Data Cross-Governance: Across, Down & Documented

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
Across
  1. 2. Data origin trail
  2. 4. Data characteristic
  3. 5. Morally correct
  4. 10. Rules structure
  5. 11. Plan approach
  6. 12. Rules and policies framework
  7. 13. Processed information
  8. 14. Business term definition
  9. 15. Checking correctness
  10. 16. Potential danger
  11. 17. Central storage location
  12. 18. Permission granted
  13. 19. Data analysis
  14. 21. Data safety copy
  15. 23. Finding data
  16. 26. Following rules and regulations
  17. 27. Reducing impact
  18. 28. Combining data
  19. 30. Permission to use
  20. 31. Data control rights
  21. 33. Clear visibility
  22. 36. Distributed system
  23. 38. Following path
  24. 45. Data location
  25. 47. Origin information
  26. 49. Security weakness
  27. 50. Complete data journey
  28. 51. Process flow
  29. 59. Being responsible
  30. 61. Oversight group
  31. 62. Written records
  32. 64. Official approval
  33. 65. Primary data record
  34. 66. Organized inventory
  35. 69. Protection method for data
  36. 71. Business data owner
  37. 73. EU data regulation
  38. 74. Data organizer
  39. 79. Summarizing data
  40. 84. Being current
  41. 85. Replacing identity
  42. 89. Data request
  43. 90. Data history
  44. 92. Set of rules
  45. 93. Official list
  46. 94. Bringing into agreement
  47. 95. Can be audited
  48. 96. Making uniform
  49. 97. Level of development
Down
  1. 1. Organized data store
  2. 3. Pulling data out
  3. 6. Unexpected event
  4. 7. Visual display
  5. 8. Dependable and trustworthy
  6. 9. Data protection
  7. 18. Data organizing method
  8. 19. Removing identity
  9. 20. Program promoter
  10. 22. Fixing problems
  11. 24. Data conversion
  12. 25. Data management document
  13. 29. Data holding period
  14. 32. Data correctness
  15. 34. Precision and correctness
  16. 35. Established norms
  17. 37. Cross-system operation
  18. 39. Security violation
  19. 40. Keeping aligned
  20. 41. Personal information protection
  21. 42. Implementation plan
  22. 43. Copying data
  23. 44. Tracking changes
  24. 46. Information or facts
  25. 48. Ability to move
  26. 52. Data classification system
  27. 53. Degree of excellence
  28. 54. Ability to track
  29. 55. Possibility of loss
  30. 56. Data analysis process
  31. 57. Tech foundation
  32. 58. Database blueprint
  33. 60. Where data lives
  34. 63. Data about data
  35. 67. Interested party
  36. 68. Data keeper process
  37. 70. Uniform and standardized
  38. 72. Person responsible for data
  39. 75. Data matching process
  40. 76. Hiding sensitive data
  41. 77. Organized reference
  42. 78. Data keeping location
  43. 80. Gained understanding
  44. 81. Creating reports
  45. 82. Watching over data
  46. 83. Finding information
  47. 86. Evaluation process
  48. 87. Data catalog or glossary
  49. 88. Data cleaning process
  50. 91. Data verification process