DS11: Data Management
Description | Activities | KGI | KPI | CSF | More Info | Previous CO | Next CO | CO Summary
Version 1.0
Printer Version of this document Printable Version
  Version History

1. Description

Application and general controls over the IT operations to ensure that data remains complete, accurate and valid during its input, update and storage.

[To top of Page]

2. Service Activities

Procedures Maintenance: maintain procedures for
  • data preparation,
  • source document and data input authorization, data collection and error handling,
  • transaction data entered for processing (people-generated, system-generated or interfaced inputs) should be subject to a variety of controls to check for accuracy, completeness and validity,

Error handling: correction and resubmission of data which was erroneously input,

Processing integrity: processing of data that ensure separation of duties is maintained and that work performed is routinely verified,

Processing validation, editing and error handling: is performed as close to the point of origination as possible and that erroneous transactions are identified without being processed and without undue disruption of the processing of other valid transactions,

Output management: information technology application program output:
  • handling and retention,
  • write procedures for distribution,
  • routine balancing to relevant control totals (audit trails should be provided to facilitate the tracing of transaction processing and the reconciliation of disrupted data),
  • review the accuracy of output reports by the provider and the relevant users

Storage management: establish and maintain procedures (including retention periods) for data storage which consider retrieval, integrity and cost effectiveness requirements and ensure that the data is checked periodically,

Media library management system: systematic inventory of the media library,

Back-up and restoration: Maintain a strategy for backup and restoration,

Authentication and integrity checking: the authentication and integrity of information originated outside the organisation, whether received by telephone, voicemail, paper document, fax or e-mail, is appropriately checked before potentially critical action is taken,



[To top of Page]

3. Key Goal Indicators


ebc Service Commitments
  • Implement solution to data sharing/storage for EBC including a review of current processes/practices, proposal for improved data sharing, approval by SMT, and implementation of plan, including RFP and staff training as required.
[To top of Page]

4. Key Performance Indicators


ebc Service Commitments
[To top of Page]

5. Critical Success Factors


[To top of Page]

6. Additional Information

Maturity Level Characteristics






0 1 2 3 4 5

[To top of Page]