Improving the Quality of Public Credit Registry Data. Wook Jae Lee (Korea Credit Bureau) Sung Jun Chun (Korea Credit Bureau)
|
|
- Antonia Pearson
- 6 years ago
- Views:
Transcription
1 Improving the Quality of Public Credit Registry Data Wook Jae Lee (Korea Credit Bureau) Sung Jun Chun (Korea Credit Bureau)
2 C o n t e n t s I. Introduction II. III. Debtor Identification Improvement Data Process Improvement IV. Data Quality Management Improvement V. Conclusions and Recommendations VI. Implications and Impacts 2
3 Ⅰ. Introduction-Project overview Indonesia KSP regarding Credit Infrastructure Year 2010 Way to Establish Credit Infrastructure for Enhancement of Consumer Credit Market in Indonesia Policy consultation to enhance Indonesian credit reporting structure by adopting 2-Tier system of Public Registry and Private Credit Bureau Year 2011 Enhancing Credit Market Infrastructure with Emphasis on Public Credit Registry System Technical consultation to enhance current PCR system (Bank Indoneisa SID) 3
4 Ⅰ. Introduction-Project overview Indonesia KSP regarding Credit Infrastructure Year 2012 Improving the Quality of Public Credit Registry Data Technical consultation on debtor verification and data quality Background Currently, there is no unique identification number in Indonesia. The Indonesian government is currently conducting a NIK project to assign unique ID number. Current debtor identifying logic cannot exactly identify a debtor (still needs human confirmation). These conditions causes several difficulties in sharing and distributing credit data in the technical aspect( low matching rate) and undermine quality of data. 4
5 Ⅰ. Introduction-Project overview Indonesia KSP regarding Credit Infrastructure Year 2012 Improving the Quality of Public Credit Registry Data Technical consultation on debtor verification and data quality Objectives Define a new logic to automatically identify a debtor and define the method to measure the power of the logic. Define a short term strategy to enhance the quality of SID data. Define a long term strategy to enhance the quality of BIK data. 5
6 Ⅰ. Introduction-Current Situations DIN Process (AS-IS) Every financial institution should get a DIN(Debtor Identification Number), an ID of a consumer, assigned by BI before reporting when a new customer is acquired. When there is an existing ID, it is used, and when there is not, a new DIN is created. Major Issues Low DIN matching rate AS-IS (Current Situations and Issues) Automatic matching rate is low (For the remaining, financial institutions select one from multiple DINs, or new DIN is created.) TO-BE (Objectives) Improve DIN automatic matching rate DIN duplication (One person has multiple DINs) Out of the total number of 50 million DINs currently held, it is considered that about 10 million are duplicated. (It is the result of reckless creation of new DINs.) Control newly created DINs Complicated DIN process When exact matching is not possible, request is made to financial institutions for verification. Financial institutions don t respond to them faithfully. Ultimately eliminated DIN verification process of financial institutions - Possible when the new ID system of the nation is completed Major considerations: quality of reported data, code system of address or zip code, performance of BI s IT system, work processes with financial institutions, etc. 6
7 Ⅱ. Debtor Identification Improvement Summary of Debtor Identification Improvement Plans Category Plans Remarks Data Improvement Integration of duplicated DINs (unification) Standardization of values for major fields related to DIN - IDCARDNO, TAXPAYERIDNO, DATEOFBIRTH, PLACEOFBITRH Utilize NIK and date of birth Representative DIN Garbage Data converted into NULL Matching Logic Improvement Statistical Methods DIN Process Improvement Use text matching technologies (using similarity matching functions) - DEBTORFULLNAME, MATHERSMAIDENNAME, DEBTORSADDRESS Take advantage of additional identification attributes (gender, address, place of birth, etc.) Select an optimal algorithm (apply decision tree) Improve DIN confirmation process - Use three ways only which include automatic mapping, confirmation of one candidate DIN, new DIN creation Offer guidance on enhancing DIN process 7
