter 1 Introduction to Databases. 1-2 Chapter Outline   Common uses of database systems   Meaning of basic terms   Database Applications  
IS 325 Notes for Wednesday August 28, Data is the Core of the Enterprise.
Use of Administrative Data Seminar on Developing a Programme on Integrated Statistics in support of the Implementation of the SNA for CARICOM countries.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
Prepared By Prepared By : VINAY ALEXANDER ( विनय अलेक्सजेंड़र ) PGT(CS),KV JHAGRAKHAND.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data resource management
Database Management Systems (DBMS)
Communication in Administration (Security)
Consultant Advance Research Team. Outline UNDERSTANDING M&E DATA NEEDS PEOPLE, PARTNERSHIP AND PLANNING 1.Organizational structures with HIV M&E functions.
SCHOOLS FINANCE OFFICERS MEETINGS Records Management, “Paper-Lite” Environments and Procedures when a school closes Elizabeth Barber.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
CONTROLLING INFORMATION SYSTEMS
Copyright (c) 2014 Pearson Education, Inc. Introduction to DBMS.
Data Coordinators Conference – 2014 Laura Marroquin CASEWORKER/JCMS Specialist Everything New Data Coordinators Should Know.
Personal data protection in research projects
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
SESSION 6.4 Information Management System (IMS) initiatives Sixth Tuna Data Workshop (TDW-6) April 2012 SPC, Noumea, New Caledonia.
A Training Course for the Analysis and Reporting of Data from Education Management Information Systems (EMIS)
Fifth Tuna Data Workshop (TDW-5) April 2011, Noumea, New Caledonia Oceanic Fisheries Programme (OFP) Secretariat of the Pacific Community (SPC) Session.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
EECS David C. Chan1 Computer Security Management Session 1 How IT Affects Risks and Assurance.
Mirjana Boshnjak Skopje, 20 to 22 September 2017
Transaction processing systems
Design Process.
BASIC INFORMATION ABOUT DATABASE MANAGEMENT SOFTWARE
Week 12 Option 3: Database Design
Definition, DIS/Advantages & Services
SESSION 11 Observer Data Auditing
RECORDS AND INFORMATION
SESSION 5.2 An update on Information Management System (IMS) initiatives Seventh Tuna Data Workshop (TDW-7) April 2013 SPC, Noumea, New Caledonia.
Review of Recommendations from TDW-4
LO2 - Be Able to Design IT Systems to Meet Business Needs
SESSION 10.2 Observer Database Systems Debriefing System
TUFMAN – Current Status and Future work
Regional and National Tuna Data processing strategy in the future
SESSION 9.2 Observer Database Systems - Debriefing System
RAMP-TRIM Training modules ppt Training Modules Overview Highlights
TUFMAN – Developments and future plans
OBSERVER DATA MANAGEMENT PRINCIPLES AND BEST PRACTICE (Agenda Item 4)
Presentation transcript:

First Tuna Data Workshop (TDW-1) October 2006, Noumea, New Caledonia Oceanic Fisheries Programme (OFP) Secretariat of the Pacific Community (SPC) SESSION 5.2 Components of Managing Data …

Presentation Outline Components of Managing Data 1.Data Registry System 2.Data (hard-copy) Filing System 3.Integrated Database System Definition Benefits Data Processing 4.Data Quality Control 5.Data Archiving system 6.Data Security

What is Data Collection, Management and Dissemination ? “Requirements” to collect data Output to users of data National data holdings Data collection systems Data management systems Data dissemination systems (using the data) Feedback mechanisms (e.g. Quality Control)

Components of Managing Data Data Registry System Used to register each receipt of data into the Fisheries Division Ensures that all data received by your office can be tracked Can be a manual or database system Caters for an appropriate “link” to where hard-copy data are stored to facilitate easy retrieval Caters for appropriate “links” to where electronic data are stored (computer / directory / database) Caters for the acknowledgement of receipt of data to sender (which also might describe any problems with the data) Basic attributes of each data receipt are Type of data Source of data (country, sender) Date sent by sender or date of covering letter with data Date received Date acknowledgement of receipt sent Acknowledgement sent by whom

Components of Managing Data Data (hard-copy) Filing System Data (hard-copy) Filing Systems are usually arranged according to one or several of the following attributes (not necessarily in this order) - (i)Type of data (ii)Gear type (iii)Vessel nationality (iv)Vessel Name Select a filing system that is compatible with your main database and Data Registry Systems to facilitate easy retrieval Consider a data archive policy (i.e. scan to electronic form and destroy hard-copy after a certain period to time) Consider what security measures are required for your hard-copy data

Components of Managing Data Integrated Database System Definition of an Integrated Database System “ … an integrated database system manages and organises the storage of all types of relevant data in electronic form through data entry, data quality control and other database management system modules. An integrated database system also allows for the efficient retrieval of information through a reporting module …” Benefits of an integrated Database System Facilitates the verification of one type of data with another Maintains consistency Ensures standardisation Facilitates the determination of the coverage of data Facilitates the reporting of more than one type of data Facilitates the reconciliation of several data types Prevents duplication (e.g. identical reference tables in two separate systems)

Components of Managing Data Integrated Database System (cont.) Data Processing Module Essentially the data entry/verification sub-system Provides a means of transferring hard-copy data to electronic form Allows for efficient storage of data in a database Includes specific forms of Data Quality Control, for example, “Verification” Phase (double-entry system) “Field range checks” “Reference Table Edit checks”

Components of Managing Data Data Quality Control The “Quality Control” concept covers all systems … Quality Control in data collection systems Quality Control in data management systems … linked through feedback mechanisms … Main purpose of Quality Control is to ensure accurate / representative data are available Quality Control in Data management systems Pre-data processing Data Processing Post-data processing Data quality reporting (Revisited in Session 5.3)

Components of Managing Data Data Archiving System Data Backup Strategy What media is used to backup electronic data… What frequency of backup is used… Daily Weekly Monthly Annually Who is responsible… What is backed up… (on-site and off-site) Where do the backups reside…(on-site and off-site) Are there instructions/procedures for the Data Backup Consider whether all historic electronic data should remain on-line Consider whether historic hard-copy data should be archived off-site Data Recovery Strategy Are there instructions/procedures for Data Recovery Who is responsible for informing staff and performing Data Recovery procedures

Components of Managing Data Data Security Consider the need for a Data Security Policy covering your tuna fishery data  are there precedents in other government departments in your country ?  this may eventually be guided by the proposed WCPFC’s Information Security Policy (ISP) Regardless of the need for a “policy”, it is important to have Data Security Procedures to protect data… “Data security” is defined as the protection of data from unauthorized (accidental or intentional) access, modification, destruction, or disclosure

Components of Managing Data Data Security (cont.) Components of “Data Security Procedures” Describe security procedures with respect to “Physical access” … Hard-copy data, computers, lap-tops or other sensitive material Considers how to handle the level of access (e.g. visitor’s access ?) Describe security procedures with respect to “Electronic access” … Login/passwords Network firewalls Anti-virus software Level of access by user or user group Ensure security methods and software are up-to-date Secure backup Secure Dissemination of data Should clearly define who is responsible in each case Should include training and awareness-raising for all staff