Improving the Quality of Public Credit Registry Data. Wook Jae Lee (Korea Credit Bureau) Sung Jun Chun (Korea Credit Bureau)

Size: px
Start display at page:

Download "Improving the Quality of Public Credit Registry Data. Wook Jae Lee (Korea Credit Bureau) Sung Jun Chun (Korea Credit Bureau)"

Transcription

1 Improving the Quality of Public Credit Registry Data Wook Jae Lee (Korea Credit Bureau) Sung Jun Chun (Korea Credit Bureau)

2 C o n t e n t s I. Introduction II. III. Debtor Identification Improvement Data Process Improvement IV. Data Quality Management Improvement V. Conclusions and Recommendations VI. Implications and Impacts 2

3 Ⅰ. Introduction-Project overview Indonesia KSP regarding Credit Infrastructure Year 2010 Way to Establish Credit Infrastructure for Enhancement of Consumer Credit Market in Indonesia Policy consultation to enhance Indonesian credit reporting structure by adopting 2-Tier system of Public Registry and Private Credit Bureau Year 2011 Enhancing Credit Market Infrastructure with Emphasis on Public Credit Registry System Technical consultation to enhance current PCR system (Bank Indoneisa SID) 3

4 Ⅰ. Introduction-Project overview Indonesia KSP regarding Credit Infrastructure Year 2012 Improving the Quality of Public Credit Registry Data Technical consultation on debtor verification and data quality Background Currently, there is no unique identification number in Indonesia. The Indonesian government is currently conducting a NIK project to assign unique ID number. Current debtor identifying logic cannot exactly identify a debtor (still needs human confirmation). These conditions causes several difficulties in sharing and distributing credit data in the technical aspect( low matching rate) and undermine quality of data. 4

5 Ⅰ. Introduction-Project overview Indonesia KSP regarding Credit Infrastructure Year 2012 Improving the Quality of Public Credit Registry Data Technical consultation on debtor verification and data quality Objectives Define a new logic to automatically identify a debtor and define the method to measure the power of the logic. Define a short term strategy to enhance the quality of SID data. Define a long term strategy to enhance the quality of BIK data. 5

6 Ⅰ. Introduction-Current Situations DIN Process (AS-IS) Every financial institution should get a DIN(Debtor Identification Number), an ID of a consumer, assigned by BI before reporting when a new customer is acquired. When there is an existing ID, it is used, and when there is not, a new DIN is created. Major Issues Low DIN matching rate AS-IS (Current Situations and Issues) Automatic matching rate is low (For the remaining, financial institutions select one from multiple DINs, or new DIN is created.) TO-BE (Objectives) Improve DIN automatic matching rate DIN duplication (One person has multiple DINs) Out of the total number of 50 million DINs currently held, it is considered that about 10 million are duplicated. (It is the result of reckless creation of new DINs.) Control newly created DINs Complicated DIN process When exact matching is not possible, request is made to financial institutions for verification. Financial institutions don t respond to them faithfully. Ultimately eliminated DIN verification process of financial institutions - Possible when the new ID system of the nation is completed Major considerations: quality of reported data, code system of address or zip code, performance of BI s IT system, work processes with financial institutions, etc. 6

7 Ⅱ. Debtor Identification Improvement Summary of Debtor Identification Improvement Plans Category Plans Remarks Data Improvement Integration of duplicated DINs (unification) Standardization of values for major fields related to DIN - IDCARDNO, TAXPAYERIDNO, DATEOFBIRTH, PLACEOFBITRH Utilize NIK and date of birth Representative DIN Garbage Data converted into NULL Matching Logic Improvement Statistical Methods DIN Process Improvement Use text matching technologies (using similarity matching functions) - DEBTORFULLNAME, MATHERSMAIDENNAME, DEBTORSADDRESS Take advantage of additional identification attributes (gender, address, place of birth, etc.) Select an optimal algorithm (apply decision tree) Improve DIN confirmation process - Use three ways only which include automatic mapping, confirmation of one candidate DIN, new DIN creation Offer guidance on enhancing DIN process 7

8 Ⅱ. Debtor Identification Improvement Remedy 1. DIN Confirm Process - Eliminate a financial company s confirm process for multiple DINs: Only one DIN with the highest score to be used 2. How to operate - To improve the process, server side application needs to be changed - As the role of NIK Format is expanding, it is expected that automatic mapping will increase, while the number of DIN confirmations made by financial companies will decrease. DIN Confirm Process Example First Matching (NIK Format) When it exceeds a certain score (for example 70): Automatic mapping for the highest scored DIN When it is below a certain score (for example 70): For the one DIN which has the highest score, verification is requested to the financial company When it exceeds a certain score (for example 80): Automatic mapping for the highest scored DIN Second Matching (Non NIK Format) Score range (for example from 30 to 80): For the one DIN which has the highest score, verification is requested to the financial company in question (If the company doesn t select the DIN, a new DIN is created When it is below a certain score (for example 30): A new DIN is created No Matching DIN A new DIN is created 8

