{
  "meta" : {
    "view" : {
      "id" : "wszs-hm8j",
      "name" : "Data Glossary",
      "assetType" : "dataset",
      "attribution" : "Chief Data Office",
      "averageRating" : 0,
      "category" : "Government",
      "createdAt" : 1663339589,
      "description" : "The Data Glossary dataset includes common data terms and definitions that have been standardized within Maryland State Government. This dataset will continue to evolve as new terms come into the landscape.",
      "diciBackend" : false,
      "displayType" : "table",
      "downloadCount" : 919,
      "hideFromCatalog" : false,
      "hideFromDataJson" : false,
      "licenseId" : "PUBLIC_DOMAIN",
      "locked" : false,
      "newBackend" : true,
      "numberOfComments" : 0,
      "oid" : 38861389,
      "provenance" : "official",
      "publicationAppendEnabled" : false,
      "publicationDate" : 1668725334,
      "publicationGroup" : 18869419,
      "publicationStage" : "published",
      "rowsUpdatedAt" : 1668725329,
      "tableId" : 18869419,
      "totalTimesRated" : 0,
      "viewCount" : 759,
      "viewLastModified" : 1694629950,
      "viewType" : "tabular",
      "approvals" : [ {
        "reviewedAt" : 1669034324,
        "reviewedAutomatically" : false,
        "state" : "approved",
        "submissionId" : 5108994,
        "submissionObject" : "public_audience_request",
        "submissionOutcome" : "change_audience",
        "submittedAt" : 1668725334,
        "targetAudience" : "public",
        "workflowId" : 1975,
        "reviewer" : {
          "id" : "37pn-ebz8",
          "displayName" : "J.B. Churchill"
        },
        "submissionDetails" : {
          "permissionType" : "READ"
        },
        "submissionOutcomeApplication" : {
          "endedAt" : 1669034325,
          "failureCount" : 0,
          "startedAt" : 1669034324,
          "status" : "success"
        },
        "submitter" : {
          "id" : "d4ir-ss3r",
          "displayName" : "Pat.Mcloughlin@maryland.gov"
        }
      } ],
      "clientContext" : {
        "clientContextVariables" : [ ],
        "inheritedVariables" : { }
      },
      "columns" : [ {
        "id" : -1,
        "name" : "sid",
        "dataTypeName" : "meta_data",
        "fieldName" : ":sid",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "id",
        "dataTypeName" : "meta_data",
        "fieldName" : ":id",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "position",
        "dataTypeName" : "meta_data",
        "fieldName" : ":position",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "created_at",
        "dataTypeName" : "meta_data",
        "fieldName" : ":created_at",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "created_meta",
        "dataTypeName" : "meta_data",
        "fieldName" : ":created_meta",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "updated_at",
        "dataTypeName" : "meta_data",
        "fieldName" : ":updated_at",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "updated_meta",
        "dataTypeName" : "meta_data",
        "fieldName" : ":updated_meta",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : -1,
        "name" : "meta",
        "dataTypeName" : "meta_data",
        "fieldName" : ":meta",
        "position" : 0,
        "renderTypeName" : "meta_data",
        "format" : { },
        "flags" : [ "hidden" ]
      }, {
        "id" : 567975752,
        "name" : "Term",
        "dataTypeName" : "text",
        "description" : "Data Term",
        "fieldName" : "term",
        "position" : 1,
        "renderTypeName" : "text",
        "tableColumnId" : 144640248,
        "cachedContents" : {
          "non_null" : "123",
          "largest" : "Wi-Fi Certified",
          "null" : "0",
          "top" : [ {
            "item" : "Data Visualization",
            "count" : "1"
          }, {
            "item" : "Accountability",
            "count" : "1"
          }, {
            "item" : "Protected Health Information (PHI)",
            "count" : "1"
          }, {
            "item" : "Data Element",
            "count" : "1"
          }, {
            "item" : "Application",
            "count" : "1"
          }, {
            "item" : "Machine Learning (ML)",
            "count" : "1"
          }, {
            "item" : "Extract, Transform, Load (ETL)",
            "count" : "1"
          }, {
            "item" : "Application Program Interface (API)",
            "count" : "1"
          }, {
            "item" : "Data Mining",
            "count" : "1"
          }, {
            "item" : "Data Owner",
            "count" : "1"
          }, {
            "item" : "Acceptable Level of Risk",
            "count" : "1"
          }, {
            "item" : "Data Cleansing",
            "count" : "1"
          }, {
            "item" : "Prescriptive Analytics",
            "count" : "1"
          }, {
            "item" : "Children's Online Privacy Protection Act (COPPA)",
            "count" : "1"
          }, {
            "item" : "Extract, Load, Transform (ELT)",
            "count" : "1"
          }, {
            "item" : "Descriptive Analytics",
            "count" : "1"
          }, {
            "item" : "Security",
            "count" : "1"
          }, {
            "item" : "Database",
            "count" : "1"
          }, {
            "item" : "Data Series",
            "count" : "1"
          }, {
            "item" : "Authentication [FIPS 199]",
            "count" : "1"
          } ],
          "smallest" : "Acceptable Level of Risk",
          "count" : "123",
          "cardinality" : "123"
        },
        "format" : { }
      }, {
        "id" : 567975751,
        "name" : "Definition",
        "dataTypeName" : "text",
        "description" : "Data Definition",
        "fieldName" : "definition",
        "position" : 2,
        "renderTypeName" : "text",
        "tableColumnId" : 144640247,
        "cachedContents" : {
          "non_null" : "120",
          "largest" : "Wi-Fi CERTIFIED is a program for testing products to the 802.11 industry standards for interoperability, security, easy installation, and reliability (ref. State of Maryland Information Technology Security Manual v1.2).",
          "null" : "3",
          "top" : [ {
            "item" : "a computer system that analyzes and displays geographically referenced information",
            "count" : "1"
          }, {
            "item" : "A fundamental unit of information that has a unique meaning.",
            "count" : "1"
          }, {
            "item" : "Individual responsible for designing all structures of data within an organization.",