8 Ⅱ. Debtor Identification Improvement Remedy 1. DIN Confirm Process - Eliminate a financial company s confirm process for multiple DINs: Only one DIN with the highest score to be used 2. How to operate - To improve the process, server side application needs to be changed - As the role of NIK Format is expanding, it is expected that automatic mapping will increase, while the number of DIN confirmations made by financial companies will decrease. DIN Confirm Process Example First Matching (NIK Format) When it exceeds a certain score (for example 70): Automatic mapping for the highest scored DIN When it is below a certain score (for example 70): For the one DIN which has the highest score, verification is requested to the financial company When it exceeds a certain score (for example 80): Automatic mapping for the highest scored DIN Second Matching (Non NIK Format) Score range (for example from 30 to 80): For the one DIN which has the highest score, verification is requested to the financial company in question (If the company doesn t select the DIN, a new DIN is created When it is below a certain score (for example 30): A new DIN is created No Matching DIN A new DIN is created 8
9 Ⅱ. Debtor Identification Improvement Improvement Results New matching method to maximize automatic matching - will reduce bank's DIN confirmation by 66% - will reduce DIN duplication (unnecessary New DINs) by 25% Automatic Matching DIN Confirmation New DIN Creation 41% 61.6% 25% DOWN 37.5% 46% 400% UP 66% DOWN 13% 0.9% OLD LOGIC NEW LOGIC OLD LOGIC NEW LOGIC OLD LOGIC NEW LOGIC
10 Ⅲ. Data Process Improvement DIN Field Validation Enhancement Category Details Remarks Timing of validation Contents of validation Measures DIN Master CREATE / UPDATE DIN History CREATE DEBTOR Data CREATE / UPDATE DATEOFBIRTH/SEX : If it is NIK Format ID, date of birth and gender in IDCARDNO should have the same value as the ones for DIN. Check on mandatory fields : it is checked whether the value has been entered and it is a garbage value - DATEOFBIRTH, SEX, DEBTORFULLNAME, MATHERSMAIDENNAME, IDCARDNO, ZIPCODE, REGION, DEBTORSADDRESS, PLACEOFBIRTH - PLACEOFBIRTH to be encouraged to be reported in the city level TAXPAYERNO : When a value is entered, it is confirmed whether it is garbage When there is an error with value, reporting is on hold, and error feedback is sent to the reporter Induce revised correct value to be reported again At the time of reporting, validation is done on a real-time basis Encourage DIN value quality to be improved continuously To manage NIK properly, the field of whether it is NIK should be added and make members report the relevant data.
11 Ⅲ. Data Process Improvement Better Validation of DIN Set up of Error Feedback System Category Details Remarks What is regarded as error Everything which is considered error after DIN validation - Example : Data Type Error, Domain Error, NOT NULL Error, error between columns (IDCARDNO DOB and gender check) Error Feedback Process REQUEST ID_DATA = DIN010 MEMBER BANK INDONESIA ERROR FEEDBACK ID_DATA = DIN099 ID_DATA = DIN099 = ID_DATA = DIN010 + Error check (error response code + error check bit)
12 Ⅲ. Data Process Improvement Change of How to Manage DIN MASTER UPDATE Category Details Remarks At the time of AS-IS : FIRST MEMBER TO-BE : ALL MEMBER DEBTOR DATA UPDATE Entity At the time of DIN MASTER UPDATE, DIN HISTORY CREATE UPDATE, DIN UPDATE, as well Every DIN should have the below fields. CREATE/UPDATE Field Management - DIN MASTER : Institution/date involved in first creation, institution/date involved in last update - DIN HISTORY : Institution/date involved in first creation of MASTER, Institution/date involved in HISTORY reporting DIN History Tracking Possible AS-IS Existing DIN Case (When DIN field value is changed) TO-BE Existing DIN Case (When DIN field value is changed) FIRST MEMBER YES UPDATE DIN MASTER ALL MEMBER UPDATE DIN MASTER CREATE DIN HISTORY CREATE DIN HISTORY NO CREATE DIN HISTORY
13 Ⅳ. Data Quality Management Improvement Establishment of Effective Data Quality Management System Category Description Remarks Overview Accumulation Processing Services Systematize data quality management (quality measurement analysis improvement) Overall index - Information Index - Error Index, etc. Main Points Systematize data quality management and monitoring (DQMS) Objective evaluation and improvement based on Data Quality Management Index (DQMI) Expected Benefits Member Companies: Use high quality data services - Increase in data analysis and service usage PCR : Strengthen competitiveness and trust by enhancing data quality - Reduced customer disputes and raised credibility