9 Ⅱ. Debtor Identification Improvement Improvement Results New matching method to maximize automatic matching - will reduce bank's DIN confirmation by 66% - will reduce DIN duplication (unnecessary New DINs) by 25% Automatic Matching DIN Confirmation New DIN Creation 41% 61.6% 25% DOWN 37.5% 46% 400% UP 66% DOWN 13% 0.9% OLD LOGIC NEW LOGIC OLD LOGIC NEW LOGIC OLD LOGIC NEW LOGIC

10 Ⅲ. Data Process Improvement DIN Field Validation Enhancement Category Details Remarks Timing of validation Contents of validation Measures DIN Master CREATE / UPDATE DIN History CREATE DEBTOR Data CREATE / UPDATE DATEOFBIRTH/SEX : If it is NIK Format ID, date of birth and gender in IDCARDNO should have the same value as the ones for DIN. Check on mandatory fields : it is checked whether the value has been entered and it is a garbage value - DATEOFBIRTH, SEX, DEBTORFULLNAME, MATHERSMAIDENNAME, IDCARDNO, ZIPCODE, REGION, DEBTORSADDRESS, PLACEOFBIRTH - PLACEOFBIRTH to be encouraged to be reported in the city level TAXPAYERNO : When a value is entered, it is confirmed whether it is garbage When there is an error with value, reporting is on hold, and error feedback is sent to the reporter Induce revised correct value to be reported again At the time of reporting, validation is done on a real-time basis Encourage DIN value quality to be improved continuously To manage NIK properly, the field of whether it is NIK should be added and make members report the relevant data.

11 Ⅲ. Data Process Improvement Better Validation of DIN Set up of Error Feedback System Category Details Remarks What is regarded as error Everything which is considered error after DIN validation - Example : Data Type Error, Domain Error, NOT NULL Error, error between columns (IDCARDNO DOB and gender check) Error Feedback Process REQUEST ID_DATA = DIN010 MEMBER BANK INDONESIA ERROR FEEDBACK ID_DATA = DIN099 ID_DATA = DIN099 = ID_DATA = DIN010 + Error check (error response code + error check bit)

12 Ⅲ. Data Process Improvement Change of How to Manage DIN MASTER UPDATE Category Details Remarks At the time of AS-IS : FIRST MEMBER TO-BE : ALL MEMBER DEBTOR DATA UPDATE Entity At the time of DIN MASTER UPDATE, DIN HISTORY CREATE UPDATE, DIN UPDATE, as well Every DIN should have the below fields. CREATE/UPDATE Field Management - DIN MASTER : Institution/date involved in first creation, institution/date involved in last update - DIN HISTORY : Institution/date involved in first creation of MASTER, Institution/date involved in HISTORY reporting DIN History Tracking Possible AS-IS Existing DIN Case (When DIN field value is changed) TO-BE Existing DIN Case (When DIN field value is changed) FIRST MEMBER YES UPDATE DIN MASTER ALL MEMBER UPDATE DIN MASTER CREATE DIN HISTORY CREATE DIN HISTORY NO CREATE DIN HISTORY

13 Ⅳ. Data Quality Management Improvement Establishment of Effective Data Quality Management System Category Description Remarks Overview Accumulation Processing Services Systematize data quality management (quality measurement analysis improvement) Overall index - Information Index - Error Index, etc. Main Points Systematize data quality management and monitoring (DQMS) Objective evaluation and improvement based on Data Quality Management Index (DQMI) Expected Benefits Member Companies: Use high quality data services - Increase in data analysis and service usage PCR : Strengthen competitiveness and trust by enhancing data quality - Reduced customer disputes and raised credibility

14 Ⅳ. Data Quality Management Improvement DQMS - Data Quality Management System Quality Object Identification Quality Rule Quality Measurement Quality Analysis Quality Improvement Quality Management - CTQ Definition - DQI Definition - DQI Evaluation Standard - DQI Score Mgt - DQI Weight Mgt - Quality Rule Management - Rule Mgt - Error Code Management - idqms Job Mgt - idqms BatchJob Processing Result - Batch Job List Processing Result Warning Monitoring Ruling Profiling Verifying Member Quality Improvement Member Service Communication Info Registration Result Data Quality Index Data Standard Data Structure Data Flow Impact Analysis Meta Management Word/Terms Code/Domain Analysis Terms Format Structure/Model Compliance - Data Flow Mgt - Application Flow Mgt Impact Analysis Process Management Dash Board Data Process Control

15 Ⅳ. Data Quality Management Improvement DQMS - Quality, Meta Integrated System Quality System Control Improvement Analysis Quality Object Identification Measurement Quality Rule Definition Provide data structure and analyze the impact of data change Provide standard job management for quality measurement and analysis Support quality analysis and activities for improvement Enterprise-Wide Meta Data Standardization Compliance Analysis Data Flow Management Meta System Word Terms (Table Column) Domain Analysis Terms Data Layout Information Common Code Physical DB DB Catalog Logical DB Model Mart (ERD) Application SQL Analysis Staging Credit EDW Impact Analysis