            "count" : "1"
          }, {
            "item" : "servers that are accessed over the Internet, and the software and databases that run on those servers",
            "count" : "1"
          }, {
            "item" : "Commercial Off The Shelf software that is available for business processing.",
            "count" : "1"
          }, {
            "item" : "A judicious, carefully considered, and fully documented assessment by the appropriate Designated Approving Authority (AA) that an information subsystem meets the minimum requirements of applicable security directives. The assessment should take into account and carefully document the sensitivity and criticality of information, threats, vulnerabilities and countermeasures and their effectiveness in compensating for vulnerabilities, and operational requirements (ref. State of Maryland Information Technology Security Manual v1.2).",
            "count" : "1"
          }, {
            "item" : "Information that is a public record under the Maryland Public Information Act (ref. State of Maryland Information Technology Security Manual v1.2).",
            "count" : "1"
          }, {
            "item" : "A complete set of definitions for all tables and data fields in a data system.",
            "count" : "1"
          }, {
            "item" : "Data relating to the characteristics of a human population.",
            "count" : "1"
          }, {
            "item" : "The process of combining information from two or more data sets, identifying all entries that represent the same thing, and combining their information into a single result via a formalized set of rules that define which systems or values are more trusted than others.",
            "count" : "1"
          }, {
            "item" : "The development, execution, and supervision of plans, policies, programs, and practices, that deliver, control, protect, and enhance the value of data and information assets throughout their lifecycle.",
            "count" : "1"
          }, {
            "item" : "Governs the privacy of student education records and applies to all schools that receive funds under an applicable program of the U.S. Department of Education.",
            "count" : "1"
          }, {
            "item" : "A security technique that regulates who or what can view or use resources.",
            "count" : "1"
          }, {
            "item" : "Any data about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.",
            "count" : "1"
          }, {
            "item" : "Formal, actionable rules that direct, help enforce, and support policies.  This answers the question “What are the requirements to do this?”",
            "count" : "1"
          }, {
            "item" : "All departments, boards, commissions, agencies, or subunits in the Executive Branch of State Government.",
            "count" : "1"
          }, {
            "item" : "Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. \n Adequately met includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software, and (3) sufficient resistance to intentional penetration or bypass  (ref. State of Maryland Information Technology Security Manual v1.2).",
            "count" : "1"
          }, {
            "item" : "Refers to the general process of removing data from storage media, such that there is reasonable assurance that the data may not be easily retrieved and reconstructed (ref. State of Maryland Information Technology Security Manual v1.2).",
            "count" : "1"
          }, {
            "item" : "Detailed processes, approaches, and methods to meet the Policies and Standards. This answers the question “How are we doing this?”",
            "count" : "1"
          }, {
            "item" : "Data that adheres to a predefined schema. It is typically stored in relational databases and can be easily queried.",
            "count" : "1"
          } ],
          "smallest" : "ability to read, write and communicate data in context. It includes an understanding of data sources, analytical techniques, business applications, and value of data",
          "count" : "123",
          "cardinality" : "120"
        },
        "format" : { }
      } ],
      "grants" : [ {
        "inherited" : false,
        "type" : "viewer",
        "flags" : [ "public" ]
      } ],
      "license" : {
        "name" : "Public Domain"
      },
      "metadata" : {
        "custom_fields" : {
          "Jurisdiction" : {
            "Jurisdiction" : "State of Maryland"
          },
          "Agency" : {
            "State Agency Performing Data Updates" : "Other"
          },
          "Time Period" : {
            "Update Frequency" : "As Needed",
            "Time Period of Content" : "Current",
            "Date Metadata Written" : "August 1, 2022"
          },
          "GIS Download" : {
            "Place Keywords" : "Maryland"
          }
        },
        "availableDisplayTypes" : [ "table", "fatrow", "page" ]
      },
      "owner" : {
        "id" : "d4ir-ss3r",
        "displayName" : "Pat.Mcloughlin@maryland.gov",
        "profileImageUrlLarge" : "/api/users/d4ir-ss3r/profile_images/LARGE",
        "profileImageUrlMedium" : "/api/users/d4ir-ss3r/profile_images/THUMB",
        "profileImageUrlSmall" : "/api/users/d4ir-ss3r/profile_images/TINY",
        "screenName" : "Pat.Mcloughlin@maryland.gov",
        "type" : "interactive",
        "flags" : [ "acceptedEula", "mayBeStoriesCoOwner" ]
      },
      "query" : { },
      "rights" : [ "read" ],
      "tableAuthor" : {
        "id" : "d4ir-ss3r",
        "displayName" : "Pat.Mcloughlin@maryland.gov",
        "profileImageUrlLarge" : "/api/users/d4ir-ss3r/profile_images/LARGE",
        "profileImageUrlMedium" : "/api/users/d4ir-ss3r/profile_images/THUMB",
        "profileImageUrlSmall" : "/api/users/d4ir-ss3r/profile_images/TINY",
        "screenName" : "Pat.Mcloughlin@maryland.gov",
        "type" : "interactive",
        "flags" : [ "acceptedEula", "mayBeStoriesCoOwner" ]
      },
      "tags" : [ "data terminology", "data glossary" ],
      "flags" : [ "default", "ownerMayBeContacted", "restorable", "restorePossibleForType" ]
    }
  },
