DATA MANAGEMENT
29.1 Objcetive
The objective of this Policy is to ensure data are managed and optimized the use of information to ensure that information is available as required. The protection of data confidentiality transmitted through the internet and intranet is also included in this policy. This policy is to be read in conjunction with Group – Data Management Policies and Procedure Manual.
29.2 Policy
a) Define a procedure or process to verify that all data expected for processing are received and processed completely, accurately and in a timely manner, and all output is delivered in accordance with business requirements. The procedure or process should support restart and reprocessing needs.
b) The senior management is responsible to ensure that critical information or confidential customer data is adequately protected against any internal or external threats.
c) Define a secure process that will securely transmit data through the internet. Internationally recognized encryption algorithm should be applied to ensure the integrity and confidentiality of the data. This process is applicable to the receipt, processing, storage and output of data to meet business objectives. (Group IT policies and regulatory requirements).
d) Define a process to identify and classify data categories / types. Properly identify the protection mechanism for the respective data categories.
e) Define and implement storage and retention arrangements procedures for effective and efficient data storage, retention and archiving to meet business objectives. (Group IT policy and regulatory requirements).
f) Define and implement procedures to maintain an inventory of stored and archived media to ensure their usability and integrity.
g) Define and implement disposal procedures to ensure that business requirements for protection of sensitive data and software are met when data and hardware are disposed or transferred.
h) Define and implement procedures for backup and restoration of systems, applications, data and documentation in line with business requirements and the continuity plan.
i) Data ownership must be identified for all data belonging to the Group.
j) Data owner must be identified to classify the data and provide required security measure and protection based on the minimum requirements from the Group Data Management Policies and Procedures manual.
k) Owner of the data must be at least Head of Department or equivalent.
l) Owner of the data is required to conduct self-assessment at least once annually to ensure the authenticity of the data classification.
m) IT Security must define a process and solution to secure the transmission of highly confidential and confidential data through the internet.