16 Ⅴ. Conclusions and Recommendations Measures for debtor identification improvement are necessary including existing data enhancement, matching logic improvement and application of a statistical method Existing data enhancement refers to treatment of duplicate DINs, and improvement of low quality data as a prerequisite for boosting the DIN matching rate. Matching logic improvement includes active use of meaningful fields, use of additional fields for DIN matching and introduction of a technical function through which text matching similarity is generated as a percentage. In terms of a statistical method, a matching logic will be generated and applied based on a statistical approach, using the case with the highest matching rate. Short-term strategies through process improvement are indispensable. This process improvement includes DIN confirmation process, better validation of DIN fields and strengthened validation of data loading. Current DIN confirmation process needs to be enhanced to prevent duplicate DINs from being issued. Better validation of DIN fields is necessary. Proper validation framework and system should be in place in the DIN field quality management system of the current SID. Strengthened validation of data loading is recommended.

17 Ⅴ. Conclusions and Recommendations Long-term strategies through establishment of the data management system are recommended. Since a credit reporting agency is doing business based on data, data is the most important key element in the system. Therefore, it is crucial to put the proper framework in place which encompasses data format, structure, quality, and value from the beginning. In the long-term strategies to improve data quality, measures for enhancement have been suggested by taking into account data quality management framework, data quality analysis methods, standardization, and data quality management system in a comprehensive manner, along with establishment of the proper data management system.

18 Ⅵ. Implications and Impacts Implications & Impacts Provide practical consultations about debtor identification and data quality Consultation results will be applied while Bank Indonesia conducts PCR system enhancement project in Contribute to the enhancement of credit reporting infrastructure in Indonesia Credit Infrastructure enhancement by adopting 2-Tier system of Public Registry and Private Credit Bureau,which is reflecting on KSP recommendations since ( enacted in Feb 2013) Support overseas expansion of Korean financial Institutions by sharing Korean credit reporting infrastructure It is expected that this program will support Korean financial institutions entry into the Indonesian market, which are experienced with Korean credit reporting infrastructure.

User Manual - Customer -

User Manual - Customer - User Manual - Customer - 009..9 Contents I. Summary II. Menu and Basic Function III. Master Code Search and Inquiry IV. New Code Creation V. Master Modification and not in Use VI. Account Update VII. Sales

More information

Ⅰ.. Legal Regime on Telecommunications in China Ⅱ.. Background and Process for Making the Telecommunications Law Ⅲ.. Main Issues Addressed by the Draf

Ⅰ.. Legal Regime on Telecommunications in China Ⅱ.. Background and Process for Making the Telecommunications Law Ⅲ.. Main Issues Addressed by the Draf China s Telecommunications Law in the Future By Zhao Xiaoguang Department of Industry, Transport and Commerce of the LAO October, 2009 Ⅰ.. Legal Regime on Telecommunications in China Ⅱ.. Background and

More information

AnyMiner 3.0, Real-time Big Data Analysis Solution for Everything Data Analysis. Mar 25, TmaxSoft Co., Ltd. All Rights Reserved.

AnyMiner 3.0, Real-time Big Data Analysis Solution for Everything Data Analysis. Mar 25, TmaxSoft Co., Ltd. All Rights Reserved. AnyMiner 3.0, Real-time Big Analysis Solution for Everything Analysis Mar 25, 2015 2015 TmaxSoft Co., Ltd. All Rights Reserved. Ⅰ Ⅱ Ⅲ Platform for Net IT AnyMiner, Real-time Big Analysis Solution AnyMiner

More information

Online Batch Services

Online Batch Services Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users sign in to the main product to access the online

More information

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless The Republic of Korea Executive Summary Today, cyberspace is a new horizon with endless possibilities, offering unprecedented economic and social benefits. However, on account of its open, anonymous and

More information

Online Batch Services

Online Batch Services Online Batch Services LexisNexis has enhanced its batch services to allow more user-friendly functionality for uploading batches and mapping layouts. Users log into the main product to access the online

More information

Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim

Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim E-Document Regulations and Businesses in South Korea September 19, 2012 Senior Deputy Director Ministry of Knowledge Economy Sungmin Lim Contents Ⅰ Background Ⅱ Latest Developments Ⅲ Future Plans Ⅳ Estimated

More information

Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems

Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems Hitachi Review Vol. 65 (2016), No. 1 729 Featured Articles Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems Kazuki

More information

Building and Exploring an Enterprise Knowledge Graph for Investment Analysis

Building and Exploring an Enterprise Knowledge Graph for Investment Analysis Building and Exploring an Enterprise Knowledge Graph for Investment Analysis Tong Ruan 1, Lijuan Xue 1, Haofen Wang 1 Fanghuai Hu 2, Liang Zhao 1, Jun Ding 2 1 East China University of Science and Technology

More information

Privacy: Pre- and Post-Breach

Privacy: Pre- and Post-Breach Identity Theft Resource Center Jay Foley, Executive Director Presents: Privacy: Pre- and Post-Breach Aug 2007 Points of Discussion Current Breach Statistics Self Assessment Pre-Breach During Breach Post-Breach

More information

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT

AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT AVOIDING SILOED DATA AND SILOED DATA MANAGEMENT Dalton Cervo Author, Consultant, Data Management Expert March 2016 This presentation contains extracts from books that are: Copyright 2011 John Wiley & Sons,

More information

Content-Aware Master Data Management

Content-Aware Master Data Management Karin Murthy, Deepak P, Prasad M. Deshpande, Sreekanth L. Kakaraparthy, Vedula T. Surya Sandeep, Vijaya K. Shyamsundar, Sanjay K. Singh Content-Aware Master Data Management MDM Master data management (MDM)

More information

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect

More information

Data Mining: Approach Towards The Accuracy Using Teradata!