  "data" : [ [ "row-r27b_dqux_5vcy", "00000000-0000-0000-39EF-B69C15762EDB", 0, 1668725328, null, 1668725328, null, "{ }", "Acceptable Level of Risk", "A judicious, carefully considered, and fully documented assessment by the appropriate Designated Approving Authority (AA) that an information subsystem meets the minimum requirements of applicable security directives. The assessment should take into account and carefully document the sensitivity and criticality of information, threats, vulnerabilities and countermeasures and their effectiveness in compensating for vulnerabilities, and operational requirements (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-v42i_wsfu-5pa8", "00000000-0000-0000-CF5D-D97720D252AC", 0, 1668725328, null, 1668725328, null, "{ }", "Acceptable Risk", "A concern that is deemed acceptable to responsible management, due to the cost and magnitude of implementing countermeasures to mitigate the risk (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-inwg~wmhs_bxht", "00000000-0000-0000-9A45-D58884B4A223", 0, 1668725328, null, 1668725328, null, "{ }", "Access Control", "A security technique that regulates who or what can view or use resources." ]
, [ "row-tpk2.c9q2_66mh", "00000000-0000-0000-91C5-9FF550542F78", 0, 1668725328, null, 1668725328, null, "{ }", "Accountability", "Accountability is (1) The quality or state that enables violations or attempted violations of IT Security to be traced to individuals who may then be held responsible. (2) The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non repudiation, deterrence, fault isolation, intrusion detection and prevention, after-action recovery and legal action (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-4wrc-wzsa.9vwa", "00000000-0000-0000-0E0F-0B51919F0F3D", 0, 1668725328, null, 1668725328, null, "{ }", "Adequate Security", "Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-qu6s_bgar.2b5i", "00000000-0000-0000-EC4C-E98B7ED14DB3", 0, 1668725328, null, 1668725328, null, "{ }", "Agency Data Officer", "An individual designated by a State unit to implement measure for the secure, efficient, and effective use of data; provide administrative support to the State Chief Data Officer on behalf of the the unit; receive and promptly address inquiries, requests, or concerns about access to the unit’s data; comply with direction from the State Chief Data Officer as to the use and management of the unit’s data in accordance with Executive Order \"01.01.2021.09 State Chief Data Officer\" (ref. Executive Order \"01.01.2021.09 State Chief Data Officer\")." ]
, [ "row-h5j7_677j~gd6n", "00000000-0000-0000-9249-6D120ECE1591", 0, 1668725328, null, 1668725328, null, "{ }", "Agency Privacy Officer", "An individual designated by a State unit to manage its implementation of reasonable security practices and procedures in compliance with Executive Order \"01.01.2021.10 Data Privacy\" (ref. Executive Order \"01.01.2021.10 Data Privacy\")." ]
, [ "row-kbca~r5z3.58b7", "00000000-0000-0000-DC02-F87EDF973B72", 0, 1668725328, null, 1668725328, null, "{ }", "Application", "The use of information resources (information and information technology) to satisfy a specific set of users requirements (See Major Application) (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-pq76_zhfz.v9ii", "00000000-0000-0000-C2E1-20A40FE34A76", 0, 1668725328, null, 1668725328, null, "{ }", "Application Program Interface (API)", "A formal interface that a system provides to other systems in order to expose its data or functionality in a well-defined, well-managed way. An API provides one official way to access materials and provides an appropriate level of security and structure in order to assure that anything coming to the system gets good fidelity and dependable results in a well-structured format." ]
, [ "row-qvhc_qubz~t2zn", "00000000-0000-0000-4F4F-858B1B87FFCE", 0, 1668725328, null, 1668725328, null, "{ }", "Artificial Intelligence (AI)", "the ability of a machine to mimic the capabilities of the human mind, such as learning from examples and sample sets, recognizing objects, understanding and responding to language, making decisions, and solving problems." ]
, [ "row-jfdf-sgi7-vi5g", "00000000-0000-0000-E9FE-F448C617AE80", 0, 1668725328, null, 1668725328, null, "{ }", "Assessment", "See Security Control Assessment (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-ntyr.bzvk~bcdf", "00000000-0000-0000-04CA-85EBAF71C1EC", 0, 1668725328, null, 1668725328, null, "{ }", "Assurance", "Grounds for confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. \n Adequately met includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software, and (3) sufficient resistance to intentional penetration or bypass  (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-jqtp~hikd~625b", "00000000-0000-0000-E9D0-E010BDDB069E", 0, 1668725328, null, 1668725328, null, "{ }", "Audit Log", "A chronological record of system activities which enables the reconstruction and examination of the sequence of events and activities surrounding or leading to an operation, a procedure or an event in a transaction from its inception to final results. The audit log also serves as the chain of custody for the history of use of a record. This term is synonymous with Audit Records and Audit Trails (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-74vv~h3m6-4h4u", "00000000-0000-0000-B2B5-4EB3519DC587", 0, 1668725328, null, 1668725328, null, "{ }", "Authentication [FIPS 199]", "The process of verifying the identity of a user, process or device, often as a prerequisite to allowing access to resources in an information system (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-ijfq_uhtx-9q6n", "00000000-0000-0000-3317-644C21331931", 0, 1668725328, null, 1668725328, null, "{ }", "Big Data", "large, hard-to-manage volumes of data – both structured and unstructured" ]
, [ "row-cin9_p8pr.xca3", "00000000-0000-0000-3A13-5F78A57C1297", 0, 1668725328, null, 1668725328, null, "{ }", "Business Intelligence (BI)", "analyzing and transforming data to extract valuable business insights to enable data driven decision-making" ]
, [ "row-a25y_4be2-5qmc", "00000000-0000-0000-9D60-B072A0682AD7", 0, 1668725328, null, 1668725328, null, "{ }", "Children's Online Privacy Protection Act (COPPA)", "Governs the connection of information obtained through online/website services relating to children aged 13 and under." ]
, [ "row-gnm8-kt52_4esg", "00000000-0000-0000-91E0-39519EC02723", 0, 1668725328, null, 1668725328, null, "{ }", "Cloud", "servers that are accessed over the Internet, and the software and databases that run on those servers" ]
, [ "row-3zvd_jzfp~7h7a", "00000000-0000-0000-6FC7-9F27F8DBE47F", 0, 1668725328, null, 1668725328, null, "{ }", "Confidential Data (Classification)", "Access to confidential data requires specific authorization and/or clearance. Types of confidential data might include Social Security numbers, cardholder data, etc. This data is usually protected by laws like Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS)." ]
