Data Recovery
Defines the set of capabilities to support the restoration and stabilization of data sets to a consistent, desired state
Defines the set of capabilities to support the restoration and stabilization of data sets to a consistent, desired state
Defines the set of capabilities to provide for the efficient discovery of non-obvious, valuable patterns and relationships within a large collection of data
Data Integrity and Privacy Management involves the coordination of data collection, storage, dissemination, and destruction as well as managing the policies, guidelines, and standards regarding data management, so that data quality is maintained and information is shared or available in accordance with the law and best practices
The practices, architectural techniques and tools for achieving the consistent access and delivery of data across the spectrum of data subject areas and data structure types in the enterprise to meet the data consumption requirements of all applications and business processes.
Supports the interchange of information between multiple systems and applications; includes verification that transmitted data was received unaltered.
Data Centers are facilities that house and protect critical IT equipment supporting delivery of government services including the space, power, environment controls, racks, cabling and external labor.
We distinguish between Agency Data Centers, and the State Data Centers because by statute we are directed to migrate TO the State Data Center and away from Agency Data Centers.
State Data Centers include:
Customer Services supports activities associated with providing an agency's customers with information regarding the agency's service offerings and managing the interactions and relationships with those customers.
Defines the set of capabilities to support the use and management of ciphers, including encryption and decryption processes, to ensure confidentiality and integrity of data
A known system defect or enhancement request that if left unresolved could significantly impact business operations, compliance with statute or policy, the integrity of the system or data or otherwise create a public health, safety or other significant risk areas.
Credential Issuance and Management: the researching, tracking and providing of user access credentials (logical and physicals) and associated security features for the protection of federal information and information systems from unauthorized access, use, disclosure, disruptions, modification, or destruction, as well as the creation and implementation of related security policies, procedures and controls. This includes background checks and related personnel security management services.