Data Mining: Approach Towards The Accuracy Using Teradata! Data Mining: Approach Towards The Accuracy Using Teradata! Shubhangi Pharande Department of MCA NBNSSOCS,Sinhgad Institute Simantini Nalawade Department of MCA NBNSSOCS,Sinhgad Institute Ajay Nalawade

More information

BASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA

BASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA CYBER THREAT ANALYSIS AND QUANTIFICATION Abstract BASED ON INDICATOR OF COMPROMISE Hyeisun Cho, KISA; Seulgi Lee, KISA; Nakhyun Kim, KISA; Byung-ik Kim, KISA; Jun-hyung Park, KISA As a large quantity of

More information

Open to Every Citizen

Open to Every Citizen Open to Every Citizen Feb. 2014 Information System Planning Bureau (Information Communication & Security Division) 20 million people (11 million residents and 9.5 million foreign visitors) in Seoul!!

More information

Data Virtualization at. Nationwide. Nationwide. DAMA October 13, 2011

Data Virtualization at. Nationwide. Nationwide. DAMA October 13, 2011 Data Virtualization at Nationwide Nationwide DAMA October 13, 2011 Agenda Background What is Virtual Data Isn t all data real? Virtual Data and the Architectural Fit Example Use Cases Must Do s Before

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework.

WHO SHOULD ATTEND? ITIL Foundation is suitable for anyone working in IT services requiring more information about the ITIL best practice framework. Learning Objectives and Course Descriptions: FOUNDATION IN IT SERVICE MANAGEMENT This official ITIL Foundation certification course provides you with a general overview of the IT Service Management Lifecycle

More information

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE)

Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Spatial Data Standards for Facilities, Infrastructure, and Environment (SDSFIE) Model Builder User Guide Version 1.3 (24 April 2018) Prepared For: US Army Corps of Engineers 2018 Revision History Model

More information

Manage Duplicate Records in Salesforce PREVIEW

Manage Duplicate Records in Salesforce PREVIEW Manage Duplicate Records in Salesforce Salesforce, Winter 18 PREVIEW Note: This release is in preview. Features described in this document don t become generally available until the latest general availability

More information

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets.

In 2017, the Auditor General initiated an audit of the City s information technology infrastructure and assets. REPORT FOR ACTION IT Infrastructure and IT Asset Management Review: Phase 1: Establishing an Information Technology Roadmap to Guide the Way Forward for Infrastructure and Asset Management Date: January

More information

User Manual. Vessel

User Manual. Vessel User Manual Vessel 04.04.0 Contents I. Summary II. Menu and Basic function III. Master code search and Inquiry IV. New code creation V. Master code Modification Ⅰ. Summary Meaning : Code for using to time

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information

Infrastructure Safety Management & Maintenance in Korea

Infrastructure Safety Management & Maintenance in Korea Infrastructure Safety Management & Maintenance in Korea September 2013 KISTEC (Korea Infrastructure Safety & Technology Corporation) Contents Ⅰ. Infrastructure Status in Korea Ⅱ. Maintenance Polices on

More information

OVERVIEW BROCHURE GRC. When you have to be right

OVERVIEW BROCHURE GRC. When you have to be right OVERVIEW BROCHURE GRC When you have to be right WoltersKluwerFS.com In response to today s demanding economic and regulatory climate, many financial services firms are transforming operations to enhance

More information

CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented)

CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented) CUSTOMER DATA INTEGRATION (CDI): PROJECTS IN OPERATIONAL ENVIRONMENTS (Practice-Oriented) Flávio de Almeida Pires Assesso Engenharia de Sistemas Ltda flavio@assesso.com.br Abstract. To counter the results

More information

Audit and Assurance Overview

Audit and Assurance Overview Chartered Professional Accountants of Canada, CPA Canada, CPA are trademarks and/or certification marks of the Chartered Professional Accountants of Canada. 2018, Chartered Professional Accountants of

More information

Directive on security of network and information systems (NIS): State of Play

Directive on security of network and information systems (NIS): State of Play Directive on security of network and information systems (NIS): State of Play Svetlana Schuster Unit H1 Cybersecurity and Digital Privacy DG Communications Networks, Content and Technology, European Commission