, [ "row-98fi~yrwe_97vt", "00000000-0000-0000-72A2-C8BCAB42BCE3", 0, 1668725328, null, 1668725328, null, "{ }", "COTS Product", "Commercial Off The Shelf software that is available for business processing." ]
, [ "row-25a5-6xuz-mxv9", "00000000-0000-0000-AF4C-0C8CAC27CA82", 0, 1668725328, null, 1668725328, null, "{ }", "Criminal Justice Information System (CJIS)", "Governs  data collected and protected by the Federal Bureau of Investigations (FBI) but is accessible to local and state law enforcement organizations. Local and state organizations who have access to CJIS data must comply with the CJIS security requirements to protect it." ]
, [ "row-xgu6_kr2p_376n", "00000000-0000-0000-3A18-DD0EF419AACD", 0, 1668725328, null, 1668725328, null, "{ }", "DaaS - Data as a Service", "a term used to describe cloud-based software tools used for working with data, such as managing data in a data warehouse or analyzing data with business intelligence" ]
, [ "row-hfkd~s2x9-tzgn", "00000000-0000-0000-0101-FD54AD3B4D10", 0, 1668725328, null, 1668725328, null, "{ }", "Dashboard", "A graphical representation of the analyses performed by the algorithms" ]
, [ "row-2wpq-mkxh~6jm6", "00000000-0000-0000-3967-0C6142B7573B", 0, 1668725328, null, 1668725328, null, "{ }", "Data", "Statistics or facts about something that can be used in calculating, reasoning, or planning." ]
, [ "row-b9bq.4jir.yc2z", "00000000-0000-0000-95B9-1108F1BDBE7F", 0, 1668725328, null, 1668725328, null, "{ }", "Data access", "The act or method of viewing or retrieving stored data." ]
, [ "row-6rwy~ueap_zpr5", "00000000-0000-0000-7E6C-F2956114ECB6", 0, 1668725328, null, 1668725328, null, "{ }", "Data Architect", "Individual responsible for designing all structures of data within an organization." ]
, [ "row-5vea_ngng_dbfz", "00000000-0000-0000-C4DB-ADA49B9A4295", 0, 1668725328, null, 1668725328, null, "{ }", "Data Architecture", "The organizational and classification structure of data and metadata, and standardized terms and definitions for data that facilitate system interoperability." ]
, [ "row-xaq4.5xgb~tydb", "00000000-0000-0000-F437-921184746A68", 0, 1668725328, null, 1668725328, null, "{ }", "Data Asset Valuation", "A method for estimating the value of data assets by quantifying the impact on cash flows if the data assets needed to be replaced." ]
, [ "row-q3tx.ugig~xd8z", "00000000-0000-0000-B486-D17A2C009C84", 0, 1668725328, null, 1668725328, null, "{ }", "Data Classification", "An indicator and categorization for aiding in the proper management and security of data in use, transit, and at rest.   \nPublic/Open |This type of data is freely accessible to the public and can be freely used, reused, and redistributed without repercussions.\nProtected/Internal Only | This type of data is strictly accessible to internal Agency personnel or internal employees who are granted access. \nConfidential | Access to confidential data requires specific authorization and/or clearance. Types of confidential data might include Social Security numbers, cardholder data, etc. This data is usually protected by laws like HIPAA and the PCI DSS.\nRestricted | Data that, if compromised or accessed without authorization, which could lead to criminal charges and massive legal fines or cause irreparable damage to the company." ]
, [ "row-amnz-5e94.if8r", "00000000-0000-0000-7174-40D1D6CB1AC3", 0, 1668725328, null, 1668725328, null, "{ }", "Data Cleansing", null ]
, [ "row-h9th~p3fe~nnkt", "00000000-0000-0000-CC7E-D62252A3B75F", 0, 1668725328, null, 1668725328, null, "{ }", "Data Custodian", "An individual that is responsible for maintaining quality assurance, quality control, security and storage associated with the data as it relates to the standards set by the data owner." ]
, [ "row-mpar-858z.ar7g", "00000000-0000-0000-EF67-C1B2EB734B5A", 0, 1668725328, null, 1668725328, null, "{ }", "Data Dictionary", "A complete set of definitions for all tables and data fields in a data system." ]
, [ "row-2he9.5kuk.czpm", "00000000-0000-0000-FE22-357D262999EF", 0, 1668725328, null, 1668725328, null, "{ }", "Data Element", "A fundamental unit of information that has a unique meaning." ]
, [ "row-t7wn-48u5~wcsq", "00000000-0000-0000-7FEA-284203CEB326", 0, 1668725328, null, 1668725328, null, "{ }", "Data Fabric", "An end-to-end data integration and management solution, consisting of architecture, data management and integration software, and shared data that helps organizations manage their data. A data fabric provides a unified, consistent user experience and access to data for any member of an organization worldwide and in real-time." ]
, [ "row-cghz~887d-disu", "00000000-0000-0000-178B-CE07A25A054E", 0, 1668725328, null, 1668725328, null, "{ }", "Data Fidelity", "A set of quality standards, defined at various levels, that specify what level of quality is deemed minimally required for a data set in aggregate, e.g., \"99.5% of all zip codes in the Address table with be filled and correct at all times.\"" ]
, [ "row-4m5n-w3rv~6vev", "00000000-0000-0000-A821-B5723089C1A7", 0, 1668725328, null, 1668725328, null, "{ }", "Data Governance", "The exercise of authority and control (planning, monitoring, and enforcement) over the management of data assets with the purpose of ensuring that data is managed properly, according to policies and best practices." ]
, [ "row-vsdh-6qbn.8e4z", "00000000-0000-0000-14B4-2C2091ECA9B5", 0, 1668725328, null, 1668725328, null, "{ }", "Data Governance Framework", "A set of rules, processes, and specific duties as it relates to the compliance of the organization's data management expectations" ]
, [ "row-had3~7r3f~i33d", "00000000-0000-0000-E2B3-7E7DE6D6BCBB", 0, 1668725328, null, 1668725328, null, "{ }", "Data Integration", "The process of bringing data together from different sources to provide unified or consolidated view." ]
, [ "row-fm5a-phea-vnwy", "00000000-0000-0000-4C61-36A09F5EB58A", 0, 1668725328, null, 1668725328, null, "{ }", "Data Interoperability", "The ability of data to be utilized seamlessly across multiple systems." ]
, [ "row-8ng5~848v.qu95", "00000000-0000-0000-3A76-B497BAF6733F", 0, 1668725328, null, 1668725328, null, "{ }", "Data Inventory", "A catalog of data assets within an organization. It provides information related to the type of data collected, who can access it, where it is stored and how it is used." ]
, [ "row-tdir-i8hu_29z7", "00000000-0000-0000-AD96-81A09B44B4FC", 0, 1668725328, null, 1668725328, null, "{ }", "Data Lake", "A centralized repository that stores both structured and unstructured data." ]
