Corporate Data Management Policy
Responsibility for policy: Chief Information Officer
Approving authority: Vice-Chancellor
Last reviewed: May 2018
Next review date: May 2023
- This policy applies to all staff and contractors of the University of Waikato.
- The purpose of this policy is to establish a framework of principles to be applied to the management, security and use of corporate data.
- This policy should be read in conjunction with the following documents:
- In this policy:
contractor means a person or organisation engaged by the University through a contract for goods or services
corporate data means all data that is captured through the operation of the University, and includes, but is not restricted to:
- human resource data
- health and safety data
- financial data
- facilities data
- student data
- timetabling data
- paper and programme data
- research data
- paper evaluation data
- library data
- schools data
- learning manageemnt system (LMS) data
- security data
- customer relationship managment (CRM) data
- identity management data.
primary source means the official University record for the relevant data, as identified by the data owner, i.e. where data is 'mastered'
restricted data means data that is protected by legislation or policy and that requires the highest level of access control and storage protection
secondary source means a source of data that has been copied from a primary source.
- The following principles apply with respect to this policy:
- Corporate data is an essential component of effective strategy development and management of the University.
- Corporate data must be readily accessible to inform decision-making.
- All elements of the University's corporate data systems must be integrated.
- New data systems developed or purchased by the University must be interfaced with the current corporate data systems and not implemented as stand-alone systems.
- Corporate data, especially primary source data, must be accurate and verifiable.
- Data must be maintained solely in the primary source; any change in primary source data must be reflected immediately in secondary sources without modification.
- The value of corporate data is increased through widespread, timely and consistent use.
- Corporate data must not be used for an individual's own or for others' personal gain or profit, or to satisfy one's own or another's curiosity.
- Restricted data must be protected with appropriate levels of security so that the risk of the unauthorised disclosure, alteration or destruction of restricted data is minimalised.
- Information and Technology Services is responsible for:
- facilitating data sharing and integration
- documenting and promoting the structure and logic of corporate data
- identifying items of corporate data, distinguishing primary data sources and defining Enterprise Master Data
- providing advice and support for the data owners, data stewards and system administrators designated under clause 7(k) of this policy
- managing the integration of current and new systems as part of the corporate information architecture
- managing technological implementation of common data definitions and data classifications throughout the University
- liaising with data owners with respect to approved uses for corporate data, including restricted data
- managing the design and implementation of processes for maintaining the integrity, accuracy, precision, timeliness, consistency, standardisation and value of data
- defining and managing the corporate information architecture
- maintaining a register of corporate systems and associated Enterprise Master Data
- maintaining a register of restricted data against the corporate information architecture tables and fields.
- Data owners (as listed in the Appendix to this policy) are responsible for:
- decision-making on the corporate data in their area of responsibility
- ensuring that corporate data is governed in accordance with this policy, the ICT Data Framework and the Information Security Standards
- managing corporate data in their area of responsibility, including data provided to or by contractors or third parties
- the establishment of validation rules for data entry and data correction in their area of responsibility
- collaborating with ITS Data Services with respect to the establishment of processes, technical solutions and governance with respect to data in their area of responsibility
- identifying and documenting authorities for access to data and levels of access
- authorising downloads and uploads of corporate data
- authorising appropriate access to corporate data, including to restricted data
- monitoring and enforcing the consistent application of processes for maintaining the integrity, accuracy, precision, timeliness, consistency, standardisation and value of data
- arranging appropriate training for staff and others to ensure data is captured and used accurately and competently
- ensuring (where appropriate) that relevant staff in their area of responsibility are designated as:
- data stewards
- system administrators
- data users.
- defining validation rules for data entry and exit to ensure the integrity of primary data sources
- fixing data that does not meet the primary data source conditions.
- providing and removing access to data users as specified by data owners
- ensuring that data systems are operating efficiently
- monitoring the transfer of data from primary to secondary sources, notifying data owners of any matters arising from that process and resolving associated issues
- ensuring that appropriate safeguards exist to protect data and that appropriate disaster recovery and business continuity procedures are in place
- providing appropriate procedural controls to protect data from unauthorised access
- ensuring that data users’ devices are able to access the system.
- are responsible for accessing, entering, maintaining and using data in accordance with rules set by data owners
- are responsible for ensuring that all access to data through their user account is relevant and appropriate to the work being undertaken
- are responsible for ensuring that subsequent use and distribution of data accessed through their user account is valid and appropriate
- must not disclose corporate data to unauthorised persons without the consent of the relevant data owner
- must not disclose their password to anyone.
Personal information and privacy
Responsibility for monitoring compliance
- The Chief Information Officer is responsible for monitoring compliance with this policy, and for reporting breaches to the Vice-Chancellor.
- Breaches of this policy may result in disciplinary action under the Staff Code of Conduct.
The term ‘School’ in this policy includes Faculties and the term ‘Head of School’ includes Deans.