14 Ⅳ. Data Quality Management Improvement DQMS - Data Quality Management System Quality Object Identification Quality Rule Quality Measurement Quality Analysis Quality Improvement Quality Management - CTQ Definition - DQI Definition - DQI Evaluation Standard - DQI Score Mgt - DQI Weight Mgt - Quality Rule Management - Rule Mgt - Error Code Management - idqms Job Mgt - idqms BatchJob Processing Result - Batch Job List Processing Result Warning Monitoring Ruling Profiling Verifying Member Quality Improvement Member Service Communication Info Registration Result Data Quality Index Data Standard Data Structure Data Flow Impact Analysis Meta Management Word/Terms Code/Domain Analysis Terms Format Structure/Model Compliance - Data Flow Mgt - Application Flow Mgt Impact Analysis Process Management Dash Board Data Process Control
15 Ⅳ. Data Quality Management Improvement DQMS - Quality, Meta Integrated System Quality System Control Improvement Analysis Quality Object Identification Measurement Quality Rule Definition Provide data structure and analyze the impact of data change Provide standard job management for quality measurement and analysis Support quality analysis and activities for improvement Enterprise-Wide Meta Data Standardization Compliance Analysis Data Flow Management Meta System Word Terms (Table Column) Domain Analysis Terms Data Layout Information Common Code Physical DB DB Catalog Logical DB Model Mart (ERD) Application SQL Analysis Staging Credit EDW Impact Analysis
16 Ⅴ. Conclusions and Recommendations Measures for debtor identification improvement are necessary including existing data enhancement, matching logic improvement and application of a statistical method Existing data enhancement refers to treatment of duplicate DINs, and improvement of low quality data as a prerequisite for boosting the DIN matching rate. Matching logic improvement includes active use of meaningful fields, use of additional fields for DIN matching and introduction of a technical function through which text matching similarity is generated as a percentage. In terms of a statistical method, a matching logic will be generated and applied based on a statistical approach, using the case with the highest matching rate. Short-term strategies through process improvement are indispensable. This process improvement includes DIN confirmation process, better validation of DIN fields and strengthened validation of data loading. Current DIN confirmation process needs to be enhanced to prevent duplicate DINs from being issued. Better validation of DIN fields is necessary. Proper validation framework and system should be in place in the DIN field quality management system of the current SID. Strengthened validation of data loading is recommended.
17 Ⅴ. Conclusions and Recommendations Long-term strategies through establishment of the data management system are recommended. Since a credit reporting agency is doing business based on data, data is the most important key element in the system. Therefore, it is crucial to put the proper framework in place which encompasses data format, structure, quality, and value from the beginning. In the long-term strategies to improve data quality, measures for enhancement have been suggested by taking into account data quality management framework, data quality analysis methods, standardization, and data quality management system in a comprehensive manner, along with establishment of the proper data management system.
18 Ⅵ. Implications and Impacts Implications & Impacts Provide practical consultations about debtor identification and data quality Consultation results will be applied while Bank Indonesia conducts PCR system enhancement project in Contribute to the enhancement of credit reporting infrastructure in Indonesia Credit Infrastructure enhancement by adopting 2-Tier system of Public Registry and Private Credit Bureau,which is reflecting on KSP recommendations since ( enacted in Feb 2013) Support overseas expansion of Korean financial Institutions by sharing Korean credit reporting infrastructure It is expected that this program will support Korean financial institutions entry into the Indonesian market, which are experienced with Korean credit reporting infrastructure.
User Manual - Customer -
User Manual - Customer - 009..9 Contents I. Summary II. Menu and Basic Function III. Master Code Search and Inquiry IV. New Code Creation V. Master Modification and not in Use VI. Account Update VII. Sales
More informationⅠ.. Legal Regime on Telecommunications in China Ⅱ.. Background and Process for Making the Telecommunications Law Ⅲ.. Main Issues Addressed by the Draf
China s Telecommunications Law in the Future By Zhao Xiaoguang Department of Industry, Transport and Commerce of the LAO October, 2009 Ⅰ.. Legal Regime on Telecommunications in China Ⅱ.. Background and
More informationAnyMiner 3.0, Real-time Big Data Analysis Solution for Everything Data Analysis. Mar 25, TmaxSoft Co., Ltd. All Rights Reserved.