, [ "row-4djz-3rvb_syud", "00000000-0000-0000-2BDD-1712FF1A9E06", 0, 1668725328, null, 1668725328, null, "{ }", "Data Lakehouse", "A data architecture platform that combines the structured data management features of a data warehouse, with the flexible storage and optimized performance features of a data lake, supporting structured, semi-structured, and unstructured data." ]
, [ "row-wshq_zfbs-gye8", "00000000-0000-0000-F3A5-92C6E4FB3FB4", 0, 1668725328, null, 1668725328, null, "{ }", "Data Lineage", "A description of data as it relates to time. It includes information such as the origin of the data, where it has traveled, and the transformations it underwent." ]
, [ "row-iiyv.3gxy-4346", "00000000-0000-0000-F01B-5E6B66A55ABA", 0, 1668725328, null, 1668725328, null, "{ }", "Data Literacy", "ability to read, write and communicate data in context. It includes an understanding of data sources, analytical techniques, business applications, and value of data" ]
, [ "row-piwt~rx9a_9cie", "00000000-0000-0000-0E45-57F291F61CF8", 0, 1668725328, null, 1668725328, null, "{ }", "Data Maintenance", "Data maintenance is the process of auditing, organizing and correcting data in management systems and databases to ensure accuracy and accessibility." ]
, [ "row-gjy8-nde4_s6p9", "00000000-0000-0000-BC61-2164A57F35CB", 0, 1668725328, null, 1668725328, null, "{ }", "Data Management", "The development, execution, and supervision of plans, policies, programs, and practices, that deliver, control, protect, and enhance the value of data and information assets throughout their lifecycle." ]
, [ "row-su5m-asbz_bn3r", "00000000-0000-0000-C737-A1FC3E3D23F4", 0, 1668725328, null, 1668725328, null, "{ }", "Data Mart", "A subset of a data warehouse that focuses on a specific set of data to be used by an entity within an organization." ]
, [ "row-widn_ps5i.t3h9", "00000000-0000-0000-BF9F-DB34A2D84E8F", 0, 1668725328, null, 1668725328, null, "{ }", "Data Maturity", "Identification and improvement of the quality of data within Participating Organization’s systems." ]
, [ "row-mzis~3few-nvck", "00000000-0000-0000-90C0-13697D0D7842", 0, 1668725328, null, 1668725328, null, "{ }", "Data Mesh", "A data platform architecture where an organization's data remains decentralized and managed by domain, but can be accessed, analyzed, queried, and operationalized through a interoperable layer with standards applied." ]
, [ "row-da56.fg5w~ybxf", "00000000-0000-0000-75FC-63910BFDCA2A", 0, 1668725328, null, 1668725328, null, "{ }", "Data migration", "The process of moving data between different storage types or formats, or between different computer systems." ]
, [ "row-tr3b.vv3r_3a6f", "00000000-0000-0000-C663-5522CFD6E3DE", 0, 1668725328, null, 1668725328, null, "{ }", "Data Mining", "a process of extracting and discovering patterns in large data sets" ]
, [ "row-55kp.i27k~xyj3", "00000000-0000-0000-5C83-B3161502645F", 0, 1668725328, null, 1668725328, null, "{ }", "Data Model", "Data model refers to the logical inter-relationships and data flow between different data elements involved in the information system." ]
, [ "row-xkw5_m9ka-42qq", "00000000-0000-0000-9C53-7B23B8941A96", 0, 1668725328, null, 1668725328, null, "{ }", "Data Owner", "An individual or entity that is responsible for data within a specific domain. The Data Owner typically dictate and establish standards and goals associated with the data, and can authorize or deny access to the data and is responsible for its accuracy, integrity, and timeliness." ]
, [ "row-hkic~krf9~4rnc", "00000000-0000-0000-CF98-4E2E1B4AF877", 0, 1668725328, null, 1668725328, null, "{ }", "Data Privacy", "Focuses on the protection of personally identifiable information by government agencies." ]
, [ "row-m3hc~unh5-mur9", "00000000-0000-0000-53FA-7B2DF4210560", 0, 1668725328, null, 1668725328, null, "{ }", "Data Profiling", "The process of examining, analyzing, reviewing and summarizing data sets to gain insight into the quality of data." ]
, [ "row-xncc-va6f.jgp6", "00000000-0000-0000-E6AE-A51E33614498", 0, 1668725328, null, 1668725328, null, "{ }", "Data Quality", "The state of the data as it relates to accuracy, reliability, consistency, timeliness, validity, and uniqueness." ]
, [ "row-bqvv~tzam_rnvs", "00000000-0000-0000-61DE-46EB156D783C", 0, 1668725328, null, 1668725328, null, "{ }", "Data Security", "Protecting digital data, such as those in a database, throughout its lifecycle from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or data breach." ]
, [ "row-mhid-8xmc-c838", "00000000-0000-0000-7770-DC3A454E6194", 0, 1668725328, null, 1668725328, null, "{ }", "Data Series", "A single measure, usually plotted over time, usually represented as a single column." ]
, [ "row-gdmw~vmp8~kqw4", "00000000-0000-0000-05A8-94A709F3D309", 0, 1668725328, null, 1668725328, null, "{ }", "Data Steward", "The person with day-to-day management responsibility of individual databases, datasets, or information systems. In general, a data steward has business knowledge of the data and can answer questions about the data itself." ]
, [ "row-4fqv.pn6m_kgk6", "00000000-0000-0000-F71C-A302A62006B9", 0, 1668725328, null, 1668725328, null, "{ }", "Data Trust", "A scalable alternative to multiple “point-to-point” sharing agreements established through common rules for data security and data privacy." ]
, [ "row-hbjs~9h97_udes", "00000000-0000-0000-9FA7-E88C13729508", 0, 1668725328, null, 1668725328, null, "{ }", "Data User", "An employee, contractor, or other individual affiliated with the State who is eligible and authorized to collect, access and/or use the data. A dataset may have more than one user group." ]
, [ "row-gpaw.ep5g.bz9x", "00000000-0000-0000-9959-1D537EB5AE9D", 0, 1668725328, null, 1668725328, null, "{ }", "Data Visualization", "A visual abstraction of data designed for the purpose of deriving meaning or communicating information more effectively." ]
, [ "row-339a_jisz-pyy8", "00000000-0000-0000-89D7-04BF6AC0C943", 0, 1668725328, null, 1668725328, null, "{ }", "Data Warehouse", "A collection of structured data that is populated and filtered from internal and external systems for a specific purpose." ]
, [ "row-avq4~bxs6-6xju", "00000000-0000-0000-E425-6908A29722C6", 0, 1668725328, null, 1668725328, null, "{ }", "Database", "An electronic system that enables the storage, management, and querying of data." ]
, [ "row-68tr_xm6z-bnxx", "00000000-0000-0000-18A2-EC5DA256C695", 0, 1668725328, null, 1668725328, null, "{ }", "Dataset", "A collection of data organized or formatted in a specific or prescribed way. Typically, a dataset consists of one or more tables and is stored in a database or spreadsheet. Files of the following types are not datasets: text documents, emails, messages, videos, recordings, image files such as designs, diagrams, drawings, photographs, and scans, and hard-copy records." ]