More information

ORCID in Bloom. ORCID and EM Use Cases. Sean MacRae, Business Systems Analyst

ORCID in Bloom. ORCID and EM Use Cases. Sean MacRae, Business Systems Analyst ORCID in Bloom ORCID and EM Use Cases Sean MacRae, Business Systems Analyst Use Case? A use case is a sequence of actions that an actor (usually a person, but perhaps an external entity such as another

More information

ISO/TR TECHNICAL REPORT. Financial services Information security guidelines

ISO/TR TECHNICAL REPORT. Financial services Information security guidelines TECHNICAL REPORT ISO/TR 13569 Third edition 2005-11-15 Financial services Information security guidelines Services financiers Lignes directrices pour la sécurité de l'information Reference number ISO/TR

More information

Symantec Business Continuity Solutions for Operational Risk Management

Symantec Business Continuity Solutions for Operational Risk Management Symantec Business Continuity Solutions for Operational Risk Management Manage key elements of operational risk across your enterprise to keep critical processes running and your business moving forward.

More information

Children s Mental Health Outcome Measures Reporting System User Manual

Children s Mental Health Outcome Measures Reporting System User Manual Children s Mental Health Outcome Measures Reporting System 2.17.2017 User Manual Table of Contents Components of the Children s Mental Health Outcome Reporting System... 3 Logging into CMH Outcome Measures...

More information

Business Process Outsourcing

Business Process Outsourcing Business Process Outsourcing Copyright 2012-2014, AdminBetter Inc. LIST BUILDING SERVICES Table of Contents Introduction To List Building Services... 3 A Note On Ballbark Pricing... 3 Types Of List Building

More information

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow

Managing Privacy Risk & Compliance in Financial Services. Brett Hamilton Advisory Solutions Consultant ServiceNow Managing Privacy Risk & Compliance in Financial Services Brett Hamilton Advisory Solutions Consultant ServiceNow 1 Speaker Introduction INSERT PHOTO Name: Brett Hamilton Title: Advisory Solutions Consultant

More information

GLOBAL INDICATORS OF REGULATORY GOVERNANCE. Scoring Methodology

GLOBAL INDICATORS OF REGULATORY GOVERNANCE. Scoring Methodology GLOBAL INDICATORS OF REGULATORY GOVERNANCE Scoring Methodology To advance our analysis, we developed a composite Global Indicators of Regulatory Governance score designed to quantify good regulatory practices

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 8583-1 First edition 2003-06-15 Financial transaction card originated messages Interchange message specifications Part 1: Messages, data elements and code values Messages initiés

More information

BI/DWH Test specifics

BI/DWH Test specifics BI/DWH Test specifics Jaroslav.Strharsky@s-itsolutions.at 26/05/2016 Page me => TestMoto: inadequate test scope definition? no problem problem cold be only bad test strategy more than 16 years in IT more

More information

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ

SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security

More information

How to Get Registered in

How to Get Registered in How to Get Registered in www.sam.gov Basics To receive a grant from ONR Global, whether it be a Collaborative Science Program (CSP) grant or a Naval International Cooperative Opportunities in Science and

More information

Designing High-Performance Data Structures for MongoDB

Designing High-Performance Data Structures for MongoDB Designing High-Performance Data Structures for MongoDB The NoSQL Data Modeling Imperative Danny Sandwell, Product Marketing, erwin, Inc. Leigh Weston, Product Manager, erwin, Inc. Learn More at erwin.com

More information

Improving Domain Names Utilization

Improving Domain Names Utilization Improving Domain Names Utilization Ning Kong June 27, 2017 Content Status Quo of Chinese Phishing Websites Anti-Phishing Alliance of China (APAC) Suggestions for Improving Domain Names Utilization Q &

More information

KIPO s IP Dissemination Policy and New Approaches for Industry 4.0

KIPO s IP Dissemination Policy and New Approaches for Industry 4.0 KIPO s IP Dissemination Policy and New Approaches for Industry 4.0 Topics 1. Open Data Policy in Korea 2. KIPO s Policy on IP Data Dissemination and Utilization 3. KIPO s Patent Information Services 4.

More information

Fiscal 2015 Activities Review and Plan for Fiscal 2016

Fiscal 2015 Activities Review and Plan for Fiscal 2016 Fiscal 2015 Activities Review and 1. The Ricoh Group s Information Security Activities In response to changes emerging in the social environment, the Ricoh Group is promoting its PDCA management system

More information

Joint Declaration by G7 ICT Ministers

Joint Declaration by G7 ICT Ministers Joint Declaration by G7 ICT Ministers (Action Plan on implementing the Charter) G7 ICT Ministers Meeting in Takamatsu, Kagawa - 29-30 April 2016 [Preamble] 1. We, the Information and Communication Technology

More information

Level 4 Diploma in Computing

Level 4 Diploma in Computing Level 4 Diploma in Computing 1 www.lsib.co.uk Objective of the qualification: It should available to everyone who is capable of reaching the required standards It should be free from any barriers that

More information

The Data Organization

The Data Organization C V I T F E P A O TM The Data Organization 1251 Yosemite Way Hayward, CA 94545 (510) 303-8868 rschoenrank@computer.org Business Intelligence Process Architecture By Rainer Schoenrank Data Warehouse Consultant

