Actually in a fairly/good/large implementation of test data privacy the numbers don't seem to be unreasonable (but there are a number of factors that need to be looked at. (i.e ONLY DB2 data, or MVS/Oracle/VSAM as well, instead of?).
Also a number of differnet aspects need to be. An example. 1) Data consistency. Since no application software runs by itself, one needs to make sure that whatever you apply in application A data element A1 ( example Postal code) is the same in application B data element B7 (postal code). And even if, for now, Data Masking (DM) is only for that one application you do not know what will happen later on, within the entire enterprise 2) Quality of the Data. One must make sure that the DM rules reflect the business rules of the application/enterprise. And that whatever software is used, minimized special coding of exits (harder to maintain if a lot of exits need coding). Not every type of data elements can be disguised the same way. What are the 'best practices' that others have used successfully. To make the data quality that ones need in a testing environment 3) Documentation. The 'four' letter word within IT ;-). But especially within a Data Privacy project to ensure success, Documentation is vital. Without proper documentation one can end up missing data masks, redoing rules, etc 4) Politically. Who owns that data? Who will determine which elements will be masked, and how? 5) As you touched based, the environment. The 'window', the platform, the repeatability etc 6) The software. Not all software are created equally. The ease of use, the enterprise wide requirements, the support, etc. all should be factored in any discussion of this magnitude. Are those partners knowledgeable about the issues. Do they have publicly obtainable certification on the question. Software is just one aspect of this large type of project. And I am only scratching the surface. If you want, feel free in contacting me. Robert Galambos CIPP/C, CIPP/IT Certified Information Privacy Professional Canada/IT Compuware Corp. 1-800-263-7189 Le contenu de ce courriel s'adresse au destinataire seulement. Il contient de l'information pouvant être confidentielle. Vous ne devez ni le copier ni l'utiliser ni le divulguer à qui que ce soit à moins que vous soyez le destinataire ou une personne désignée autorisée. Si vous le receviez par erreur, veuillez nous aviser immédiatement et le détruire. The contents of this e-mail are intended for the named addressee only. It contains information that may be confidential. Unless you are the named addressee or an authorized designee, you may not copy or use it, or disclose it to anyone else. If you received it in error please notify us immediately and then destroy it. From: IBM Mainframe Discussion List [mailto:[email protected]] On Behalf Of P S Sent: May 22, 2009 9:40 AM To: [email protected] Subject: Re: IBM Optim question... On Thu, May 21, 2009 at 7:45 PM, Bob Rutledge <[email protected]> wrote: > Ummm, guys, I kind of guessed that obfuscation was the general intent > of the exercise. The ignorance part was about the mechanics involved; > e.g. if the OP is talking about masking a database record for each of > those billion operations per hour, I hope his client has some serious iron. Ah. In that case, it's only mostly as bad as you suggest: a "masking operation" usually means one column in one row. So if you mask (say) firstname, lastname, address, city, ZIP, ssn, creditcardnumber, that's seven operations in one row. Still sounds like some serious iron. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

