Shaping the Future in a Data-Centric Connected World 26th Edition | Page 44

Unlocking The Full Potential of Enterprise Data
Consider the temperature readings inside a pressure vessel taken every few seconds ( timeseries ). These readings are crucial for detecting changes in the vessel ’ s conditions . One could argue that not every reading needs to be retained indefinitely ; only the changes and their occurrences hold significant value , representing the critical information 17 .
In other words , aside from change data , individual temperature readings quickly lose their value . But it can be more complicated . Some jurisdictions may require operators to retain all such data . Other jurisdictions may require the retention of this data as long as the pressure vessel itself is in use . Finally , insurance companies may request specific data retention requirements as a condition of insurance coverage .
Organizations should survey the types of data they produce and consume and assess the value attributes of this data across the full lifecycle . Chapter 3 provides a detailed discussion about the stages in the lifecycle of enterprise data assets .
2.4 WHAT IS INCLUDED IN THE ENTERPRISE DATA ASSETS ?
Organizations must have a clear definition about the constituent elements of an enterprise data asset , for example :
• Actual data item ,
• Creation date / time and versioning data ,
• Unique data item identifiers ,
• Ownership , right-to-use and custodianship ,
• Provenance and lineage ,
• Data protection requirements : security , confidentiality , privacy and residency ,
• Lifecycle-related data .
2.5 IMPACT OF DATA AUTHENTICITY ON VALUE
Establishing and maintaining the authenticity of enterprise data assets throughout their lifecycle is foundational to establishing and maintaining the value of these assets . In certain use cases and depending on the industry , the requirements for data authenticity are particularly stringent , especially when it comes to the legal admissibility and defensibility of OT data in the event of accidents , litigations , and investigations .
2.6 DATA OWNERSHIP AND CUSTODY
A critical consideration in assessing the value of OT data involves the access , ownership , and custody of the data generated by systems or equipment . As OEMs increasingly shift their
17
In information theory , this is referred to as information entropy - https :// en . wikipedia . org / wiki / Entropy _( information _ theory )
40 February 2025