AnyMiner 3.0, Real-time Big Analysis Solution for Everything Analysis Mar 25, 2015 2015 TmaxSoft Co., Ltd. All Rights Reserved. Ⅰ Ⅱ Ⅲ Platform for Net IT AnyMiner, Real-time Big Analysis Solution AnyMiner
More informationOnline Batch Services
Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users sign in to the main product to access the online
More informationThe Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless
The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and
More informationOnline Batch Services
Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users log into the main product to access the online
More informationSenior Deputy Director Ministry of Knowledge Economy Sungmin Lim
E-Document Regulations and Businesses in South Korea September 19, 2012 Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim Contents Ⅰ Background Ⅱ Latest Developments Ⅲ Future Plans Ⅳ Estimated
More informationInfrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems
Hitachi Review Vol. 65 (2016), No. 1 729 Featured Articles Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems Kazuki
More informationBuilding and Exploring an Enterprise Knowledge Graph for Investment Analysis
Building and Exploring an Enterprise Knowledge Graph for Investment Analysis Tong Ruan 1, Lijuan Xue 1, Haofen Wang 1 Fanghuai Hu 2, Liang Zhao 1, Jun Ding 2 1 East China University of Science and Technology
More informationPrivacy: Pre- and Post-Breach
Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach Aug 2007 Points of Discussion Current Breach Statistics Self Assessment Pre-Breach During Breach Post-Breach
More informationAVOIDING SILOED DATA AND SILOED DATA MANAGEMENT
AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,
More informationContent-Aware Master Data Management
Karin Murthy, Deepak P, Prasad M. Deshpande, Sreekanth L. Kakaraparthy, Vedula T. Surya Sandeep, Vijaya K. Shyamsundar, Sanjay K. Singh Content-Aware Master Data Management MDM Master data management (MDM)
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationData Mining: Approach Towards The Accuracy Using Teradata!
Data Mining: Approach Towards The Accuracy Using Teradata! Shubhangi Pharande Department of MCA NBNSSOCS,Sinhgad Institute Simantini Nalawade Department of MCA NBNSSOCS,Sinhgad Institute Ajay Nalawade
More informationBASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA
CYBER THREAT ANALYSIS AND QUANTIFICATION Abstract BASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA As a large quantity of
More informationOpen to Every Citizen
Open to Every Citizen Feb. 2014 Information System Planning Bureau (Information Communication & Security Division) 20 million people (11 million residents and 9.5 million foreign visitors) in Seoul!!
More informationData Virtualization at. Nationwide. Nationwide. DAMA October 13, 2011
Data Virtualization at Nationwide Nationwide DAMA October 13, 2011 Agenda Background What is Virtual Data Isn t all data real? Virtual Data and the Architectural Fit Example Use Cases Must Do s Before
More informationPerceptive Matching Engine
Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...
More informationWHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.
Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle
More informationSpatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE)
Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Model Builder User Guide Version 1.3 (24 April 2018) Prepared For: US Army Corps of Engineers 2018 Revision History Model
More informationManage Duplicate Records in Salesforce PREVIEW
Manage Duplicate Records in Salesforce Salesforce, Winter 18 PREVIEW Note: This release is in preview. Features described in this document don t become generally available until the latest general availability
More informationIn 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.
REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January
More informationUser Manual. Vessel
User Manual Vessel 04.04.0 Contents I. Summary II. Menu and Basic function III. Master code search and Inquiry IV. New code creation V. Master code Modification Ⅰ. Summary Meaning : Code for using to time
More informationTransforming IT: From Silos To Services
Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New
More informationInfrastructure Safety Management & Maintenance in Korea
Infrastructure Safety Management & Maintenance in Korea September 2013 KISTEC (Korea Infrastructure Safety & Technology Corporation) Contents Ⅰ. Infrastructure Status in Korea Ⅱ. Maintenance Polices on
More informationOVERVIEW BROCHURE GRC. When you have to be right
OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance
More informationCUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented)
CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented) Flávio de Almeida Pires Assesso Engenharia de Sistemas Ltda flavio@assesso.com.br Abstract. To counter the results
More informationAudit and Assurance Overview
Chartered Professional Accountants of Canada, CPA Canada, CPA are trademarks and/or certification marks of the Chartered Professional Accountants of Canada. 2018, Chartered Professional Accountants of
More informationDirective on security of network and information systems (NIS): State of Play
Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission
More informationORCID in Bloom. ORCID and EM Use Cases. Sean MacRae, Business Systems Analyst
ORCID in Bloom ORCID and EM Use Cases Sean MacRae, Business Systems Analyst Use Case? A use case is a sequence of actions that an actor (usually a person, but perhaps an external entity such as another
More informationISO/TR TECHNICAL REPORT. Financial services Information security guidelines
TECHNICAL REPORT ISO/TR 13569 Third edition 2005-11-15 Financial services Information security guidelines Services financiers Lignes directrices pour la sécurité de l'information Reference number ISO/TR
More informationSymantec Business Continuity Solutions for Operational Risk Management
Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.
