Created at 6pm, Jan 20
veereadsArtificial Intelligence
0
Implementation of the Data Governance Programme
R8SQlVqMrQIB5RaaIBWqiwbtOuiR2rMkbCdu_De-QMc
File Type
PDF
Entry Count
5
Embed. Model
jina_embeddings_v2_base_en
Index Type
hnsw

The description of contents related to the data governance and implementation.

Completeness Timeliness Consistency Relevance Data Lifecycle 1. 2. and processing. 3. purchase it from others. 4. is maintained at a suciently high quality. 5. We either use the data to determine access to resources, to make a decision, to identify particular groups or aspects of service or to decide that the data can be disposed of. 6. or oer new services. Evaluate the data to see if it can be enhanced to get more eciencies Data Provenance Data Provenance is the documentation of where a piece of data originates and the processes and methodology by which it was produced. 1. 2. 3. Plan for the acquisition of data for a new function or product Design data requirements and set up systems to enable its collection Set up systems to create the data obtain it through new processes or Store the data so that it is accessible for our needs and ensure that it conrm the authenticity of data to enable it to be safely reused and simplify the ability to trace errors back to the root
id: 81f8d00dcbb944572b4d05b046e0febb - page: 2
Data Integrity & Security Key focus areas of data governance also include availability, usability, consistency, data integrity and data security. -> Checks for data integrity ensure the quality of data before use -> Data security protects data from destructive forces and from the unwanted actions of internal and external unauthorised users. Data Integrity: Data integrity is concerned with the maintenance of and the assurance of the accuracy and consistency of data over its entire life cycle. Data integrity is a desired result of data security. Data Security: Data security is the protection of data against unauthorised access or corruption and is necessary to ensure data integrity. Data Securit Controls: General Controls: Govern design, security and use of computer programs and security of data les in general. data security controls, system development controls Software controls, hardware controls, computer operations controls,
id: 5cada30034f540b2fbff782bfe42b769 - page: 2
Application Controls: Controls unique to each computerized application Input controls, processing controls, output controls Data Risk Management Data risk is the potential for business loss due to poor data governance. Summary DATA GOVERNANCE includes the people, processes and technologies needed to manage and protect the companys data assets in order to guarantee generally understandable, correct, complete, trustworthy, secure and discoverable corporate data. DATA MANAGEMENT is the process of ingesting, storing, organising and maintaining the data created and collected by an organisation. DATA QUALITY ensuring data is correct, consistent and free of noise that might impede usage and analysis. DATA PROVENANCE is the documentation of where a piece of data comes from and the processes and methodology by which it was produced.
id: aa44086cddb2583d1d990e86addfaaa0 - page: 3
How to Retrieve?
# Search

curl -X POST "https://search.dria.co/hnsw/search" \
-H "x-api-key: <YOUR_API_KEY>" \
-H "Content-Type: application/json" \
-d '{"rerank": true, "top_n": 10, "contract_id": "R8SQlVqMrQIB5RaaIBWqiwbtOuiR2rMkbCdu_De-QMc", "query": "What is alexanDRIA library?"}'
        
# Query

curl -X POST "https://search.dria.co/hnsw/query" \
-H "x-api-key: <YOUR_API_KEY>" \
-H "Content-Type: application/json" \
-d '{"vector": [0.123, 0.5236], "top_n": 10, "contract_id": "R8SQlVqMrQIB5RaaIBWqiwbtOuiR2rMkbCdu_De-QMc", "level": 2}'