Our Recommendations :-
Follow CA IPCC | CA Intermediate FB Page

Define Data Management Control ?

Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Anil Dhawan asked over 2 years ago

    1       0 Answer Now Comment Report
3 Answers
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 CA Sandeep Bohra answered over 2 years ago

> Define Data Management Control ? --> Define Information Security Policy. --Data management comprises all the disciplines related to managing data as a valuable resource. --The official definition provided by DAMA International, the professional organization for those in the data management profession, is: "Data Resource Management is the development and execution of architectures, policies, practices and procedures that properly manage the full data lifecycle needs of an enterprise." This definition is fairly broad and encompasses a number of professions which may not have direct technical contact with lower-level aspects of data management, such as relational database management. --The concept of "Data Management" arose in the 1980s as technology moved from sequential processing (first cards, then tape) to random access processing. Since it was now technically possible to store a single fact in a single place and access that using random access disk, those suggesting that "Data Management" was more important than "Process Management" used arguments such as "a customer's home address is stored in 75 (or some other large number) places in our computer systems." During this period, random access processing was not competitively fast, so those suggesting "Process Management" was more important than "Data Management" used batch processing time as their primary argument. As applications moved into real-time, interactive applications, it became obvious to most practitioners that both management processes were important. If the data was not well defined, the data would be mis-used in applications. If the process wasn't well defined, it was impossible to meet user needs.

    0       0 Comment Report
Important Note – Preparing for CA IPCC?
CAKART provides Indias top faculty each subject video classes and lectures – online & in Pen Drive/ DVD – at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below – 
For any questions Request A Call Back  
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Pankaj answered over 2 years ago

Data Management Controls: ------------------------- These Controls fall in two categories: -------------------------------------- (a) Access Controls: Access controls are designed to prevent unauthorized individual from viewing, retrieving, computing or destroying the entity's data. Controls are established in the following manner: User Access Controls through passwords, tokens and biometric Controls; and Data Encryption: Keeping the data in database in encrypted form. (b) Back-up Controls: Backup controls ensure the availability of system in the event of data loss due to unauthorized access, equipment failure or physical disaster; the organization can retrieve its files and databases. Various backup strategies are: Dual recording of data, Periodic dumping of data, Logging input transactions and Logging changes to the data. Thanks & Regards

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Chirag answered over 2 years ago

**Data Management Controls**: These Controls fall in two categories: (a) **Access Controls:** Access controls are designed to prevent unauthorized individual from viewing, retrieving, computing or destroying the entity's data. Controls are established in the following manner: User Access Controls through passwords, tokens and biometric Controls; and Data Encryption: Keeping the data in database in encrypted form. (b) **Back-up Controls:** Backup controls ensure the availability of system in the event of data loss due to unauthorized access, equipment failure or physical disaster; the organization can retrieve its files and databases. Various backup strategies are: Dual recording of data, Periodic dumping of data, Logging input transactions and Logging changes to the data.

    0       0 Comment Report
Get Notifications
Videos
Books
Notes
Loading
SIGN UP
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.