More informationChildren s Mental Health Outcome Measures Reporting System User Manual
Children s Mental Health Outcome Measures Reporting System 2.17.2017 User Manual Table of Contents Components of the Children s Mental Health Outcome Reporting System... 3 Logging into CMH Outcome Measures...
More informationBusiness Process Outsourcing
Business Process Outsourcing Copyright 2012-2014, AdminBetter Inc. LIST BUILDING SERVICES Table of Contents Introduction To List Building Services... 3 A Note On Ballbark Pricing... 3 Types Of List Building
More informationManaging Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow
Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant
More informationGLOBAL INDICATORS OF REGULATORY GOVERNANCE. Scoring Methodology
GLOBAL INDICATORS OF REGULATORY GOVERNANCE Scoring Methodology To advance our analysis, we developed a composite Global Indicators of Regulatory Governance score designed to quantify good regulatory practices
More informationISO INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 8583-1 First edition 2003-06-15 Financial transaction card originated messages Interchange message specifications Part 1: Messages, data elements and code values Messages initiés
More informationBI/DWH Test specifics
BI/DWH Test specifics Jaroslav.Strharsky@s-itsolutions.at 26/05/2016 Page me => TestMoto: inadequate test scope definition? no problem problem cold be only bad test strategy more than 16 years in IT more
More informationSWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ
SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security
More informationHow to Get Registered in
How to Get Registered in www.sam.gov Basics To receive a grant from ONR Global, whether it be a Collaborative Science Program (CSP) grant or a Naval International Cooperative Opportunities in Science and
More informationDesigning High-Performance Data Structures for MongoDB
Designing High-Performance Data Structures for MongoDB The NoSQL Data Modeling Imperative Danny Sandwell, Product Marketing, erwin, Inc. Leigh Weston, Product Manager, erwin, Inc. Learn More at erwin.com
More informationImproving Domain Names Utilization
Improving Domain Names Utilization Ning Kong June 27, 2017 Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q &
More informationKIPO s IP Dissemination Policy and New Approaches for Industry 4.0
KIPO s IP Dissemination Policy and New Approaches for Industry 4.0 Topics 1. Open Data Policy in Korea 2. KIPO s Policy on IP Data Dissemination and Utilization 3. KIPO s Patent Information Services 4.
More informationFiscal 2015 Activities Review and Plan for Fiscal 2016
Fiscal 2015 Activities Review and 1. The Ricoh Group s Information Security Activities In response to changes emerging in the social environment, the Ricoh Group is promoting its PDCA management system
More informationJoint Declaration by G7 ICT Ministers
Joint Declaration by G7 ICT Ministers (Action Plan on implementing the Charter) G7 ICT Ministers Meeting in Takamatsu, Kagawa - 29-30 April 2016 [Preamble] 1. We, the Information and Communication Technology
More informationLevel 4 Diploma in Computing
Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that
More informationThe Data Organization
C V I T F E P A O TM The Data Organization 1251 Yosemite Way Hayward, CA 94545 (510) 303-8868 rschoenrank@computer.org Business Intelligence Process Architecture By Rainer Schoenrank Data Warehouse Consultant
More informationUAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory
UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationThe Smart Campaign: Introducing Certification
The Smart Campaign: Introducing Certification Elisabeth Rhyne, Managing Director Center for Financial Inclusion at ACCION Responsible Finance Forum Washington, DC April, 2012 Introducing The Smart Campaign
More informationin a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012
Identity Management and Federation of Identity in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 HRSDC - National Service Delivery HRSDC and its service
More informationThirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP)
Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP) Advance Passenger Information (API) Workshop Fabrizio Di Carlo INTERPOL 26 October 2017 OBJECTIVES Matching passenger
More informationUser Guide. Aug Ver. 1
User Guide Aug. 2013 Ver. 1 User Guide 2/22 Introduction The TTA matches your application requirements with the appropriate machining solutions. The software selects the best available solution for your
More informationData Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing
Privacy Policy of aimedis.com This Application collects some Personal Data from its Users. Data Controller and Owner Aimedis B.V., Sint Michaëlstraat 4, 5935 BL Steyl, Netherlands Owner contact email:
More informationISO INTERNATIONAL STANDARD. Information and documentation Records management Part 1: General
Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 15489-1 First edition 2001-09-15 Information and documentation Records management Part 1: General Information et documentation «Records management»
More informationContinuous auditing certification
State of the Art in cloud service certification Cloud computing has emerged as the de-facto-standard when it comes to IT delivery. It comes with many benefits, such as flexibility, cost-efficiency and