, [ "row-29ia-s7fc.tuhj", "00000000-0000-0000-9866-63508A597600", 0, 1668725328, null, 1668725328, null, "{ }", "Deduplication", "The process of combining information from two or more data sets, identifying all entries that represent the same thing, and combining their information into a single result via a formalized set of rules that define which systems or values are more trusted than others." ]
, [ "row-tkin~tgz3~g9kv", "00000000-0000-0000-84A8-E2C502D1D088", 0, 1668725328, null, 1668725328, null, "{ }", "Demographic data", "Data relating to the characteristics of a human population." ]
, [ "row-iyww_zhzq_mqbd", "00000000-0000-0000-D320-81E79F5BD999", 0, 1668725328, null, 1668725328, null, "{ }", "Descriptive Analytics", "The process of using current and historical data to identify trends, relationships, and patterns to understand what has happened." ]
, [ "row-jug2_2jes-y7hi", "00000000-0000-0000-0D05-C737055466F8", 0, 1668725328, null, 1668725328, null, "{ }", "Designated Approving Authority (AA)", null ]
, [ "row-t5au_p9tx.k6rn", "00000000-0000-0000-9091-08A9297A08E0", 0, 1668725328, null, 1668725328, null, "{ }", "Encryption", "the method by which information is converted into secret code that hides the information's true meaning" ]
, [ "row-vmrs~auya~4a4s", "00000000-0000-0000-BE41-212B6EF3C323", 0, 1668725328, null, 1668725328, null, "{ }", "Enterprise Service Bus (ESB)", "A general-use toolset for the movement of data between different systems, event-driven or on-demand." ]
, [ "row-a6wz~u7ve~23nn", "00000000-0000-0000-C903-2DB3CE0D1429", 0, 1668725328, null, 1668725328, null, "{ }", "European Union (EU) General Data Protection Regulation (GDPR)", "This Regulation lays down rules relating to the protection of natural persons with regard to the processing of personal data and rules relating to the free movement of personal data. This Regulation protects fundamental rights and freedoms of natural persons and in particular their right to the protection of personal data. The free movement of personal data within the Union shall be neither restricted nor prohibited for reasons connected with the protection of natural persons with regard to the processing of personal data." ]
, [ "row-yqcn-ep2v-kqbt", "00000000-0000-0000-84B4-42AD26DC4CF4", 0, 1668725328, null, 1668725328, null, "{ }", "External data", "Data that exists outside of a system/organization" ]
, [ "row-ww9y_fbdr.f6xu", "00000000-0000-0000-5E82-189CE27EBE48", 0, 1668725328, null, 1668725328, null, "{ }", "Extract, Load, Transform (ELT)", "A three-step process to, 1) Extract data from a source, 2) Load the data to the destination, and 3) perform transformation to meet the storage requirements and organizational needs" ]
, [ "row-4ucp~jzsc-mfgi", "00000000-0000-0000-4DCD-5ED4F57E76DA", 0, 1668725328, null, 1668725328, null, "{ }", "Extract, Transform, Load (ETL)", "A three-step process to, 1) Extract data from a source, 2) Transform the data so that the format can be read by the destination, and 3) Load the data to the destination." ]
, [ "row-je9b_5n9z.cdsa", "00000000-0000-0000-587C-87EE414969AE", 0, 1668725328, null, 1668725328, null, "{ }", "Family Educational Rights and Privacy Act (FERPA)", "Governs the privacy of student education records and applies to all schools that receive funds under an applicable program of the U.S. Department of Education." ]
, [ "row-kp4c.5b44-wb7t", "00000000-0000-0000-E2FE-17A649BBF361", 0, 1668725328, null, 1668725328, null, "{ }", "Flat File", "A set of data that is linear in nature, typically in the form of a unicode or ascii file. Flat files may be structured by the location of data in specific places in a line of text, or via delimiters such as commas or tabs." ]
, [ "row-j6db~uvcj-8sdd", "00000000-0000-0000-F53D-A083B0AAE2D0", 0, 1668725328, null, 1668725328, null, "{ }", "Geographic Information System (GIS)", "a computer system that analyzes and displays geographically referenced information" ]
, [ "row-tkux_rfxy.kdrk", "00000000-0000-0000-8DD8-7991FDC88370", 0, 1668725328, null, 1668725328, null, "{ }", "Health Insurance Portability and Accountability Act (HIPAA)", "Governs health data created, received, stored, or transmitted by HIPAA covered entities and their business associates in relation to the provision of healthcare, healthcare operations and payment for healthcare services" ]
, [ "row-cvaf_8xi2.czbp", "00000000-0000-0000-95A5-39EC64A45F9F", 0, 1668725328, null, 1668725328, null, "{ }", "High Value Data", "Any data that the department head determines (A) is critical to the operation of an executive branch agency; (B) can increase executive branch agency accountability and responsiveness; (C) can improve public knowledge of the executive branch agency and its operations; (D) can further the core mission of the executive branch agency; (E) can create economic opportunity; (F) is frequently requested by the public; (G) responds to a need and demand as identified by the agency through public consultation; or (H) is used to satisfy any legislative or other reporting requirements." ]
, [ "row-wafx-mxzs_ad6y", "00000000-0000-0000-6BE3-15013C3D3C53", 0, 1668725328, null, 1668725328, null, "{ }", "IRS-1075", "Governs Federal Tax Information (e.g., tax return information) received directly from the IRS or obtained through an authorized secondary source, such as Social Security Administration (SSA), Federal Office of Child Support Enforcement (OCSE), Bureau of the Fiscal Service (BFS), or Centers for Medicare and Medicaid Services (CMS), or another entity acting on behalf of the IRS pursuant to an IRC 6103(p)(2)(B) Agreement." ]
, [ "row-kz96~7qiu-auwe", "00000000-0000-0000-14CF-D04B8ED8B3C8", 0, 1668725328, null, 1668725328, null, "{ }", "Machine Learning (ML)", "the artificial intelligence (AI) discipline that provides systems the ability to automatically learn and improve from experience without being explicitly programmed" ]
, [ "row-cizr.w4s4.e6gd", "00000000-0000-0000-32A4-9E9F8EC3BFD4", 0, 1668725328, null, 1668725328, null, "{ }", "Major Application", "?referenced above in application however not defined" ]
, [ "row-rhhn_ndke.4cub", "00000000-0000-0000-5547-88D2D7D80A56", 0, 1668725328, null, 1668725328, null, "{ }", "Metadata", "Data about data. Contains information about the dataset, such as name, publication date, attribution URL, update schedule, and contact information." ]