More information

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory

UAE National Space Policy Agenda Item 11; LSC April By: Space Policy and Regulations Directory UAE National Space Policy Agenda Item 11; LSC 2017 06 April 2017 By: Space Policy and Regulations Directory 1 Federal Decree Law No.1 of 2014 establishes the UAE Space Agency UAE Space Agency Objectives

More information

Sales Presentation Case 2018 Dell EMC

Sales Presentation Case 2018 Dell EMC Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations

More information

The Smart Campaign: Introducing Certification

The Smart Campaign: Introducing Certification The Smart Campaign: Introducing Certification Elisabeth Rhyne, Managing Director Center for Financial Inclusion at ACCION Responsible Finance Forum Washington, DC April, 2012 Introducing The Smart Campaign

More information

in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012

in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 Identity Management and Federation of Identity in a National Service Delivery Model 3 rd Annual Privacy, Access and Security Congress October 4, 2012 HRSDC - National Service Delivery HRSDC and its service

More information

Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP)

Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP) Thirteenth Symposium and Exhibition on the ICAO Traveller Identification Programme (TRIP) Advance Passenger Information (API) Workshop Fabrizio Di Carlo INTERPOL 26 October 2017 OBJECTIVES Matching passenger

More information

User Guide. Aug Ver. 1

User Guide. Aug Ver. 1 User Guide Aug. 2013 Ver. 1 User Guide 2/22 Introduction The TTA matches your application requirements with the appropriate machining solutions. The software selects the best available solution for your

More information

Data Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing

Data Controller and Owner. Types of Data collected. Mode and place of processing the Data. Privacy Policy of aimedis.com. Methods of processing Privacy Policy of aimedis.com This Application collects some Personal Data from its Users. Data Controller and Owner Aimedis B.V., Sint Michaëlstraat 4, 5935 BL Steyl, Netherlands Owner contact email:

More information

ISO INTERNATIONAL STANDARD. Information and documentation Records management Part 1: General

ISO INTERNATIONAL STANDARD. Information and documentation Records management Part 1: General Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO 15489-1 First edition 2001-09-15 Information and documentation Records management Part 1: General Information et documentation «Records management»

More information

Continuous auditing certification

Continuous auditing certification State of the Art in cloud service certification Cloud computing has emerged as the de-facto-standard when it comes to IT delivery. It comes with many benefits, such as flexibility, cost-efficiency and

More information

IBM InfoSphere MDM Enterprise Viewer User's Guide

IBM InfoSphere MDM Enterprise Viewer User's Guide IBM InfoSphere Master Data Management Version 11 IBM InfoSphere MDM Enterprise Viewer User's Guide GI13-2661-00 IBM InfoSphere Master Data Management Version 11 IBM InfoSphere MDM Enterprise Viewer User's

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

Identity Proofing Standards and Beyond

Identity Proofing Standards and Beyond Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing

More information

Quick Start Guide. CRM Business Machine

Quick Start Guide. CRM Business Machine Quick Start Guide CRM Business Machine If you need assistance or find an error in this guide, or if you d like to suggest an addition to this guide, just post a Trouble Ticket at www.lmrhelp.com This guide

More information

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea

Operator cooperation in South Korea has created a successful identity solution. SK Telecom South Korea Operator cooperation in South Korea has created a successful identity solution SK Telecom South Korea SK Telecom Operator cooperation in South Korea has created a successful identity solution Operator

More information

Istisna Creation Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E

Istisna Creation Oracle FLEXCUBE Universal Banking Release [May] [2011] Oracle Part Number E Istisna Creation Oracle FLEXCUBE Universal Banking Release 11.3.0 [May] [2011] Oracle Part Number E51511-01 Table of Contents Origination of Istisna 1. ISTISNA ORIGINATION... 1-1 1.1 INTRODUCTION... 1-1

More information

About Issues in Building the National Strategy for Cybersecurity in Vietnam

About Issues in Building the National Strategy for Cybersecurity in Vietnam Vietnam Computer Emergency Response Team - VNCERT About Issues in Building the National Strategy for Cybersecurity in Vietnam Vu Quoc Khanh Director General Outline Internet abundance Security situation

More information

Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform

Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform Government of Ontario IT Standard (GO-ITS) Number 30.2 OPS Middleware Software for Java Platform Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under the

More information

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE Second International Conference World of Construction Project Management 2007 Shin, Jae Won, Ryu, Han-Guk, Lee, Dong-Ryul CSRI, HanmiParsons Co., Ltd. INFORMATION-ORIENTED DESIGN MANAGEMENT SYSTEM PROTOTYPE

More information

Data Management Framework

Data Management Framework The Organization Management Framework Created and Presented By Copyright 2018 Management Is part of the Manage Knowledge, Improvement and Change process of the APQC Process Classification Framework (wwwapqcorg)