More informationIBM InfoSphere MDM Enterprise Viewer User's Guide
IBM InfoSphere Master Data Management Version 11 IBM InfoSphere MDM Enterprise Viewer User's Guide GI13-2661-00 IBM InfoSphere Master Data Management Version 11 IBM InfoSphere MDM Enterprise Viewer User's
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationIdentity Proofing Standards and Beyond
Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing
More informationQuick Start Guide. CRM Business Machine
Quick Start Guide CRM Business Machine If you need assistance or find an error in this guide, or if you d like to suggest an addition to this guide, just post a Trouble Ticket at www.lmrhelp.com This guide
More informationOperator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea
Operator cooperation in South Korea has created a successful identity solution SK Telecom South Korea SK Telecom Operator cooperation in South Korea has created a successful identity solution Operator
More informationIstisna Creation Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E
Istisna Creation Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Oracle Part Number E51511-01 Table of Contents Origination of Istisna 1. ISTISNA ORIGINATION... 1-1 1.1 INTRODUCTION... 1-1
More informationAbout Issues in Building the National Strategy for Cybersecurity in Vietnam
Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation
More informationGovernment of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform
Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under the
More informationINFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE
Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE
More informationData Management Framework
The Organization Management Framework Created and Presented By Copyright 2018 Management Is part of the Manage Knowledge, Improvement and Change process of the APQC Process Classification Framework (wwwapqcorg)
More informationQuick Step Guide to MID and/or CRID Acquisition
Quick Step Guide to MID and/or CRID Acquisition Overview The Postal Service has published the POSTNET Barcode Discontinuation final rule that is the basis for discontinuing use of POSTNET barcodes. Beginning
More informationHOW TO GENERATE AND UNDERSTAND THE UPLOAD LOG REPORT
Florida SHOTS HOW TO GENERATE AND UNDERSTAND THE UPLOAD LOG REPORT www.flshots.com Data Upload Log Review: The main reason to generate an upload log report is to ensure that data is being uploaded to Florida
More informationThe Importance of Data Profiling
The Importance of Data Profiling By Bud Walker and Joseph Vertido A Melissa Data Whitepaper Introduction Data profiling is a commonly used term in the discipline of data management, yet the perception
More informationMicrosoft Developer Day
Microsoft Developer Day Pradeep Menon Microsoft Developer Day Solutions Architect Agenda Microsoft Developer Day Traditional Business Intelligence Architecture Structured Sources Extract Transform Structurize
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationRecommendations for Small and Medium Enterprises. Event Date Location
Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129
More informationSecuring Americans Identities: The Future of the Social Security Number
Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James
More informationONLINE ADMISSION 2017 QUICKSTART v
ONLINE ADMISSION 2017 QUICKSTART v.1.2-2017 In order to fill correctly the online application form you must navigate through the links in the application itself. You must NOT click the Back browser button,
More informationGovernment of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved
Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under
More informationGet The Respect You Deserve With Credentials From APWA
Get The Respect You Deserve With Credentials From APWA Accreditation Certified Public Fleet Professional Certified Public Infrastructure Inspector Certified Stormwater Manager The Credentialing Department
More informationMEASURES TO ENHANCE MARITIME SECURITY. Cyber risk management in Safety Management Systems. Submitted by United States, ICS and BIMCO SUMMARY
E MARITIME SAFETY COMMITTEE 101st session Agenda item 4 26 March 2019 Original: ENGLISH Pre-session public release: MEASURES TO ENHANCE MARITIME SECURITY Cyber risk management in Safety Management Systems
More informationⅠ Introduction 1. Ⅱ Information Security Infrastructure and Environment 2. Ⅲ Information Security Incident Prevention 8
Ⅰ Introduction 1 Ⅱ Information Security Infrastructure and Environment 2 1. Information Security Policy 2 A. Information (Personal Information) Security Policy 2 B. Information Security Policy 3 C. Personal
More informationService Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction
Service Level Agreement for Microsoft Azure operated by 21Vianet Last updated: November 2017 1. Introduction This Service Level Agreement for Azure (this SLA ) is made by 21Vianet in connection with, and
More informationExam Questions IIA-CGAP
Exam Questions IIA-CGAP Certified Government Auditing Professional https://www.2passeasy.com/dumps/iia-cgap/ 1. Help define the role and responsibilities of auditors to internal and external entities.
