Remove Business Intelligence Remove Data Security Remove Requirements Gathering
article thumbnail

Don’t Create a Data Governance Tug of War between Financial Pros and IT Staff

ElegantJ BI

But, in an age of user and data breaches, the IT team may be hesitant to allow meaningful, flexible access to critical business intelligence. In order to protect the enterprise, and its interests, the IT team must: Ensure compliance with government and industry regulation and internal data governance policies.

article thumbnail

Don’t Create a Data Governance Tug of War between Financial Pros and IT Staff

ElegantJ BI

But, in an age of user and data breaches, the IT team may be hesitant to allow meaningful, flexible access to critical business intelligence. Apart from this I like traveling, participating in Business Intelligence forums, reading and social networking.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Don’t Create a Data Governance Tug of War between Financial Pros and IT Staff

ElegantJ BI

But, in an age of user and data breaches, the IT team may be hesitant to allow meaningful, flexible access to critical business intelligence. Apart from this I like traveling, participating in Business Intelligence forums, reading and social networking.

article thumbnail

5 Steps to Elicit Reporting Requirements from the Business

Business Analysis Knowledge Share

Step 3: Gather Business Requirements With a clear understanding of your stakeholders and the project’s purpose, it’s time to gather the specific business requirements for your reports. This step is at the heart of the elicitation process and requires careful attention to detail.