Difference between revisions of "GC Enterprise Architecture/Framework"
m |
m |
||
Line 52: | Line 52: | ||
<b>Data Collection</b> | <b>Data Collection</b> | ||
* Ensure data is collected <I><u> responsibly and </I></u>in a manner that maximizes use, <I><u>reuse</I></u> and availability of data | * Ensure data is collected <I><u> responsibly and </I></u>in a manner that maximizes use, <I><u>reuse</I></u> and availability of data | ||
− | * Align to existing enterprise and international standards, <I><u> or where none exist, develop standards in the open with key subject matter experts <I><u>and consultation with Enterprise Data Community of Practice</u></I> | + | * Align to existing enterprise and international standards, <I><u> or where none exist, develop standards in the open with key subject matter experts </I></u>and consultation with Enterprise Data Community of Practice</u></I> |
− | * <I><u>When collecting personal data or information, ensure that your practices are responsible and align with enterprise data ethics standards as well as relevant policy and legislation. The Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices | + | * <I><u>When collecting personal data or information, ensure that your practices are responsible and align with enterprise data ethics standards as well as relevant policy and legislation. The Policy Direction to Modernize the Government of Canada’s Sex and Gender Information Practices is an example of relevant policy that can inform considerations of gender diversity and inclusion. </I></u> |
− | |||
− | |||
* <I><u>Ensure data is collected only if it cannot be obtained through data-sharing</I></u> | * <I><u>Ensure data is collected only if it cannot be obtained through data-sharing</I></u> | ||
− | * | + | * Ensure that data collection <I><u>methodology</I></u> yields high quality data <I><u>in alignment with enterprise data standards</I></u> |
− | + | * <I><u>Engage with key stakeholders within the federal government, as well as provincial, territorial and </I></u> other levels of government, including indigenous people | |
− | + | * <I><u>Adopt a needs-based approach to data collection and review existing data assets prior to collecting or acquiring new data</i></u> | |
− | * | + | * <I><u>Ensure access and quality provisions are in place for data collected or acquired through third-party contracting services</I></u> |
− | * <I><u>Ensure provisions are in place for | ||
− | <b>Data | + | <b>Ensure that Data is Managed Responsibly and in a manner that Maximize Use, Reuse and Availability of Data</b></I></u> |
− | * | + | * Align with enterprise and departmental policies and standards on data <I><u>architecture</u></I> and governance |
− | * | + | * <I><u>Enable discoverability, accessibility, resiliency and availability of the departmental data assets |
− | * | + | * Asses, control and monitor data quality in alignment with enterprise data standards |
− | + | * Define and establish clear roles, responsibilities and accountabilities for data management | |
− | * | + | * where possible, use automation to support the management of data |
− | * | + | * Identify and document the lineage of the departmental data assets |
− | * | + | * Regularly assess the value of the departmental data assets and undertake retention and disposition as per existing schedules |
− | + | * Only handle data which is essential to your service. Do not store all data that you capture unless absolutely necessary</i></u> | |
− | |||
− | * | ||
* Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols and legislation such as</I></u> the Privacy Act | * Ensure data is stored in a secure manner in accordance with <I><u>CSE approved cryptographic algorithms and protocols and legislation such as</I></u> the Privacy Act | ||
− | * <I><u> | + | * <I><u>Manage departmental data in a way that enables interoperability, not only within the department, but also at the enterprise level</u></I> |
− | + | * Ensure that data is used in an Ethical and Secure manner | |
− | |||
− | <u> | ||
− | * | ||
− | |||
* Ensure that combined data does not risk identification or re-identification of sensitive or personal information | * Ensure that combined data does not risk identification or re-identification of sensitive or personal information | ||
− | * Ensure the data is fit for the use it is employed for in accordance with data quality guidelines </I></u> | + | * Ensure the data is fit for the use it is employed for in accordance with data quality guidelines |
+ | * inform decisions by the appropriate data and information</I></u> | ||
<b>Data Sharing</b> | <b>Data Sharing</b> | ||
− | * Data should be shared openly by default as per the Directive on Open Government <I><u> | + | * Data should be shared openly by default as per the Directive on Open Government |
− | + | * <I><u>If data cannot be shared, explicitly state the laws and/or regulations preventing its sharing | |
− | + | * Ensure that any data you share adheres to existing <I><u>enterprise and international standards, including on quality or fitness for purpose</I></u> | |
− | |||
* Encourage data sharing and collaboration | * Encourage data sharing and collaboration | ||
− | * <I><u> | + | * <I><u>Ensure that data received from external parties is profiled and validated prior to its use. |
+ | * Enable internal and external sharing of data and information as appropriate</I></u> | ||
|} | |} | ||
Revision as of 15:12, 8 October 2019
This is a DRAFT COPY of the proposed updates to the GC EA standards
Changes from the previous version are marked as underlined and new additions are marked as italic and underlined
The GC Enterprise Architecture standard is part of the Directive on Management of Information Technology. It is listed as Appendix C - Mandatory Procedures for Enterprise Architecture Assessment in the Directive.
Fulfillment to the needs of the stakeholders to the Government of Canada
|
Data Collection
Ensure that Data is Managed Responsibly and in a manner that Maximize Use, Reuse and Availability of Data
Data Sharing
|
Use Open Standards and Solutions by Default
|
Use Cloud first
Design for Performance, Availability, and Scalability
|
5. Security Architecture and Privacy Design for Security and Privacy
Ensure Secure Access to Systems and Services
Maintain Secure Operations
Privacy by Design
|
Need help? Contact us.
|