, [ "row-xjyq~e5is_ceag", "00000000-0000-0000-EB64-5965FAA0660F", 0, 1668725328, null, 1668725328, null, "{ }", "Open Data", "Open Data is any data collected by the state which can be provided to the public. According to the Open Data Act, Open Data is data that - consistent with any applicable laws, rules, regulations, ordinances, resolutions, policies, or other restrictions including requirements or rights associated with the data - has been collected and is permitted, required, or able to make available to the public. Open data includes contractual or other legal orders, restrictions, or requirements. Open data does not include data that if made public would:\n ● violate another law or regulation that prohibits the data from being made public;\n ● endanger the public health, safety, or welfare;\n ● hinder the operation of government, including criminal and civil investigations;\n ● impose an undue financial, operational, or administrative burden on a state entity; or\n ● disclose proprietary or confidential information." ]
, [ "row-tpkk~bzxg.2mnn", "00000000-0000-0000-BB29-43D96D5AEE4B", 0, 1668725328, null, 1668725328, null, "{ }", "Open Data Portal", "Open Data Portal and Portal refer exclusively to Maryland’s statewide Open Data Portal, http://opendata.maryland.gov. More broadly, the Open Data Portal is a product (Software as a Service, or SaaS), provided by the site’s vendor, Socrata. In other contexts “Portal” can be a shorthand for MD iMAP, http://imap.maryland.gov, Maryland’s mapping Portal." ]
, [ "row-d722-e7tz-dusn", "00000000-0000-0000-9735-C5CBEBC311A1", 0, 1668725328, null, 1668725328, null, "{ }", "Participating Organizations", "All departments, boards, commissions, agencies, or subunits in the Executive Branch of State Government." ]
, [ "row-x2vx.m88f-6bj8", "00000000-0000-0000-45F2-E1FB58857563", 0, 1668725328, null, 1668725328, null, "{ }", "Payment Card Industry Data Security Standard (PCI DSS)", "Governs personal data associated to an individual (cardholder) that uses credit, debit and/or cash cards for monetary transactions. Any state organization that collects and/or processes credit card information must abide by PCI-DSS." ]
, [ "row-8et3-tmap_ybn2", "00000000-0000-0000-756B-00B393935E7A", 0, 1668725328, null, 1668725328, null, "{ }", "Personally Identifiable Information (PII)", "Any data about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual's identity, such as name, social security number, date and place of birth, mother's maiden name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information." ]
, [ "row-cwpy.dzzy_pwjg", "00000000-0000-0000-6B66-F52FCCA9E047", 0, 1668725328, null, 1668725328, null, "{ }", "Policies", "Formal statements that help meet an organizational objective that are supported by leadership. This answers the question “Why are we doing this?”" ]
, [ "row-sqg2~gr87.iawy", "00000000-0000-0000-D812-7B6BA1A19264", 0, 1668725328, null, 1668725328, null, "{ }", "Predictive Analytics", "The process of using current and historical data to identify the likelihood of future outcomes, trends, and performance." ]
, [ "row-jmeq.fs5w.izmf", "00000000-0000-0000-5698-785CF3BB303A", 0, 1668725328, null, 1668725328, null, "{ }", "Prescriptive Analytics", "The process of using current and historical data to identify options for responding to likhow the likelihood of future outcomes, trends, and performance." ]
, [ "row-aft4_i2iy.jqnz", "00000000-0000-0000-5652-8FBA7F73E4E6", 0, 1668725328, null, 1668725328, null, "{ }", "Privacy Impact Assessment (PIA)", "An analysis of how data is collected, used, shared, and maintained within an organization to reduce risks related to processing personal data." ]
, [ "row-tx9u_bq8a_8dk3", "00000000-0000-0000-6616-3239B4C15D2C", 0, 1668725328, null, 1668725328, null, "{ }", "Procedures", "Detailed processes, approaches, and methods to meet the Policies and Standards. This answers the question “How are we doing this?”" ]
, [ "row-abet-bwe7_s432", "00000000-0000-0000-33F3-53D194F7493E", 0, 1668725328, null, 1668725328, null, "{ }", "Protected Data (Classification)", "Any data the public disclosure of which would (A) violate federal or state laws or regulations; (B) endanger the public health, safety or welfare; (C) hinder the operation of the federal, state or municipal government, including criminal and civil investigations; or (D) impose an undue financial, operational or administrative burden on the executive branch agency. \"Protected data\" includes any records not required to be disclosed pursuant to subsection (b) of section 1-210 of the general statutes." ]
, [ "row-h6wc~3vb7.zka8", "00000000-0000-0000-0F20-CD4BD1B739DB", 0, 1668725328, null, 1668725328, null, "{ }", "Protected Health Information (PHI)", "PHI includes health records, health histories, lab test results, Health plan beneficiary numbers, medical record numbers, and medical bills, etc. Essentially, all health information is considered PHI when it includes individual identifiers. Demographic information is also considered PHI under HIPAA Rules, as are many common identifiers such as patient names." ]
, [ "row-yq55.ytct~3uip", "00000000-0000-0000-4EA5-2B5E5BAFD011", 0, 1668725328, null, 1668725328, null, "{ }", "Protection of Information by Government Agencies (MD PIGA)", "MD State Govt Code § 10-1301. PII is information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information, to a specific individual. Examples of PII are name, social security number (SSN), address, phone number, email address, biometric data (e.g., fingerprints)" ]
, [ "row-apr8~58ye~2qnc", "00000000-0000-0000-2887-8941C24D085B", 0, 1668725328, null, 1668725328, null, "{ }", "Public Data (Classification)", "Any data collected by an executive branch agency that is permitted to be made available to the public, consistent with any and all applicable laws, rules, regulations, ordinances, resolutions, policies or other restrictions, requirements or rights associated with the data, including, but not limited to, contractual or other legal restrictions, orders or requirements." ]
, [ "row-a6h4_aufp-5jfa", "00000000-0000-0000-095A-A4B81DDD15DC", 0, 1668725328, null, 1668725328, null, "{ }", "Public Information", "Information that is a public record under the Maryland Public Information Act (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-dwc7~in7z_s5nq", "00000000-0000-0000-6E95-C0089AAA62EA", 0, 1668725328, null, 1668725328, null, "{ }", "Publicly Accessible System", "Systems such as Web and FTP applications that are exposed to the Internet and therefore, more vulnerable." ]
, [ "row-pe49-i3wf-crfi", "00000000-0000-0000-E0B6-EBCDF561B202", 0, 1668725328, null, 1668725328, null, "{ }", "Real-time data", "Data that is created, processed, stored, analyzed and visualized within milliseconds" ]
