Data Security and Governance

Data protection has had dual objectives: facilitate the free flow of information, while protecting individuals’ privacy and prevent inappropriate use.

Today, data protection is being thought about as ensuring a full range of individual interests while enabling knowledge growth through data.


A fresh dynamic and ethical approach is needed to best accomplish these dual objective due to: the acceleration of data generated from analytics, the increasing velocity of data flows, and the vastly expanding potential uses of data, even by entities that have no direct relationship with the individual. 

In order to manage data governance principles effectively you should include the following process steps: 


Discovery, Definition, Application and Measurement.

Discovery processes are dedicated to determining the current state of data, which processes are dependent on data, what technical and organizational capabilities support data, and the overall flow of the data life-cycle. These processes derive insights about data.


Definition processes are dedicated to the documentation of data definitions, relationships, and taxonomies.


Application are the processes dedicated to functions, operations and ensuring compliance with governance strategies and policies.


Measurement processes are dedicated to monitoring and measuring the value and effectiveness of governance workflows. These processes provide visibility into governance practices and ensure complete audits are possible. 

For more information on F2's Data Security and Governance program click here