Top Banner
Conducting your own Data Life Cycle Audit Presented by: Information Technology Advisory Group ITAG December 3, 2003
26

Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

Mar 26, 2015

Download

Documents

David Marsh
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

Conducting your own Data Life Cycle Audit

Presented by: Information Technology Advisory Group

ITAGDecember 3, 2003

Page 2: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 2

Format of Presentation

ITAG Overview What is the Data Life Cycle Why should you conduct a Data Life

Cycle Audit Steps to conduct your own Data Life

Cycle Audit

Page 3: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 3

ITAG Overview

Strategic technology consulting firm that focuses on the alignment of business and technology.

Started in 1998 Primary market is associations

(member-centric organizations) Created the ITAG Alliance

Page 4: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 4

ITAG Overview

Proven methodologies: Business Technology Alignment Strategic Planning Business Intelligence Technology Selection & Implementation Technology Initiative Management Business Continuation / Disaster

Recovery Planning

Page 5: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 5

What is the Data Life Cycle?

The Data Life Cycle are the phases in which data moves through the organization. The different phases include how the organization collects, stores, processes and disseminates their key data.

Key data defines the most critical or important data elements that are pertinent to supporting an internal organization’s specific business processes.

Page 6: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 6

Why should you conduct a Data Life Cycle Audit? Eliminate duplication of work effort and

increase overall productivity. Consolidate stranded information

assets. Generate business intelligence in order

to better facilitate customer relationship management.

Support cross-departmental business functions.

Enhance one-on-one (personalized) marketing.

Page 7: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 7

Why should you conduct a Data Life Cycle Audit? Improve data maintenance and

integrity. Helps identify data flow dependencies

for business continuation/disaster recovery planning.

Identify a complete enterprise application integration strategy.

Creates a vehicle to communicate technology needs to senior management

Page 8: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 8

What does the AMS have to do with it? AMS is core business (association) application

which supports all four phases of the Data Life Cycle Streamlines data collection Primary data repository Supports transaction processing Base for reporting/business intelligence

Identifies data integration Third party applications / data sources Strategic Partners Web

Page 9: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 9

Enterprise Application Integration AMR Research (2003)

45% of companies require the same customer to place orders through separate systems

60% have limited or no integration between their front- and back-office systems

90% struggle with customer responsiveness, visibility, automation and data quality

20% of customer data is centrally managed

Page 10: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 10

How to Conduct a Data Life Cycle Audit Identify primary business functions and

associated processes and tasks for each Identify departments that are

associated with each business function Document the Data Life Cycle for each

business function (and process) Data Collection Data Repository Business Process Data Dissemination

Page 11: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 11

Primary Business Functions

Membership Committees / Boards Meetings

Management Products / Publication

Sales Sponsorship Education Certification Marketing

Legislative Tracking Regulatory Tracking Finance Customer Service Communications Research PAC Foundation

Page 12: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 12

Business Function Analysis

What are the primary responsibilities (business functions) for each department?

What other departments or business functions are directly related with this business function?

What are the routine tasks to perform the primary responsibilities?

What are the standard operating procedures?

How current is your business continuity / disaster recovery plan?

Page 13: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 13

Business Functions

The same business function can be performed by multiple departments.

Processes and tasks related to a business function can cross over multiple departments.

A business function can have multiple processes and tasks associated with it.

Page 14: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 14

Data Collection Methods

Web Forms Email Conversations Third-Party

Strategic Partners

Abstracts (Call for Speakers)

Membership ApplicationSubscriptionsOrder Entry Meetings RegistrationExhibit RegistrationSurveysExternal Societies or Chapters

Page 15: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 15

Data Collection Analysis

What key data is required to support each business function?

What key data is collected during each data collection method identified for each business function?

What is the frequency of collected key data based upon each data collection method?

What key data is considered static, non-static or calculated?

Page 16: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 16

Key Data Mapping

Organizational Key Data M

emb

ersh

ip

App

licat

ion

Mem

ber

ship

S

urve

y

Pla

n P

rofi

le R

epor

t

Mee

ting

R

egis

trat

ion

Pro

duct

Sal

es

Dir

ect

Con

tact

Organization Name X X X X X X Parent / Subsidiary Link X Organization Address X X X Organization Phone X X X Organization Fax X X X Organization URL X X Organization Type X X Organization Classification X X Products and Services X X Number of Employees X X X Corporate Structure X Congressional District Organization Description/Mission X X

Page 17: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 17

Data Storage Analysis

Where does the key data reside that supports each business function (AMS, Word, Excel, etc.)?

What format is the data? How does that data get accessed (standalone,

networked, remote application)? Based upon the interdependencies of key data

between business functions, does each business function have access to the most current and accurate data source?

What are the key indexes for each data repository?

How much data is being stored?

Page 18: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 18

Data Repository Map

FMS

PAC

CRM/AMS

Press/Media

Online Meeting

Registration

Certification

OnlineProduct

Sales

Legislative/Regulatory

Chapters

Stranded Information Assets

Page 19: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 19

Challenges with Stranded Information Assets Technical Challenges

Multiple data sources, data types, locations Data accessibility Redundant data sources

Organizational Challenges Managing information Maintaining data integrity Creating accurate and timely reports Publishing to Members, Committees or

Board

Page 20: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 20

Process Analysis

What process is being supported based upon data collected by a different business function?

Are there manual processes which can be automated easily?

What processes are supported by web-based applications?

What external strategic partnerships do you have that support internal business functions – how does those partnerships impact the process, including data collection, storage and dissemination?

Page 21: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 21

Business Process Map

Customers

Meetings/ Education

CommitteeManagement

Products

Exhibits

FinancialReporting

Certification

Legislative / Regulatory

Page 22: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 22

Data Dissemination Methods Digital Content for Sale List/Reports/Queries Inter/Intra/Extra Net Business Intelligence Forecasting New Product/Service Enhance Customer

Service Knowledge Creation

Web FormsPDAPersonalized EmailsPublicationsFile TransferConversations

Page 23: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 23

Data Dissemination Analysis What are the different tools used for

disseminating data (report writers, data mining tools, etc.)?

What format does key data get disseminated? Reports Publications Web Content PDA External Strategic Partnerships

What other applications is data being disseminated to?

Page 24: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 24

Data Life Cycle Map

PDAAction TriggerMail

Store

Content Update

Web Forms

AMS/ Subset

DynamicUpdate Analytics

Data Entry

Temp DB/

Other

BatchUpdate Integrity

Reporting

Trip ReportsCEU VerificationIssue Lobbyist

Meeting RegistrationProduct PurchaseMember Profile

SurveyMembership Application

Data Collection Repositories DisseminationProcesses

PDA Mail Store

PDA Mail Store

Page 25: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

December 3, 2003 www.ItagInfo.com 25

Data Life Cycle

Data Collection Repository Process Dissemination

Continuous

Page 26: Conducting your own Data Life Cycle Audit Presented by: I nformation T echnology A dvisory G roup ITAG December 3, 2003.

Conducting your own Data Life Cycle Audit

THANK YOU!

Presented by: Information Technology Advisory Group

ITAGDecember 3, 2003