The Framework on Access to Base Registries (BRAIF) and Interconnections aims to provide guidance to Member States on how to grant access to the data in Base Registries and how to interconnect them.
Its implementation requires primarily the following aspects:
- organisational structures, roles and responsibilities for the management of data, its access and interconnection;
- standards, rules and policies to formalise data management across the public administration;
- processes to monitor and evaluate the adoption effectiveness of the data management practices by the organisation.
1. How do you handle data governance in your country?
2. Is it effective, taking into consideration four dimensions of Interoperability Governance i.e. legal, organisational, semantic, technical?
3. How data governance could be done better in your country?
Accuracy – The degree to which data correctly describes the "real world" object or event is being described
Completeness – the proportion of data stored against the potential for 100%
Timeliness – the degree to which data represents reality from the required point in time
Uniqueness – none data will be recorded more than once
Validity – data is valid if it conforms to the syntax (format, type, range) of its definition
Consistency - the absence of difference, when comparing two or more representations of a thing against a definition
1. What is a cost of bad data?
2. What are a data quality issue(s) that you currently face in your base registry?
3. Do you have a specific role(s) responsible of data quality for your base registry?
4. What steps are you following to analyse and solve a data quality issue?
5. What is the communication plan to inform all parties about the resolution of the issue?
Data security management is the planning, development and execution of security policies and procedures to provide proper authentication, authorization, access and auditing of data and information assets
Create a trust environment for the organisation by ensuring that data is managed and updated by the right actors at every moment:
Proprietary Business concerns
Legitimate Access needs
1.Do you encrypt data for your base registry?
2.What are the backup plan and failover capabilities?
3.Do you conduct security testing?
4.How do you monitor your systems and applications to prevent breaches or fraud?
5.Have you identified all regulations and standards that apply to your base registries?
What's your opinion on these topics? Please share your comments with us !