Data Policy & Management Make your Data Secure and Safe!

Data Policy & Management Strategy

Data assessment framework is entirely based upon:

  • Size
  • Readiness
  • Specification of the software requirements
  • Storage Media
  • Security
  • Volatility

We have currently Storage capacity upto 10TB(External Hard-disks), which can be extended as per requirement, and we have no limitation for storage and maintenance of records.

UIS Storage Plan:-

  • Make regular backups: Back up your devices on a regular schedule. Ideally, you should make more than one, keeping one at an offsite location.
  • Make archives: Store photos, video, and audio to whatever media seems most sensible, whether optical, flash, or traditional hard drives. Test those copies at least every two years, migrate those archives to fresh (or perhaps different) media every three to five years.
  • Make copies: Make more than one copy of your archive – if one has a issues, it’s unlikely the other will have the same problem. Consider using different storage media for different copies.
  • Store your archives in a cool, dry place. It doesn’t have to be a climate controlled room, but big changes in temperature and humidity reduce media lifespan.
  • Request regular backups of your social media activity. Store them with your archived files.
  • Convert documents and media out of proprietary formats. Open formats more likely to be supported in the distant future.
  • Consider encrypting your archive. This has a potentially huge downside: if you lose your password, or decryption software isn’t available in the future, you lose everything. But, if done right, you aren’t vulnerable if your archive is lost or stolen.
  • 3-2-1 data backup rule
    • Create 3 Copies of data(1 primary and 2 backups).
    • Keep data on at least 2 types of storage media.
    • Store 1 of these offsite(cloud).
  • Cloud Based Storage

    We use Datto Drive for keep files on cloud up to 5GB.

  • Regular Backup

    Regular backup as per changes/updates in database.

  • Testing & Recovery Plan

    DbFit database as testing frameworkk, which target databases ex: Oracle, MySQL, SQL Server, DB2, etc. it can be easily run through command line or any Java IDE or CI build tool.

    Possible Levels of Recovery:

    • Recovery to the correct state.
    • Recovery to a checkpoint (past) correct state.
    • Recovery to a possible previous state.
    • Recovery to a valid state.
    • Recovery to a consistent state.
    • Crash resistance (prevention).
  • Recovery Techniques used at UIS:
    • Salvation program: Run after a crash to attempt to restore the system to a valid state. No recovery data used. Good for cases where buffers were lost in a crash and one wants to reconstruct what was lost.
    • Incremental dumping: Modified files copied to archive after job completed or at intervals.
    • Audit trail: Sequences of actions on files are recorded. Optimal for "backing out" of transactions. (Ideal if trail is written out before changes).
    • Differential files: Separate file is maintained to keep track of changes, periodically merged with the main file.
    • Backup/current version: Present files from the current version of the database. Files containing previous values form a consistent backup version.
    • Multiple copies: Multiple active copies of each file are maintained during normal operation of the database. In cases of failure, comparison between the versions can be used to find a consistent version.
    • Careful replacement: Nothing is updated in place, with the original only being deleted after operation is complete.

We follow rules for providing Quality Assurance for:

  • Document data quality requirements and define rules for measuring quality.
  • Assess new data to create a quality baseline.
  • Implement semantic metadata management processes.
  • Check data validity on an ongoing basis. 
  • Keep on top of data quality problems.

We follow several steps:

  • Detecting Field grammatical mistakes.
  • Detecting missing mandatory information.
  • Detecting errors made during the transfer or reformatting.
  • Detecting duplicates.
  • Detecting remaining outliers (spikes, out of scale data, vertical instabilities etc).
  • Attaching a quality flag to each numerical value in order not to modify the observed data points.
  • Encryption/Decryption

    Encryption/ Decryption methods (symmetric and asymmetric) as per client requirement.

  • Parent Child Integrity System
  • Data Backup & Storage Media

    We use Bit locker tool for secure hard-disk records.

  • Firewall and Data Security

    We use OPNSense software(Open License) tool for securing data for prevention of outside attack.

  • Connectivity

    4MBPS Leased Line for Internet and Intranet capability.

© Urmila International Services Private Limited: 2004-2021