Understanding data governance

Understanding Data Governance

First published by Lindsay Wise, Contributor, CIO.  6 Sept 2016. Whether implementing self-service dashboards, developing reporting processes to meet regulatory compliance, or defining BI strategy, one common challenge seems to arise: governance. When evaluating both business and technical challenges that exist, the following questions come up consistently: How can we ensure that source data can…

National Data Governance Institute

National Government ICT Security Institute opens in Melbourne

First published by Staff Writes, GN News, Oct 2016. Australia’s capability in data and cyber security has been strengthened with the opening of Data Governance Australia (DGA), a new national data governance institute in Melbourne. This represents a boost for the country’s capability in this area as well as Victoria’s data and cyber security industry.…

CDR PrivacyRisk Underestimated

CDR Privacy Risk Underestimated

Published by Denham Sadler, InnovationAus.com, 4 Mar 2019. The federal government had “severely underestimated” the privacy risks of the Consumer Data Right, even as it pushes to complete an inquiry process and pass the legislation before the election, according to the Australian Privacy Foundation. The Consumer Data Right (CDR) legislation, which lays the groundwork for…

ACCC Releases Draft Rules

ACCC releases draft CDR Rules

Published by Aimee Chanthadavong, InnovationAus.com, 1 Apr 2019. The Australian Competition and Consumer Commission (ACCC) has published its draft rules for the looming Consumer Data Right regime and is seeking feedback from consumers, businesses, and community organisations on the new data regulatory framework. The Consumer Data Right was announced by government as a budget measure…

DataProtection 09ARP19

Is your organization taking a holistic approach to data protection?

First published by Mark Jow, Commvault, 27 March 2019 Mark Jow shares some points that organizations should consider when analysing whether data protection processes and strategies are sufficient to meet the differing requirements of disaster recovery and data security. In today’s digital economy, simply capturing and storing data is no longer enough. In order to…