Data Governance
Access Management
Privacy
Analytics
Data Management
100

Data Mapping

The process of mapping fields from one database to another.

100

Access Requirements

Access requirements are provided by Business teams. They describe WHO needs to be granted WHICH type of access to WHAT data assets, under WHICH conditions and in WHICH contexts, and WHY. Likewise, Compliance teams describe access constraints that limit or deny access.

100

Personal Data

Any information relating to an identified or identifiable individual. An identifiable individual is one who can be identified by reasonable means, directly or indirectly, by reference to an attribute or combination of attributes within the data, or combination of the data with other available information

100

Self-service Analytics

Capability that allows all users to independently access, integrate, and analyze data without heavily relying on CIT teams,  while preserving data governance.

100

Data Anonymization

Method of information sanitization whose intent is privacy protection by removing personally identifiable information from data sets, so that the people whom the data describe cannot be identified.  

200

Metadata

Metadata is defined as the information that describes and explains data. It provides context with details such as the source, type, owner, and relationships to other data sets.

200

Access Rules

Once access requirements are developed, a technical team then translates them into a series of computer readable statements.

200

Privacy by Design

Framework based on proactively embedding privacy into the design and operation of IT systems, networked infrastructure, and business practices.

200

Data Integration

Process of bringing together data from multiple sources across an organization to provide a complete, accurate, and up-to-date dataset for BI, data analysis and other applications and business processes

200

Data Integrity

Assuring information will not be accidentally or maliciously altered or destroyed

300

Data Catalog

It is an active data asset repository that acts as the context, control, and collaboration plane for your data estate

300

Access Requests

After a user successfully logs into a system, they select the thing (project, partner, transaction, etc.) that they want information about, and navigate to the information’s location (screen, report, etc.) The system sends a message to the access decision engine requesting access.

300

Data Subject

The natural living person whose Personal Data is Processed.

300

Machine Learning

Practical application of AI, where a system uses data and information to learn and improve over time by identifying trends, patterns, relationships, and optimizations.

300

Data Availability

The ability to ensure timely and reliable access to, and use of, information

400

Data Steward

Data Stewards are IFC staff who are appointed and overseen by the Data Owner [in their respective department] to perform critical tasks related to protecting, accessing, and using IFC data in their respective business areas or “domains.”

400

Access Decision

Based on the total set of access rules, the access engine makes a decision and notifies the system, which provides access.  

400

Privacy Threshold Assessments (PTA)

A short assessment completed by an IO, a Project Leader, or Staff and designed to screen for privacy risks.

400

Data Fabric

An architecture that facilitates the end-to-end integration of various data pipelines and cloud environments through the use of intelligent and automated systems.

400

Data Lineage

Data Lineage refers to the life cycle of data, including its origins, movements, characteristics, and quality changes over time

500

Data Mesh

A data mesh is a decentralized data architecture that organizes data by a specific business domain—for example, Operations, HR and more—providing more ownership to the producers of a given dataset

500

Access Provisioning

Individuals are given HR assignments and are routinely assigned to project roles, functional roles, and groups. They can also request additional assignments at any time. These assignments matter, because most Access Requirements specify roles rather than named individuals.  

500

Privacy Impact Assessment (PIA)

A detailed privacy risk assessment completed by an IO, a Project Leader, or Staff on the instruction of the IFC DPO and designed to allow the IFC DPO to recommend privacy controls and other risk mitigation measures.

500

Data Lake

Central data repository that accepts relational, structured, semi-structured, and non-structured data types in a low-to-no modeling framework, used for tasks such as reporting, visualization, advanced analytics, and machine learning. A data lake can be established on premises (within an organization’s data centers) or in the cloud.

500

Redaction

Method of removing selected information in as secure manner such as, but not limited to, removal or blacking out.  

M
e
n
u