0% found this document useful (0 votes)
65 views2 pages

Data Privacy Assignment 2

This document discusses governance outcomes and risks related to data. It outlines five key governance outcomes: 1) ensuring proper data use, 2) complying with regulations, 3) improving data security, 4) evidence-based decision making, and 5) monitoring processes. For each outcome, it describes some common risks such as privacy breaches, non-compliance, hacking, sampling bias, and ineffective monitoring strategies. The document stresses the importance of regularly updating security applications and being cautious of statistical analysis due to various risks in interpreting data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views2 pages

Data Privacy Assignment 2

This document discusses governance outcomes and risks related to data. It outlines five key governance outcomes: 1) ensuring proper data use, 2) complying with regulations, 3) improving data security, 4) evidence-based decision making, and 5) monitoring processes. For each outcome, it describes some common risks such as privacy breaches, non-compliance, hacking, sampling bias, and ineffective monitoring strategies. The document stresses the importance of regularly updating security applications and being cautious of statistical analysis due to various risks in interpreting data.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Governance Outcome and Value of Data

Governance Outcome Data Related Risks


1. Planning and Ensuring that data is used Evidence confirms that risks of confidentiality breach, for instance, have led users to
properly be more reluctant to share their data, including providing personal data ...

2.Complying with all regulatory requirements. Common compliance risks involve illegal practices and include fraud, theft, bribery,
money laundering and embezzlement. Privacy breaches. A common compliance risk
is the violation of privacy laws. Hacking, viruses and malware are some of the cyber
risks that affect organizations.
3. Improving data security. Make sure your computer is properly patched and updated. This is often the best
way to ensure its adequately protected. Your security applications are only as good
as their most recent update. Since hackers and ransomware strains are constantly
adapting to exploit weaknesses in earlier software versions, it is advisable to update
these applications regularly.
4. . Evidence-based Decision Making Confounding variables, sampling bias, correlation versus causation, insufficient data
to correctly point out what is an outlier and what isn’t, poorly chosen axis or time
periods, even measurement error… the list of risks in statistical analysis are many
and far more common than most people realize yet people are increasingly
conditioned to blindly believe a statement like “x was a statistically significant
change due to y.”
5. Monitoring processes Risk monitoring is the process which tracks and evaluates the levels of risk in an
organization. ... The findings which are produced by risk monitoring processes can
be used to help to create new strategies and update older strategies which may have
proved to be ineffective.
Governance Outcome and Regulatory Compliance
Performance Areas Practice Standards
1. Quality Management 1. International Standards Organization
2. Professional Organization
2. Business Process Management 3. Competency Framework Product
3. Program Management
4. Project Management
5. Financial Management
6. Asset Management
7. Human Resource

You might also like