, [ "row-ui7p.y97h.ts2d", "00000000-0000-0000-3106-8210038F676B", 0, 1668725328, null, 1668725328, null, "{ }", "Record", "For data measured over time, the number of records is equal to the number of observations (e.g., the number of months with data available). The number of records is the sample size (N). A record is represented as a single row." ]
, [ "row-24kx-6giy_326s", "00000000-0000-0000-3034-E04F32056EF8", 0, 1668725328, null, 1668725328, null, "{ }", "Redact", "censor or obscure (part of a text) for legal or security purposes" ]
, [ "row-7fbv.7ija~u8mq", "00000000-0000-0000-4F32-BEAD5580262F", 0, 1668725328, null, 1668725328, null, "{ }", "Remote Access", "Any access to DoIT ’s managed network through a non-DoIT managed network, device, or medium (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-dczv_ktjr_d4n7", "00000000-0000-0000-A149-40892DE922ED", 0, 1668725328, null, 1668725328, null, "{ }", "Restricted Data (Classification)", "Data that, if compromised or accessed without authorization, which could lead to criminal charges and massive legal fines or cause irreparable damage to the state." ]
, [ "row-przn_5ux3.w8rz", "00000000-0000-0000-A683-BEC6464314A2", 0, 1668725328, null, 1668725328, null, "{ }", "Sanitization", "Refers to the general process of removing data from storage media, such that there is reasonable assurance that the data may not be easily retrieved and reconstructed (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-7hpt~ryz4_j8mn", "00000000-0000-0000-0F31-C8346F881B18", 0, 1668725328, null, 1668725328, null, "{ }", "Secure Shell (SSH)", "Secure Shell is a network protocol that allows data to be exchanged using a secure channel between two computers (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-fs4a_3vyv_k54k", "00000000-0000-0000-8941-2BF9AB358D37", 0, 1668725328, null, 1668725328, null, "{ }", "Security", null ]
, [ "row-47yr-yapj~gyny", "00000000-0000-0000-4D94-4EC0C58F5E0F", 0, 1668725328, null, 1668725328, null, "{ }", "Semi-structured Data", "Data that is structured but does not conform to a tabular structure such as those found in relational databases." ]
, [ "row-mk5y~huhu.cuvd", "00000000-0000-0000-AECE-B30ED935C4D3", 0, 1668725328, null, 1668725328, null, "{ }", "Sensitive", "Information that, if divulged, could compromise or endanger the citizens or assets of the State." ]
, [ "row-ygjq~anyv.xasy", "00000000-0000-0000-9800-93778BCCF850", 0, 1668725328, null, 1668725328, null, "{ }", "Service Set Identifier (SSID)", "Service Set Identifier is a name used to identify the particular 802.11 wireless LAN to which a client wants to attach (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-kttu_hvuk_e6ub", "00000000-0000-0000-2BC9-E07C0B17A5B0", 0, 1668725328, null, 1668725328, null, "{ }", "Simple Network Management Protocol (SNMP)", "Simple Network Management Protocol is used in network management systems to monitor network attached devices for conditions that warrant administrative attention." ]
, [ "row-y66u~umrv.y9vw", "00000000-0000-0000-03D3-1B41B8361838", 0, 1668725328, null, 1668725328, null, "{ }", "Social Media", "Online technologies and practices that people use to share opinions, insights, experiences, and perspectives with each other (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-habp-jxhe_ib7w", "00000000-0000-0000-13A1-FD18E045961C", 0, 1668725328, null, 1668725328, null, "{ }", "Software as a Service (SaaS)", "software licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted" ]
, [ "row-263b~ake5~jsdv", "00000000-0000-0000-D322-7802EEB1DC4F", 0, 1668725328, null, 1668725328, null, "{ }", "Standards", "Formal, actionable rules that direct, help enforce, and support policies.  This answers the question “What are the requirements to do this?”" ]
, [ "row-jgss~5ead_f974", "00000000-0000-0000-A8B5-51E6F81B1109", 0, 1668725328, null, 1668725328, null, "{ }", "State Chief Data Officer", "Individual appointed by the Governor to supervise and direct the use and management of data by units of State government under the supervision and direction of the Governor (“State Units”) (ref. Executive Order \"01.01.2021.09 State Chief Data Officer\")." ]
, [ "row-eqqz_e8jt~g3rq", "00000000-0000-0000-47D3-2B9E1C564723", 0, 1668725328, null, 1668725328, null, "{ }", "State Chief Information Security Officer", "Individual appointed by the Governor responsible for the direction, coordination, and implementation of the statewide cybersecurity strategy and policy for the Executive Branch of State Government." ]
, [ "row-p99x~939j~ibsz", "00000000-0000-0000-0C33-C3E8D1EB5310", 0, 1668725328, null, 1668725328, null, "{ }", "State Chief Privacy Officer", "Individual appointed by the Governor to supervise and direct efforts of State units to protect and secure personally identifiable information; develop and manage the implementation of State information privacy policies; establish privacy requirements to be incorporated into agreements to share data; and oversee the conduct of privacy impact assessments (ref. Executive Order \"01.01.2021.10 Data Privacy\")." ]
, [ "row-vi2w-3czb.8q7p", "00000000-0000-0000-EC74-81779A7DE16B", 0, 1668725328, null, 1668725328, null, "{ }", "Structured Data", "Data that adheres to a predefined schema. It is typically stored in relational databases and can be easily queried." ]
, [ "row-n6ua-u57q.t45w", "00000000-0000-0000-C5BA-EB1D7CBA5749", 0, 1668725328, null, 1668725328, null, "{ }", "Transactional data", "Data that changes unpredictably. Examples include accounts payable and receivable data" ]
, [ "row-h3tj~8n28_nait", "00000000-0000-0000-858B-DE30B1B8D402", 0, 1668725328, null, 1668725328, null, "{ }", "Unstructured Data", "Data that does not conform to a predefined schema that includes many irregularities that make it difficult to understand without further normalization. It is typically stored in data lakes and consists of items such as images, videos, and audio files." ]
, [ "row-qdyg-6n5a.rdif", "00000000-0000-0000-34AD-9CCEB94F6F1E", 0, 1668725328, null, 1668725328, null, "{ }", "Untrusted Entity", "An entity that can or may be potentially harmful to a system (ref. State of Maryland Information Technology Security Manual v1.2)." ]
, [ "row-vtek.3sew.hgeq", "00000000-0000-0000-B572-10DD4201C000", 0, 1668725328, null, 1668725328, null, "{ }", "Wi-Fi Certified", "Wi-Fi CERTIFIED is a program for testing products to the 802.11 industry standards for interoperability, security, easy installation, and reliability (ref. State of Maryland Information Technology Security Manual v1.2)." ]
 ]
}