More informationSAP. Modeling Guide for PPF
Modeling Guide for PPF Contents 1 Document Organization... 3 1.1 Authors... 3 1.2 Intended Group of Readers... 3 1.3 References... 3 1.4 Glossary... 4 2 Modeling Guidelines - Application Analysis... 6
More informationLECTURE1: PRINCIPLES OF DATABASES
LECTURE1: PRINCIPLES OF DATABASES Ref. Chapter1 Information Systems Department Chapter1 - Objectives 2 Problems with file-based approach. Database concepts. Database Management System (DBMS). Major components
More informationDISCUSSION PAPER. Board of Certification Oral Examination Consistency
DISCUSSION PAPER Issue : Prepared for: Board of Certification Oral Examination istency CIPHI - Board of Certification Date: June 20, 2003 BACKGROUND The Certificate in Public Health Inspection (Canada),
More informationGeneral Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant
General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...
More informationSubmission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework
Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework JULY 2013 Business Council of Australia July 2013 1 About
More informationCybersecurity and Data Protection Developments
Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB
More informationCertificate in Estate and Trust Administration (CETA) Frequently Asked Questions
Are there any prerequisites for taking CETA? Candidates who have successful post-secondary education and/or one-year wealth industry work experience are eligible to enroll in, CETA1: Foundations of Estate
More informationDOCUMENT UPLOADS. NOTE: If you already have a pending filing created, select the Edit with the pending filing. Figure 1: Create New Filing
DOCUMENT UPLOADS NMLS includes functionality that allows a company to upload documentation required for Company (MU1) and Branch (MU3) applications as required by your state regulator. To ensure that you
More informationDATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury
DATA Act Information Model Schema (DAIMS) Architecture U.S. Department of the Treasury September 22, 2017 Table of Contents 1. Introduction... 1 2. Conceptual Information Model... 2 3. Metadata... 4 4.
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationWELCOME! NILG 2018 WEBINAR SERIES
WELCOME! NILG 2018 WEBINAR SERIES Ms. Benita Marsh Director of Surveys, Program Research and Surveys Division Office of Research, Information and Planning Equal Employment Opportunity Commission 1 HOUSEKEEPING
More informationGSA Protocols: How and Why they are Important and Relevant to
GSA Protocols: How and Why they are Important and Relevant to Lotteries and Lottery Operations By Marc McDermott, Technical Director, Gaming Standards Association (GSA) As posted at PGRI - Public Gaming
More information3-Part Guide to Developing a BYOD Strategy
An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)
More informationStrong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell
Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)
More informationGUIDE TO CERTIFICATION
GUIDE TO CERTIFICATION December 2017 *Note this document is temporary, and the content will soon appear on peer.gbci.org, at the latest November 30, 2015.* CONGRATULATIONS ON YOUR DECISION TO PURSUE PEER
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Core Corporate Admin User Manual Release 17.1.0.0.0 Part No. E83887-01 March 2017 Core Corporate Admin User Manual March 2017 Oracle Financial Services Software Limited
More informationMunis Self Service Vendor Self Service. User Guide Version 11.2
Munis Self Service Vendor Self Service User Guide Version 11.2 TABLE OF CONTENTS Vendor Self Service Overview... 3 Vendor Self Service Users... 3 Vendor Registration... 4 Vendor Self Service Home Page...
More informationIdentity Theft Prevention Policy
Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening
More informationEnhanced DBS (ebulkplus) Applicant (Colleague) Guidance Notes Locums - England & Wales:
Enhanced DBS (ebulkplus) Applicant (Colleague) Guidance Notes Locums - England & Wales: Security Watchdog, part of Capita plc Please note You will need to work with your home store in order to complete
More informationRegister for a HCQIS Access Roles and Profile (HARP) Account
Register for a HCQIS Access Roles and Profile (HARP) Account Table of Contents Introduction Register for a HARP Account: Instructions and Screenshots Navigate to HARP HARP Account Registration o o o o
More information