More information

Quick Step Guide to MID and/or CRID Acquisition

Quick Step Guide to MID and/or CRID Acquisition Quick Step Guide to MID and/or CRID Acquisition Overview The Postal Service has published the POSTNET Barcode Discontinuation final rule that is the basis for discontinuing use of POSTNET barcodes. Beginning

More information

HOW TO GENERATE AND UNDERSTAND THE UPLOAD LOG REPORT

HOW TO GENERATE AND UNDERSTAND THE UPLOAD LOG REPORT Florida SHOTS HOW TO GENERATE AND UNDERSTAND THE UPLOAD LOG REPORT www.flshots.com Data Upload Log Review: The main reason to generate an upload log report is to ensure that data is being uploaded to Florida

More information

The Importance of Data Profiling

The Importance of Data Profiling The Importance of Data Profiling By Bud Walker and Joseph Vertido A Melissa Data Whitepaper Introduction Data profiling is a commonly used term in the discipline of data management, yet the perception

More information

Microsoft Developer Day

Microsoft Developer Day Microsoft Developer Day Pradeep Menon Microsoft Developer Day Solutions Architect Agenda Microsoft Developer Day Traditional Business Intelligence Architecture Structured Sources Extract Transform Structurize

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

Recommendations for Small and Medium Enterprises. Event Date Location

Recommendations for Small and Medium Enterprises. Event Date Location Recommendations for Small and Medium Enterprises Event Date Location B20 Structure B20 Members worldwide B20 Cross-thematic Group Small and Medium Enterprises CTG SMEs: Composition Coordination Group 129

More information

Securing Americans Identities: The Future of the Social Security Number

Securing Americans Identities: The Future of the Social Security Number Cha : Testimony, SASC 04 /25 /2017 1 Statement Before the House Ways and Means Subcommittee on Social Security Securing Americans Identities: The Future of the Social Security Number A Testimony by: James

More information

ONLINE ADMISSION 2017 QUICKSTART v

ONLINE ADMISSION 2017 QUICKSTART v ONLINE ADMISSION 2017 QUICKSTART v.1.2-2017 In order to fill correctly the online application form you must navigate through the links in the application itself. You must NOT click the Back browser button,

More information

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved

Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite. Version #: 1.0 Status: Approved Government of Ontario IT Standard (GO-ITS) GO-ITS Number 30.7 OPS Backup & Restore Software Suite Version #: 1.0 Status: Approved Prepared for the Information Technology Standards Council (ITSC) under

More information

Get The Respect You Deserve With Credentials From APWA

Get The Respect You Deserve With Credentials From APWA Get The Respect You Deserve With Credentials From APWA Accreditation Certified Public Fleet Professional Certified Public Infrastructure Inspector Certified Stormwater Manager The Credentialing Department

More information

MEASURES TO ENHANCE MARITIME SECURITY. Cyber risk management in Safety Management Systems. Submitted by United States, ICS and BIMCO SUMMARY

MEASURES TO ENHANCE MARITIME SECURITY. Cyber risk management in Safety Management Systems. Submitted by United States, ICS and BIMCO SUMMARY E MARITIME SAFETY COMMITTEE 101st session Agenda item 4 26 March 2019 Original: ENGLISH Pre-session public release: MEASURES TO ENHANCE MARITIME SECURITY Cyber risk management in Safety Management Systems

More information

Ⅰ Introduction 1. Ⅱ Information Security Infrastructure and Environment 2. Ⅲ Information Security Incident Prevention 8

Ⅰ Introduction 1. Ⅱ Information Security Infrastructure and Environment 2. Ⅲ Information Security Incident Prevention 8 Ⅰ Introduction 1 Ⅱ Information Security Infrastructure and Environment 2 1. Information Security Policy 2 A. Information (Personal Information) Security Policy 2 B. Information Security Policy 3 C. Personal

More information

Service Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction

Service Level Agreement for Microsoft Azure operated by 21Vianet. Last updated: November Introduction Service Level Agreement for Microsoft Azure operated by 21Vianet Last updated: November 2017 1. Introduction This Service Level Agreement for Azure (this SLA ) is made by 21Vianet in connection with, and

More information

Exam Questions IIA-CGAP

Exam Questions IIA-CGAP Exam Questions IIA-CGAP Certified Government Auditing Professional https://www.2passeasy.com/dumps/iia-cgap/ 1. Help define the role and responsibilities of auditors to internal and external entities.

More information

SAP. Modeling Guide for PPF

SAP. Modeling Guide for PPF Modeling Guide for PPF Contents 1 Document Organization... 3 1.1 Authors... 3 1.2 Intended Group of Readers... 3 1.3 References... 3 1.4 Glossary... 4 2 Modeling Guidelines - Application Analysis... 6

More information

LECTURE1: PRINCIPLES OF DATABASES

LECTURE1: PRINCIPLES OF DATABASES LECTURE1: PRINCIPLES OF DATABASES Ref. Chapter1 Information Systems Department Chapter1 - Objectives 2 Problems with file-based approach. Database concepts. Database Management System (DBMS). Major components

More information

DISCUSSION PAPER. Board of Certification Oral Examination Consistency

DISCUSSION PAPER. Board of Certification Oral Examination Consistency DISCUSSION PAPER Issue : Prepared for: Board of Certification Oral Examination istency CIPHI - Board of Certification Date: June 20, 2003 BACKGROUND The Certificate in Public Health Inspection (Canada),

More information

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant

General Data Protection Regulation: Knowing your data. Title. Prepared by: Paul Barks, Managing Consultant General Data Protection Regulation: Knowing your data Title Prepared by: Paul Barks, Managing Consultant Table of Contents 1. Introduction... 3 2. The challenge... 4 3. Data mapping... 7 4. Conclusion...

More information

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework

Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework Submission to the International Integrated Reporting Council regarding the Consultation Draft of the International Integrated Reporting Framework JULY 2013 Business Council of Australia July 2013 1 About

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

Certificate in Estate and Trust Administration (CETA) Frequently Asked Questions

Certificate in Estate and Trust Administration (CETA) Frequently Asked Questions Are there any prerequisites for taking CETA? Candidates who have successful post-secondary education and/or one-year wealth industry work experience are eligible to enroll in, CETA1: Foundations of Estate

More information

DOCUMENT UPLOADS. NOTE: If you already have a pending filing created, select the Edit with the pending filing. Figure 1: Create New Filing

DOCUMENT UPLOADS. NOTE: If you already have a pending filing created, select the Edit with the pending filing. Figure 1: Create New Filing DOCUMENT UPLOADS NMLS includes functionality that allows a company to upload documentation required for Company (MU1) and Branch (MU3) applications as required by your state regulator. To ensure that you

More information

DATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury

DATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury DATA Act Information Model Schema (DAIMS) Architecture U.S. Department of the Treasury September 22, 2017 Table of Contents 1. Introduction... 1 2. Conceptual Information Model... 2 3. Metadata... 4 4.

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

WELCOME! NILG 2018 WEBINAR SERIES

WELCOME! NILG 2018 WEBINAR SERIES WELCOME! NILG 2018 WEBINAR SERIES Ms. Benita Marsh Director of Surveys, Program Research and Surveys Division Office of Research, Information and Planning Equal Employment Opportunity Commission 1 HOUSEKEEPING

More information

GSA Protocols: How and Why they are Important and Relevant to

GSA Protocols: How and Why they are Important and Relevant to GSA Protocols: How and Why they are Important and Relevant to Lotteries and Lottery Operations By Marc McDermott, Technical Director, Gaming Standards Association (GSA) As posted at PGRI - Public Gaming

More information

3-Part Guide to Developing a BYOD Strategy

3-Part Guide to Developing a BYOD Strategy An IT admin s guide to implementation considerations and best practices when developing a BYOD strategy As the consumerization of IT continues to grow, so has the popularity of Bring Your Own Device (BYOD)

More information

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell

Strong Customer Authentication and common and secure communication under PSD2. PSD2 in a nutshell Strong Customer Authentication and common and secure communication under PSD2 PSD2 in a nutshell Summary On August 12, the EBA has issued the long-awaited draft of the Regulatory Technical Standards (RTS)

More information

GUIDE TO CERTIFICATION

GUIDE TO CERTIFICATION GUIDE TO CERTIFICATION December 2017 *Note this document is temporary, and the content will soon appear on peer.gbci.org, at the latest November 30, 2015.* CONGRATULATIONS ON YOUR DECISION TO PURSUE PEER

More information

Oracle Banking Digital Experience

Oracle Banking Digital Experience Oracle Banking Digital Experience Core Corporate Admin User Manual Release 17.1.0.0.0 Part No. E83887-01 March 2017 Core Corporate Admin User Manual March 2017 Oracle Financial Services Software Limited

More information

Munis Self Service Vendor Self Service. User Guide Version 11.2

Munis Self Service Vendor Self Service. User Guide Version 11.2 Munis Self Service Vendor Self Service User Guide Version 11.2 TABLE OF CONTENTS Vendor Self Service Overview... 3 Vendor Self Service Users... 3 Vendor Registration... 4 Vendor Self Service Home Page...

More information

Identity Theft Prevention Policy

Identity Theft Prevention Policy Identity Theft Prevention Policy Purpose of the Policy To establish an Identity Theft Prevention Program (Program) designed to detect, prevent and mitigate identity theft in connection with the opening

More information

Enhanced DBS (ebulkplus) Applicant (Colleague) Guidance Notes Locums - England & Wales:

Enhanced DBS (ebulkplus) Applicant (Colleague) Guidance Notes Locums - England & Wales: Enhanced DBS (ebulkplus) Applicant (Colleague) Guidance Notes Locums - England & Wales: Security Watchdog, part of Capita plc Please note You will need to work with your home store in order to complete

More information

Register for a HCQIS Access Roles and Profile (HARP) Account

Register for a HCQIS Access Roles and Profile (HARP) Account Register for a HCQIS Access Roles and Profile (HARP) Account Table of Contents Introduction Register for a HARP Account: Instructions and Screenshots Navigate to HARP HARP Account Registration o o o o

More information